Vulnerabilites related to cisco - meraki_mx65w
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", matchCriteriaId: "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", matchCriteriaId: "BF0F9200-8AFD-4100-AF39-49476298C0E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2AED716A-D252-4FE8-ABE7-57D2AB3682ED", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "518B205F-78E7-48AD-A520-A799FCE11772", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "12785A53-15D1-46F4-8F51-2DE8B91C5EEA", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C22FD7BD-450D-4F81-AD5A-4CFD898EC86A", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22306637-577A-48D0-840B-9BD36D116D6E", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49C36428-65A0-4CA9-A0D3-093547A5A713", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "676032C5-EE2F-4B58-BD5E-AA626E6B0C3D", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2A55C08-73C3-42E7-86EE-A69DE10C2E8C", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "630DCA1A-4F22-4F17-9205-6BFB0276B98A", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A323D6A6-386D-4CBD-B447-2EB18339F6CC", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6560ADD7-3655-4A85-A24E-1A9CC132C6AD", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F285B53-44CE-4158-A773-99F799F6CBCB", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D645D23-2B8F-4AC4-89BA-E070F3292958", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E1419FD-D693-42A5-ABC1-0539FB8BAD67", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39D18FA7-E7D6-4F1C-BDE0-EB9526857BAD", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7FE9C2A6-22E8-43A1-9936-EE65C0A342D3", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "092DA889-B167-41F3-81D7-B2F5BE7B99AF", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A563D688-3994-4A14-AAEA-A45525D4C380", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC333668-F713-4E20-97A6-A2192BF34964", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02148C0F-306F-4700-8657-45134F43E2C4", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04C4F44A-8E87-403B-BAD9-E6D6557496CB", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BEF9B49-78E7-49C8-BADD-933EA12EA168", versionEndExcluding: "27.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DE98041-599C-4B5E-9C52-234BA84E2731", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7AEF2C9C-2F99-49C9-95B8-93B0BDE5D777", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr18:-:*:*:*:*:*:*:*", matchCriteriaId: "9EC44D14-CF82-4C9A-A399-A3B7168F1F09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75A2E923-646F-4581-BE93-FBB3BD1A9814", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45A20191-7126-4B98-951F-2ACC03AAC227", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51590073-ACF5-42CC-9765-7DD358E03D40", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42F88F22-B587-44C9-A0A3-70EBDE310932", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "893DB2E2-505C-45A4-8CD0-A911DC6F8C39", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB69DA2F-0922-4FF4-B199-57F9C2E804B4", versionEndExcluding: "26.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2274DBC-9BA6-4430-9E88-05027947FCBF", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56D2B98B-9080-4DD2-841F-664EDE48D843", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D7F4EB0-2C74-4045-B5A5-9D71A8BCC8C9", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7855CB23-DD12-499A-B684-3FB3C893A809", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47E66153-A0EE-49F7-B168-C953E390214E", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77A69E5B-2C69-4769-94EE-02C70F270928", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85AD2B76-0B4E-434D-89F3-690E13B61B3B", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42B92043-5436-4CA1-A297-DE88A5631BDC", versionEndExcluding: "17.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59A19DB2-1E3A-40AC-B265-878E9B568E8C", versionEndExcluding: "11.0\\(6\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "F97DF354-7690-417E-B223-72C8BDA36DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B261F994-59CA-45F1-ACAC-8F4E93C94C64", versionEndExcluding: "11.3\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:3pcc:*:*", matchCriteriaId: "13D13E34-A8AA-46F4-A0E3-E79D4513EFFA", versionEndExcluding: "11.3\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:3pcc:*:*", matchCriteriaId: "77FC1162-9241-4605-8E0A-F9AC7F5F94E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F1E3B94C-BA7B-481A-AF4D-2FCF5E81D7B6", versionEndExcluding: "14.1\\(1\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9A7F857-A3D7-43DA-8E94-FDA0EE542C39", versionEndExcluding: "14.1\\(1\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B9BC28D-0BC0-45CB-A87B-59F407F3A210", versionEndExcluding: "14.1\\(1\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_series_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F052EA74-DB34-4FF0-9A55-4E117CAF7765", versionEndExcluding: "1.2\\(0\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_series:-:*:*:*:*:*:*:*", matchCriteriaId: "0872EA42-38A9-45A5-94A6-747FEEE0E1D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_desk_series_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A0DD3DA-5B3D-4435-990B-FF181130788B", versionEndExcluding: "1.2\\(0\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_desk_series:-:*:*:*:*:*:*:*", matchCriteriaId: "14038A41-2C6F-4A1E-85A1-8692B9633C8F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_series_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75ED1FFC-A550-4F59-B4AE-FE8B0261E1AE", versionEndExcluding: "10.8.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_series:-:*:*:*:*:*:*:*", matchCriteriaId: "BBE3BDBD-4D85-4C2E-B02E-D7D71331AFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_wireless_phone_860_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C80751CD-A4EE-45F5-83B3-E5D24C274B98", versionEndExcluding: "1.4\\(0\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_wireless_phone_860:-:*:*:*:*:*:*:*", matchCriteriaId: "DC3CC529-4C57-4A21-8936-FD4222F2D350", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_wireless_phone_840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "336CF15F-5AD9-41FD-8606-1531F37FBE1E", versionEndExcluding: "1.4\\(0\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_wireless_phone_840:-:*:*:*:*:*:*:*", matchCriteriaId: "922CC404-372F-4F14-B820-67473C0938FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "D5BDAE9A-9065-4CAE-8031-D294F31E2946", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0ab0:-:*:*:*:*:*:m12:*", matchCriteriaId: "B6D89D68-199F-42E2-84D0-97D3FF59F05F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E2D01D5-2DE9-4AD9-93D9-9C44F08B2BEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0aa0:-:*:*:*:*:*:m12:*", matchCriteriaId: "21A17252-75C3-46B4-927A-124354169DC8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5721-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5A333C23-A56B-48F6-992E-3BF0BD93F730", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5721-1fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F941751F-76BB-4B0B-88B6-CFDBEA4FC2A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "867FE297-7913-43B1-AFF5-A4345FE7DF62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5721-1fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "EB4AEAD7-F842-4E6E-9F44-73356C1874AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5722-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "840CD560-0324-41FB-B51E-77AEEEDC86BC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5722-1fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "B9CFC662-6AA7-4528-B7DF-1ABF16DF0DAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5722-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "2EB47ED3-1063-4A3F-B4BB-8671CE96E0B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5722-1fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "664E9B08-2FA7-4257-B4DA-E3BB510E1E7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5722-1fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E7DCBC95-FEC1-40B3-A81D-179FC97EFEBB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5722-1fc00-0ac0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "626DA25C-2DCA-4BFD-8A55-85BD1321D79F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "EF32DD9B-2036-49AD-9547-956CAE3CD785", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "54DFFDC5-6BB7-4C97-B531-E6FD3CC7A533", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "4B303C52-44D8-4AA6-87C7-2659F7C1610E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0aa6:-:*:*:*:*:*:rj45:*", matchCriteriaId: "7F935667-D4C4-45BE-9D39-9B7A40BD80A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "FF6314D0-5604-4CD1-8C5F-134AC492483E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5F103B12-A8CD-4B32-BFE3-940E3B4E7317", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B894E95-F49A-42ED-888D-4727F41F1A63", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0ab6:-:*:*:*:*:*:rj45:*", matchCriteriaId: "6F7BFBE4-92CA-4D23-8136-605C83B7E66C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5738-1gy00-0aa0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F083F822-DDE4-4D14-81F0-4EFD60DB13CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5738-1gy00-0aa0:-:*:*:*:*:*:m12:*", matchCriteriaId: "377B769F-0394-4E64-BF82-AAB8ADE562B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5738-1gy00-0ab0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "8BB35C1E-C9E7-4803-9AC1-ADFCBCA1052E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5738-1gy00-0ab0:-:*:*:*:*:*:m12:*", matchCriteriaId: "49160650-CDA3-4E4C-BE42-BB84EB19F7E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F6D3DD37-BAF7-4DBD-85D6-A6FEAE19DFFE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "6E04CD9F-35B4-4E99-821F-D219980AE2CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "285EA838-3D9B-46EE-A9DB-9349500FC3D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "70DE2F72-4AB0-4D0C-AD1F-4D924CB6784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "362FFD56-CFBF-4F66-974F-41FEE79D15AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1gd00-0aa0:-:*:*:*:*:*:m12:*", matchCriteriaId: "C34A9FA4-119C-4B3A-BA67-B7305ED073A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "D5CD5D61-1DF5-4B1B-8F9B-8786563BE8E3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1gd00-0ab0:-:*:*:*:*:*:m12:*", matchCriteriaId: "8B7DAEE3-5390-4981-A577-991A42696AC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5761-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "2E784308-225C-4FD1-87AF-A2D052CD87A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5761-1fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "62F306FD-D399-4D3B-9F4A-6605B035DFE9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5761-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "792D3327-54FF-4DF1-826C-670C2B91DAC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5761-1fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "4BE9B963-6B95-49DC-A499-3DE4DC269036", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "7EED502F-EBE4-4DED-822E-8CA310A354B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "3C8D09C4-AB99-498A-BDA9-20F040BA57B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0aa6_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "EEF16762-3BCD-4908-BDFC-EE1DC34023D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0aa6:-:*:*:*:*:*:rj45:*", matchCriteriaId: "3DAC6CD0-C5D8-4C87-BC35-93E49FDFB55B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "ADAF404C-8334-4754-90B6-5C1E6CCD1F76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "AAF3FA1B-6774-4AC1-B040-BE5815859FD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0ab6_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "92E3C47A-CCF6-4B3B-9B08-5D03186C817D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0ab6:-:*:*:*:*:*:rj45:*", matchCriteriaId: "EC1F4E15-3C06-4133-8435-1A76ACD6EF62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "403F0AD8-E663-479C-A45B-352B257F0247", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fy00-0ta0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "21439D8A-680E-489E-A1E2-4C31B49E82BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "DF180BB2-E8DD-4B9C-92C4-A8DD5EB83446", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fy00-0tb0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "A2C0E215-F905-4B16-9D80-81B440BA1F8F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "9CD6B350-BA19-407D-9956-51D27A2E311C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0ta0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "EA5D4E3B-48CE-4C4A-A09E-FAEE74720091", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "57ECC858-88F1-4456-B7ED-D3B1847F354C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0tb0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "5415EDBC-1FAB-486B-B874-B7D35860013F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "7CB72EAF-7D3E-4C4F-A72D-9D1D085EC32A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-1fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "889744B0-52CE-49BB-99BA-4B2B668DC3C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "3A12493B-2032-4F3A-A994-B502BF0EC814", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-1fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "774C7E40-0B01-4C1E-8EED-4E8A91B73E28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "4E36CEFB-337C-4AD2-AAAC-43EF62E0E014", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "1E4695C5-F117-42A2-B3A2-50D4777EBA53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0C284514-F681-4B9E-9A1F-D3F7BE9B5C0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "851ECBFD-AC30-46BD-82F9-267A11199D06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "2F31CE93-B417-41B0-8060-3116347424A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fc00-0ac0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "DF581904-415F-4D9E-9A86-5342DE2FD4D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2hc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F0306E3A-302F-4F70-8358-C13824F023E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2hc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "75A4F315-14FB-4E93-B74D-9E52682A6B0A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2hc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0E5EAC53-E32C-41DB-A2ED-F7DDA8F1B49A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2hc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "BB7605ED-2ABB-4206-8ABC-3C1C1999DF17", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F640E706-6912-4675-A3D8-B98374CB3324", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8808A2F3-ECDE-46D3-AD0F-02BE2735A6BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "2BB7F4C9-E24F-420B-9DCA-9E7994E05971", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "ADB85459-E2D7-4ED4-A0CB-17B68061E250", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "EA798D9C-36A3-41C8-B9FC-8123EC9BF452", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1gd00-0aa0:-:*:*:*:*:*:m12:*", matchCriteriaId: "64284790-C465-410F-B871-B0226725DDDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "C7290D90-688D-4BE7-8089-095959EEC46E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1gd00-0ab0:-:*:*:*:*:*:m12:*", matchCriteriaId: "D5246D7B-63BF-48BC-A98D-5A0646FDE6DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2fc00-0aa0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "BC05A12F-5ADB-4AC4-BBA1-A319330340E3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2fc00-0aa0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "54B39530-AE99-4BBA-8C59-FAC84DDEF33A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2fc00-0ab0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "34480D85-D445-41FF-B0FD-5D722A487F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2fc00-0ab0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "634ADAA3-8F4A-44A5-BC88-1ED3F1EE61C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2fc00-0ac0_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9474FF4F-F936-4E72-8482-5D1C9C49C890", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2fc00-0ac0:-:*:*:*:*:*:rj45:*", matchCriteriaId: "317D4551-6400-4E4E-8AB4-9024E4BE72E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0aa0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "73CB46CC-6647-4AAF-B3C8-042C776B8532", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0aa0:-:*:*:*:*:*:m12:*", matchCriteriaId: "0C9A1C83-A000-456A-A443-ECCC4A5900DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0ab0_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "55B91BF8-1086-4721-8829-3D017341A25A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0ab0:-:*:*:*:*:*:m12:*", matchCriteriaId: "ED8212AE-EC38-4F46-84FB-042AE480E53A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0ta0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "B94BFF37-65A3-4F80-81F4-85647B4C2441", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0ta0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "9D9494C4-C03A-4B92-95B9-7D68FE604257", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0tb0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "E4D701C5-F94E-4ECF-B0F2-477B7DF6630F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0tb0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "EFEFA2DE-F621-41FA-AB8A-9DF1F3762311", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0tc0_firmware:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "466CEF9A-C71A-41DC-AD74-21FBA163E97F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0tc0:-:*:*:*:*:*:m12_ecc:*", matchCriteriaId: "B69D6A0A-EC16-41F1-A1E6-38FADD9A190D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", }, { lang: "es", value: "Se detectó un problema en el controlador ALFA de Windows 10 versión 6.1316.1209 para AWUS036H. La implementación de Wi-Fi no verifica la Comprobación de Integridad del Mensaje (autenticidad) de las tramas TKIP fragmentadas. Un adversario puede abusar de esto para inyectar y posiblemente descifrar paquetes en redes WPA o WPA2 que admitan el protocolo de confidencialidad de datos TKIP", }, ], id: "CVE-2020-26141", lastModified: "2024-11-21T05:19:20.950", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.727", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-354", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-10-26 15:15
Modified
2024-11-21 06:43
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D9F9343-745D-45B5-B657-6E5675E08E08", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1E66F11-F41A-425D-8409-D8529D906E3D", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7F78CB5-F796-439F-A0A1-E06C857BBAA4", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72BE7D32-2477-45D1-A9C1-418B225574E9", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C8F3A54-A2A2-4C34-B5A2-19FD31237C34", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA12B05C-A12F-4EA6-948F-DC1CC0257729", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C95582B9-7563-4F61-8548-D58237AA6FC6", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7160F269-F161-4A30-AD9D-DCECA464F7D6", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "312A2614-4164-4B74-B966-8FC76BE323D1", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2E55C71-356C-47F1-9F90-6A673EFBC369", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B35AF5F8-8641-4DD0-8B1F-7DEFD188DFF2", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77E90F32-E8E3-4852-B579-49FBDAB5F207", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C62EF9EE-39A0-46BF-B82E-6D3CE20D69B7", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3442C032-F879-4CB5-BE83-BD606C07151C", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F1605125-61CC-4FB9-8CD2-114DE332E637", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E92B7E7D-A4E7-4F98-9A19-1215361FF3E2", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCD8CD23-06CA-4A82-BA3C-3EA8C0B61DA7", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "74D48B18-7344-4AF0-A771-D3EF0B421B00", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "865B25D7-DFC9-44E2-98A0-2910B34F6140", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D409165B-80FB-4B61-A02F-529B130EFCB9", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B22E7DB-912F-46CB-BE15-FA9812D15D72", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B537CF0-FA7F-489A-B771-C526046CE12A", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "105DD5F7-B29A-46B6-84E6-9081C55F0AC8", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E769CB5F-6B7B-48F1-ABFE-DF8412DA6777", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "92BD623D-25BE-4D21-9610-266B337F82C7", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "094DCADF-4665-426C-B20E-01B46672B2D3", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34615059-146D-43C4-9FC6-83FA8F11FDEB", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18342750-90EA-4362-869A-9B5FD6E53AA3", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D86B3633-1C72-4912-87F9-8C8811317AB5", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B74149A1-5E2F-42C0-A670-C57C91721837", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5534754A-9F71-4C87-B3AF-00EB6C0421AC", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CCE7FDA7-C02B-4ED3-B7C3-FAA2066B2CA5", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D6EA8014-F9D2-4F4F-A797-056EBCB5439C", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C87C8065-E397-4D62-ABF2-9EC1177BEBE3", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C884A16-07E2-4536-A4AB-5218E6F6B61F", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "235AAC4D-4F87-4CE1-B370-4536052513A6", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B60B34BB-3375-4A6A-BC5F-27934812A6C9", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC690E48-F5D5-4CCD-9248-C5953028E81C", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D7526DC-5E2C-42A2-8B1B-BED60034CF0A", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "785B2796-0E7D-4FDF-B142-7CE70CEB2269", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "210E5600-00AB-4923-817D-8B9B61BADB3B", versionEndExcluding: "16.16.6", versionStartIncluding: "16.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C68C05-248C-4B91-A727-F1ED23AC347C", versionEndExcluding: "17.10.1", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad en el servidor VPN Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z3 Teleworker Gateway podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a que no se comprueban suficientemente los parámetros proporcionados por el cliente mientras es establecida una sesión VPN SSL. Un atacante podría explotar esta vulnerabilidad al diseñar una petición maliciosa y enviándola al dispositivo afectado. Un ataque con éxito podría permitir al atacante causar a el servidor VPN Cisco AnyConnect bloquearse y reiniciarse, resultando en el fracaso de las conexiones VPN SSL establecidas y obligaría a usuarios remotos a iniciar una nueva conexión VPN y volver a autenticarse. Un ataque sostenido podría impedir que sean establecidas nuevas conexiones VPN SSL. Nota: Cuando el tráfico de ataque es detenido, el servidor VPN Cisco AnyConnect es recuperado con elegancia sin necesidad de intervención manual. Cisco Meraki ha publicado actualizaciones de software que abordan esta vulnerabilidad", }, ], id: "CVE-2022-20933", lastModified: "2024-11-21T06:43:51.123", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-10-26T15:15:14.713", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-234", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", matchCriteriaId: "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", vulnerable: true, }, { criteria: "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", matchCriteriaId: "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "C2C083CF-3D4D-4AF0-8461-835F6AC264CC", versionEndExcluding: "4.4.271", versionStartIncluding: "4.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "11580478-2F79-45B8-9BC0-FEF28259A4F5", versionEndExcluding: "4.9.271", versionStartIncluding: "4.9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "970E3D3C-8829-4599-95A7-AC63136CE48E", versionEndExcluding: "4.14.235", versionStartIncluding: "4.14", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", versionEndExcluding: "4.19.193", versionStartIncluding: "4.19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", versionEndExcluding: "5.4.124", versionStartIncluding: "5.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", versionEndExcluding: "5.10.42", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", versionEndExcluding: "5.12.9", versionStartIncluding: "5.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", }, { lang: "es", value: "El estándar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que todos los fragmentos de una trama estén cifrados con la misma clave. Un adversario puede abusar de esto para descifrar fragmentos seleccionados cuando otro dispositivo envía tramas fragmentadas y la clave de cifrado WEP, CCMP o GCMP es periódicamente renovada", }, ], id: "CVE-2020-24587", lastModified: "2024-11-21T05:15:05.303", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.8, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:A/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.2, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 2.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.580", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*", matchCriteriaId: "0A99D021-C66D-4FA2-B33C-4DAADBB6B431", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, { lang: "es", value: "Se detectó un problema en el kernel en NetBSD versión 7.1. Un punto de acceso (AP) reenvía tramas EAPOL a otros clientes aunque el remitente aún no se haya autenticado con éxito en el AP. Esto podría ser abusado en redes Wi-Fi proyectadas para lanzar ataques de denegación de servicio contra clientes conectados y facilitar la explotación de otras vulnerabilidades en clientes conectados", }, ], id: "CVE-2020-26139", lastModified: "2024-11-21T05:19:20.157", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.647", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 18:46
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23FA0FF8-5926-4623-9348-4347331C5F3F", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, { lang: "es", value: "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podría permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una gestión insuficiente de los recursos al establecer sesiones VPN SSL. Un atacante podría aprovechar esta vulnerabilidad enviando una serie de solicitudes HTTPS manipuladas al servidor VPN de un dispositivo afectado. Una explotación exitosa podría permitir al atacante hacer que el servidor VPN de Cisco AnyConnect deje de aceptar nuevas conexiones, lo que impediría que se establecieran nuevas conexiones VPN SSL. Las sesiones VPN SSL existentes no se ven afectadas. Nota: Cuando el tráfico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervención manual.", }, ], id: "CVE-2024-20502", lastModified: "2024-10-08T18:46:38.437", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:14.780", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", matchCriteriaId: "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", vulnerable: true, }, { criteria: "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", matchCriteriaId: "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", matchCriteriaId: "9E2C378B-1507-4C81-82F6-9F599616845A", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", matchCriteriaId: "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", matchCriteriaId: "7CB85C75-4D35-480E-843D-60579EC75FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", matchCriteriaId: "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", matchCriteriaId: "E9273B95-20ED-4547-B0A8-95AD15B30372", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", matchCriteriaId: "AAE74AF3-C559-4645-A6C0-25C3D647AAC8", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", matchCriteriaId: "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", matchCriteriaId: "C6CE5198-C498-4672-AF4C-77AB4BE06C5C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", matchCriteriaId: "5F2558DF-2D1F-46BA-ABF1-08522D33268E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", matchCriteriaId: "0B60D940-80C7-49F0-8F4E-3F99AC15FA82", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "68C08ECE-4D09-4E57-920B-B8E94E81603A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F5154A83-2499-4756-9150-8BFD9ACEF583", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "7CC235C6-63B1-4085-B9AA-47EFB17A144D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "54C41A49-87FA-4C98-8321-2808712B2F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F8ED25D1-973F-481A-8550-16508F73D2D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "35918620-E4C5-4E46-A5A9-63009333667A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "27440732-54F0-40DF-9896-88D60ABC568A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", matchCriteriaId: "FC39A276-532B-428A-83BA-141B626281A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "93103556-6C4A-4D35-91D1-5CDCDC740655", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5DEFC044-1D95-4386-AABB-ADE1099E3F85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "42759A0F-70C6-41DB-9DF9-2BC05685F678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "95662406-0D7D-45B2-95F5-582FA275AC89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "A0E9FB66-F577-4744-B51F-3BD25293109F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "079DA749-0B94-4CCF-A3B1-7669DA213B52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "D96A05C3-1549-47DD-BADA-7872246EBDA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "2E7375AB-BE32-4879-BB54-CF5EDAB98188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E9E26B8-1539-4E21-AEAA-45095F79382A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "19C73CA1-2F92-4635-8D38-812D6D8ACD89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "EA17907A-388A-42E7-ACC6-2F59C72C93F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "A53A71EB-C346-42CD-AD58-F83F809D0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "90E87633-CD6E-439B-9CE8-66A1E414F09D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "742D9262-4329-4F0A-B97E-5FC65786946F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "FC14C45F-FDFB-4AAC-94EC-45860051379F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "C01E79D8-5F48-4939-BFD6-B363A76769D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CEE50FA1-6616-402A-9D86-9725206612C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B907930-CA5C-4160-A3D1-8ACB559C9143", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9331282F-B426-40DC-869E-F6F7DFE959A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", matchCriteriaId: "C67D4B91-66EB-490E-B43D-A7E159CC543B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", matchCriteriaId: "45A6A314-804B-47DC-B35E-804AD89588D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", matchCriteriaId: "968D60A4-036A-4792-BE8E-88F8B26444DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "754B93BA-0451-4C09-A124-284A62189D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "85293635-DD43-4651-8605-4F27F228AA91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "826FB2F4-45B5-4360-B577-11F75A1B67A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F3417E19-D7FC-487D-B316-B826DB3CB712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "B66B6DB7-E48C-4758-915E-E4096CC5D68E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "69C3A33C-85E1-4157-81F7-39FA271CF8ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E65FB9EC-A750-44C9-B251-5D8697C29EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7948D988-3ED9-49BE-B820-15728DA93D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B465A44-EC90-41C6-BD9B-59D3B7E49540", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", matchCriteriaId: "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "DA329302-48FE-43FB-A15D-C3BEFB5AE868", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", matchCriteriaId: "37055F7B-2F2A-4B80-AC34-CAB0568BC692", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "534CF2AE-2149-4599-AC43-13EE8048B3EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB15599-F795-4D24-A4A6-CD826F6A7A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "441DF280-FC8C-481F-BDB9-7D757CF5BB72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "52BB9046-E47D-480A-93D2-DB0F76574E02", versionEndExcluding: "4.4.271", versionStartIncluding: "4.4.0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "C01BF34A-CD21-4B2F-9877-C89B8202B09A", versionEndExcluding: "4.9.271", versionStartIncluding: "4.9.0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "970E3D3C-8829-4599-95A7-AC63136CE48E", versionEndExcluding: "4.14.235", versionStartIncluding: "4.14", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", versionEndExcluding: "4.19.193", versionStartIncluding: "4.19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", versionEndExcluding: "5.4.124", versionStartIncluding: "5.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", versionEndExcluding: "5.10.42", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", versionEndExcluding: "5.12.9", versionStartIncluding: "5.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", }, { lang: "es", value: "El estándar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que el flag A-MSDU en el campo de encabezado QoS de texto plano esté autenticada. Contra dispositivos que admiten la recepción de tramas A-MSDU que no son SSP (que es obligatorio como parte de 802.11n), un adversario puede abusar de esto para inyectar paquetes de red arbitrarios", }, ], id: "CVE-2020-24588", lastModified: "2024-11-21T05:15:05.740", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.9, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 3.5, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.613", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", matchCriteriaId: "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", matchCriteriaId: "BF0F9200-8AFD-4100-AF39-49476298C0E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "68C08ECE-4D09-4E57-920B-B8E94E81603A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F5154A83-2499-4756-9150-8BFD9ACEF583", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "7CC235C6-63B1-4085-B9AA-47EFB17A144D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "54C41A49-87FA-4C98-8321-2808712B2F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F8ED25D1-973F-481A-8550-16508F73D2D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "35918620-E4C5-4E46-A5A9-63009333667A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "27440732-54F0-40DF-9896-88D60ABC568A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", matchCriteriaId: "FC39A276-532B-428A-83BA-141B626281A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "93103556-6C4A-4D35-91D1-5CDCDC740655", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5DEFC044-1D95-4386-AABB-ADE1099E3F85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "42759A0F-70C6-41DB-9DF9-2BC05685F678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "95662406-0D7D-45B2-95F5-582FA275AC89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "A0E9FB66-F577-4744-B51F-3BD25293109F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "079DA749-0B94-4CCF-A3B1-7669DA213B52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "D96A05C3-1549-47DD-BADA-7872246EBDA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "2E7375AB-BE32-4879-BB54-CF5EDAB98188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E9E26B8-1539-4E21-AEAA-45095F79382A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "19C73CA1-2F92-4635-8D38-812D6D8ACD89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "EA17907A-388A-42E7-ACC6-2F59C72C93F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "A53A71EB-C346-42CD-AD58-F83F809D0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "90E87633-CD6E-439B-9CE8-66A1E414F09D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "742D9262-4329-4F0A-B97E-5FC65786946F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "FC14C45F-FDFB-4AAC-94EC-45860051379F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "C01E79D8-5F48-4939-BFD6-B363A76769D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CEE50FA1-6616-402A-9D86-9725206612C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B907930-CA5C-4160-A3D1-8ACB559C9143", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9331282F-B426-40DC-869E-F6F7DFE959A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", matchCriteriaId: "C67D4B91-66EB-490E-B43D-A7E159CC543B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", matchCriteriaId: "45A6A314-804B-47DC-B35E-804AD89588D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", matchCriteriaId: "968D60A4-036A-4792-BE8E-88F8B26444DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "754B93BA-0451-4C09-A124-284A62189D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "85293635-DD43-4651-8605-4F27F228AA91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "826FB2F4-45B5-4360-B577-11F75A1B67A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F3417E19-D7FC-487D-B316-B826DB3CB712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "B66B6DB7-E48C-4758-915E-E4096CC5D68E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "69C3A33C-85E1-4157-81F7-39FA271CF8ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E65FB9EC-A750-44C9-B251-5D8697C29EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7948D988-3ED9-49BE-B820-15728DA93D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B465A44-EC90-41C6-BD9B-59D3B7E49540", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", matchCriteriaId: "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "DA329302-48FE-43FB-A15D-C3BEFB5AE868", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", matchCriteriaId: "37055F7B-2F2A-4B80-AC34-CAB0568BC692", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "534CF2AE-2149-4599-AC43-13EE8048B3EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB15599-F795-4D24-A4A6-CD826F6A7A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "441DF280-FC8C-481F-BDB9-7D757CF5BB72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6EF369-8D83-4F5D-BDBE-99E89AD84810", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", matchCriteriaId: "8191FD87-4E55-4F38-8DB0-7E6772AD075B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "10BD5327-F3F8-4D0A-B6DC-2F11DF2E6866", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", matchCriteriaId: "1D717945-EE41-4D0F-86EF-90826EBE9C3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "893D104F-6711-46F9-804C-4B57562166E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", matchCriteriaId: "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4AABCC2-D2A5-4A89-9DF9-6F80EB871CC9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", matchCriteriaId: "D27AB201-342D-4517-9E05-6088598F4695", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw-6300-con-x-k9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90A743E4-1302-4DAB-9300-65D8F468C8F2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3625BC-9003-4E07-B4EA-EB44CADDD6B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, { lang: "es", value: "Se detectó un problema en el controlador ALFA de Windows 10 versión 6.1316.1209 para AWUS036H. Las implementaciones WEP, WPA, WPA2 y WPA3 aceptan tramas de texto plano en una red Wi-Fi protegida. Un adversario puede abusar de esto para inyectar tramas de datos arbitrarias independientes de la configuración de la red", }, ], id: "CVE-2020-26140", lastModified: "2024-11-21T05:19:20.550", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.687", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 21:16
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device.
This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23FA0FF8-5926-4623-9348-4347331C5F3F", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.", }, { lang: "es", value: "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podría permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) para usuarios específicos del servicio AnyConnect en un dispositivo afectado. Esta vulnerabilidad se debe a una entropía insuficiente para los controladores que se utilizan durante el establecimiento de una sesión VPN SSL. Un atacante no autenticado podría explotar esta vulnerabilidad mediante la fuerza bruta de controladores de sesión válidos. Un atacante autenticado podría explotar esta vulnerabilidad conectándose al servicio VPN AnyConnect de un dispositivo afectado para recuperar un controlador de sesión válido y, en función de ese controlador, predecir otros controladores de sesión válidos. A continuación, el atacante enviaría una solicitud HTTPS manipulada mediante el controlador de sesión forzado o previsto al servidor VPN AnyConnect del dispositivo. Una explotación exitosa podría permitir al atacante finalizar sesiones VPN SSL específicas, lo que obligaría a los usuarios remotos a iniciar nuevas conexiones VPN y volver a autenticarse.", }, ], id: "CVE-2024-20513", lastModified: "2024-10-08T21:16:54.820", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:15.210", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-639", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-639", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 18:45
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device.
This vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23FA0FF8-5926-4623-9348-4347331C5F3F", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device.\r\n\r\nThis vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device.", }, { lang: "es", value: "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podría permitir que un atacante remoto no autenticado secuestre una sesión VPN de AnyConnect o provoque una condición de denegación de servicio (DoS) para usuarios individuales del servicio VPN de AnyConnect en un dispositivo afectado. Esta vulnerabilidad se debe a una entropía débil para los controladores que se utilizan durante el proceso de autenticación de VPN, así como a una condición de ejecución que existe en el mismo proceso. Un atacante podría aprovechar esta vulnerabilidad adivinando correctamente un controlador de autenticación y luego enviando solicitudes HTTPS manipuladas a un dispositivo afectado. Una explotación exitosa podría permitir al atacante tomar el control de la sesión VPN de AnyConnect de un usuario objetivo o evitar que el usuario objetivo establezca una sesión VPN de AnyConnect con el dispositivo afectado.", }, ], id: "CVE-2024-20509", lastModified: "2024-10-08T18:45:52.513", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:14.997", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 18:27
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "553AC2DF-6F85-40D3-B3B1-F979364BA4BD", versionEndIncluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, { lang: "es", value: "Varias vulnerabilidades en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podrían permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de los parámetros proporcionados por el cliente al establecer una sesión VPN SSL. Un atacante podría aprovechar estas vulnerabilidades enviando una solicitud HTTPS manipulada al servidor VPN de un dispositivo afectado. Una explotación exitosa podría permitir que el atacante haga que el servidor VPN de Cisco AnyConnect se reinicie, lo que provocaría la falla de las conexiones VPN SSL establecidas y obligaría a los usuarios remotos a iniciar una nueva conexión VPN y volver a autenticarse. Un ataque sostenido podría evitar que se establezcan nuevas conexiones VPN SSL. Nota: Cuando el tráfico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervención manual.", }, ], id: "CVE-2024-20499", lastModified: "2024-10-08T18:27:16.110", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:14.143", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 18:32
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23FA0FF8-5926-4623-9348-4347331C5F3F", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, { lang: "es", value: "Varias vulnerabilidades en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podrían permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de los parámetros proporcionados por el cliente al establecer una sesión VPN SSL. Un atacante podría aprovechar estas vulnerabilidades enviando una solicitud HTTPS manipulada al servidor VPN de un dispositivo afectado. Una explotación exitosa podría permitir que el atacante haga que el servidor VPN de Cisco AnyConnect se reinicie, lo que provocaría la falla de las conexiones VPN SSL establecidas y obligaría a los usuarios remotos a iniciar una nueva conexión VPN y volver a autenticarse. Un ataque sostenido podría evitar que se establezcan nuevas conexiones VPN SSL. Nota: Cuando el tráfico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervención manual.", }, ], id: "CVE-2024-20498", lastModified: "2024-10-08T18:32:54.457", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:13.870", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-415", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-415", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 18:27
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
This vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "553AC2DF-6F85-40D3-B3B1-F979364BA4BD", versionEndIncluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, { lang: "es", value: "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podría permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Esta vulnerabilidad se debe a una gestión insuficiente de los recursos al establecer sesiones TLS/SSL. Un atacante podría aprovechar esta vulnerabilidad enviando una serie de mensajes TLS/SSL manipulados al servidor VPN de un dispositivo afectado. Una explotación exitosa podría permitir al atacante hacer que el servidor VPN de Cisco AnyConnect deje de aceptar nuevas conexiones, lo que impediría que se establecieran nuevas conexiones VPN SSL. Las sesiones VPN SSL existentes no se ven afectadas. Nota: Cuando el tráfico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervención manual.", }, ], id: "CVE-2024-20500", lastModified: "2024-10-08T18:27:19.347", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:14.350", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 19:15
Modified
2024-10-08 18:28
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3C6574B-E879-4813-9516-93B41EBDFBD3", versionEndExcluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*", matchCriteriaId: "B3099A12-2D6F-4486-A690-1C809AF480B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "553AC2DF-6F85-40D3-B3B1-F979364BA4BD", versionEndIncluding: "18.211.2", versionStartIncluding: "17.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*", matchCriteriaId: "BE749570-1EA6-4734-B96A-D02B3BA3A756", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*", matchCriteriaId: "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D4319-19DA-4DC0-88D0-DE859504EA6D", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*", matchCriteriaId: "36770C3B-F962-48FB-9D9F-3EABB1F10EFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D29083-7535-4B23-9141-BF6CE2824184", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C8F2FA1-B439-4978-AD2B-34C98310D894", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*", matchCriteriaId: "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D620C14D-7724-4C38-83A6-E33328EDE7C3", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*", matchCriteriaId: "1B35EB71-8584-4803-A438-AEC406FD8445", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61EA9B6-126D-4174-8BEF-7FD311724C03", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*", matchCriteriaId: "2ACA552D-78D3-4312-9537-28ADBB15E08A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "869396D2-5CB1-45FF-8CC8-C6BA17548076", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*", matchCriteriaId: "291C7E3A-74D1-4326-87A4-F60D60E3DC37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF66E98-18FB-4862-96C6-090F9B563AAC", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A18D40-3168-4270-A019-0FFB3652BD64", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*", matchCriteriaId: "35740A98-6486-458C-99A9-8E23A781C917", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*", matchCriteriaId: "410A121A-037A-4D44-A35F-7AE41F93E5AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E4FB60C-E46F-4D0F-9C01-2D2670334694", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A4239D-E115-4368-895A-002BBD94F243", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "995A6C94-CC7F-4CA4-8815-693E491652B4", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*", matchCriteriaId: "2A892F3D-62F9-4B04-94E8-FD803159C47B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "900C8DC4-EF1C-4762-A517-F67665F3D724", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0118FD5D-0D25-4984-A6EB-40EF70B85144", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE27942F-86F1-480C-AFA1-762A5A9E775F", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB39E09-A441-4F95-9F38-44942BDE98AD", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*", matchCriteriaId: "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45953505-EF91-4825-95CD-51EE86D694A5", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*", matchCriteriaId: "2702FE73-E4AC-45C7-A212-44D783720798", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1A471D3-2D62-4458-ADDE-53D60E55966C", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D24D11CA-67C0-4376-91DE-F62118062FED", versionEndExcluding: "18.211.2", versionStartIncluding: "16.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, { lang: "es", value: "Varias vulnerabilidades en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podrían permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Estas vulnerabilidades se deben a una validación insuficiente de los parámetros proporcionados por el cliente al establecer una sesión VPN SSL. Un atacante podría aprovechar estas vulnerabilidades enviando una solicitud HTTPS manipulada al servidor VPN de un dispositivo afectado. Una explotación exitosa podría permitir que el atacante haga que el servidor VPN de Cisco AnyConnect se reinicie, lo que provocaría la falla de las conexiones VPN SSL establecidas y obligaría a los usuarios remotos a iniciar una nueva conexión VPN y volver a autenticarse. Un ataque sostenido podría evitar que se establezcan nuevas conexiones VPN SSL. Nota: Cuando el tráfico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervención manual.", }, ], id: "CVE-2024-20501", lastModified: "2024-10-08T18:28:51.753", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T19:15:14.570", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2020-26139
Vulnerability from cvelistv5
Published
2021-05-11 19:37
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.127Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:09:21", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26139", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26139", datePublished: "2021-05-11T19:37:55", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.127Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24588
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:08.467Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { url: "https://www.fragattacks.com", }, { url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24588", datePublished: "2021-05-11T00:00:00", dateReserved: "2020-08-21T00:00:00", dateUpdated: "2024-08-04T15:19:08.467Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20499
Vulnerability from cvelistv5
Published
2024-10-02 18:23
Modified
2024-10-02 19:04
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:meraki_mx:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_mx", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, { cpes: [ "cpe:2.3:h:cisco:meraki_z1:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_z1", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20499", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:03:30.783849Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:04:46.773Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "Out-of-bounds Write", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:23:26.563Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20499", datePublished: "2024-10-02T18:23:26.563Z", dateReserved: "2023-11-08T15:08:07.686Z", dateUpdated: "2024-10-02T19:04:46.773Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24587
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:08.605Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { url: "https://www.fragattacks.com", }, { url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24587", datePublished: "2021-05-11T00:00:00", dateReserved: "2020-08-21T00:00:00", dateUpdated: "2024-08-04T15:19:08.605Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20500
Vulnerability from cvelistv5
Published
2024-10-02 18:23
Modified
2024-10-02 19:05
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
This vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:meraki_mx:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_mx", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, { cpes: [ "cpe:2.3:h:cisco:meraki_z1:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_z1", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20500", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:05:10.593025Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:05:52.477Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "Uncontrolled Resource Consumption", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:23:19.259Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20500", datePublished: "2024-10-02T18:23:19.259Z", dateReserved: "2023-11-08T15:08:07.687Z", dateUpdated: "2024-10-02T19:05:52.477Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20513
Vulnerability from cvelistv5
Published
2024-10-02 18:23
Modified
2024-10-02 19:48
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device.
This vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20513", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:48:03.244649Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:48:23.292Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition for targeted users of the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient entropy for handlers that are used during SSL VPN session establishment. An unauthenticated attacker could exploit this vulnerability by brute forcing valid session handlers. An authenticated attacker could exploit this vulnerability by connecting to the AnyConnect VPN service of an affected device to retrieve a valid session handler and, based on that handler, predict further valid session handlers. The attacker would then send a crafted HTTPS request using the brute-forced or predicted session handler to the AnyConnect VPN server of the device. A successful exploit could allow the attacker to terminate targeted SSL VPN sessions, forcing remote users to initiate new VPN connections and reauthenticate.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-639", description: "Authorization Bypass Through User-Controlled Key", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:23:54.411Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Targeted Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20513", datePublished: "2024-10-02T18:23:54.411Z", dateReserved: "2023-11-08T15:08:07.689Z", dateUpdated: "2024-10-02T19:48:23.292Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-26140
Vulnerability from cvelistv5
Published
2021-05-11 19:34
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.137Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:11:58", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26140", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26140", datePublished: "2021-05-11T19:34:42", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.137Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20509
Vulnerability from cvelistv5
Published
2024-10-02 18:24
Modified
2024-10-02 19:51
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device.
This vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-20509", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:50:56.321761Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:51:14.048Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device.\r\n\r\nThis vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco PSIRT nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-362", description: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:24:42.768Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X", discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20509", datePublished: "2024-10-02T18:24:42.768Z", dateReserved: "2023-11-08T15:08:07.688Z", dateUpdated: "2024-10-02T19:51:14.048Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20498
Vulnerability from cvelistv5
Published
2024-10-02 18:23
Modified
2024-10-02 19:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:meraki_mx:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_mx", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, { cpes: [ "cpe:2.3:h:cisco:meraki_z1:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_z1", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20498", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:07:18.453595Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:08:07.164Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-415", description: "Double Free", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:23:11.523Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20498", datePublished: "2024-10-02T18:23:11.523Z", dateReserved: "2023-11-08T15:08:07.686Z", dateUpdated: "2024-10-02T19:08:07.164Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-26141
Vulnerability from cvelistv5
Published
2021-05-11 19:42
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.134Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:13:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26141", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26141", datePublished: "2021-05-11T19:42:11", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.134Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20933
Vulnerability from cvelistv5
Published
2022-10-26 14:00
Modified
2024-11-01 18:48
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:57.978Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20221019 Cisco Meraki MX and Z3 Teleworker Gateway VPN Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20933", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-01T18:43:45.653455Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-01T18:48:56.789Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-10-19T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-234", description: "CWE-234", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-26T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20221019 Cisco Meraki MX and Z3 Teleworker Gateway VPN Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-vnESbgBf", defect: [ [ "NA", ], ], discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway VPN Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20933", datePublished: "2022-10-26T14:00:34.721945Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-01T18:48:56.789Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20501
Vulnerability from cvelistv5
Published
2024-10-02 18:23
Modified
2024-10-02 19:03
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.
These vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:meraki_mx:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_mx", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, { cpes: [ "cpe:2.3:h:cisco:meraki_z1:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_z1", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20501", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:01:58.939883Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:03:03.851Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThese vulnerabilities are due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "Out-of-bounds Write", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:23:35.875Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", defects: [ "CSCwh53896", ], discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20501", datePublished: "2024-10-02T18:23:35.875Z", dateReserved: "2023-11-08T15:08:07.687Z", dateUpdated: "2024-10-02T19:03:03.851Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20502
Vulnerability from cvelistv5
Published
2024-10-02 18:23
Modified
2024-10-02 19:01
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Meraki MX Firmware |
Version: N/A |
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:cisco:meraki_mx:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_mx", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, { cpes: [ "cpe:2.3:h:cisco:meraki_z1:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "meraki_z1", vendor: "cisco", versions: [ { status: "affected", version: "0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20502", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T18:59:14.837416Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:01:09.601Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Meraki MX Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention.", }, ], exploits: [ { lang: "en", value: "Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "Uncontrolled Resource Consumption", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T18:23:45.163Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2", }, ], source: { advisory: "cisco-sa-meraki-mx-vpn-dos-QTRHzG2", discovery: "INTERNAL", }, title: "Cisco Meraki MX and Z3 Teleworker Gateway AnyConnect VPN Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20502", datePublished: "2024-10-02T18:23:45.163Z", dateReserved: "2023-11-08T15:08:07.687Z", dateUpdated: "2024-10-02T19:01:09.601Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }