All the vulnerabilites related to huawei - ne20
var-201302-0018
Vulnerability from variot

Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community. HP/H3C Made and Huawei There are vulnerabilities in network devices that lack access restrictions. HP/H3C Made and Huawei Network devices SNMP There is a problem with request processing and there is a vulnerability with insufficient access restrictions.A remote attacker may gain access to the management functions of the product. Multiple HP products have security vulnerabilities that allow attackers to exploit vulnerabilities to obtain sensitive information. No detailed vulnerability details are currently available. Hewlett-Packard (HP) is the world's leading high-tech provider, providing a full range of products such as notebooks, desktop computers, and workstations. The vulnerability is caused by the program not implementing access control correctly as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0. Through SNMP requests with read-only communities, remote authentication attackers exploit this vulnerability to discover credentials in UserInfoEntry values.

Identifiers


US-CERT VU#225404 CVE-2012-3268

Vendor release


HP/H3C: https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685&ac.admitted=1350939600802.876444892.492883150

Huawei: In the works

Researcher


Kurt Grutzmacher grutz jingojango dot net http://grutztopia.jingojango.net/ twitter: @grutz

Details


Huawei/H3C have two OIDs, 'old' and 'new':

old: 1.3.6.1.4.1.2011.10 new: 1.3.6.1.4.1.25506

Most devices support both formats.

The MIBs h3c-user.mib and hh3c-user.mib, for the purpose of this document, will be referred to as (h)h3c-user.mib. This MIB defines the internal table and objects to "Manage configuration and Monitor running state for userlog feature."

This means there are some cool objects with data in this MIB penetration testers or malicious actors would want to get their dirty little hands on. Most objects are only accessible with the read/write community string.

In the revision history of (h)h3c-user.mib, version 2.0 modified the MAX-ACCESS from read-only to read-create the following objects within the (h)h3cUserInfoEntry sequence:

(h)h3cUserName (h)h3cUserPassword (h)h3cAuthMode (h)h3cUserLevel

The purpose of these objects are to provide the locally configured users to those with a valid SNMP community. After the change only those with the read-write community string should have access, however this was not the case and the code still retained the earlier access of read-only.

So if you have the SNMP public community string then you have the ability to view these entries.

Why this is impactful


The (h)h3cUserPassword is presented in one of three formats as defined in the (h)h3cAuthMode object and mirrors how passwords are stored in the device configuration:

0 -- password simple, meaning cleartext 7 -- password cipher, meaning ciphertext 9 -- password sha-256, meaning one-way sha-256 hash

SHA-256 is a recent addition and is not supported on all devices yet.

Globbing some users


You must have an SNMP read-only or read-write string and access to the SNMP port (udp/161) for this to work:

$ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.2011.10.2.12.1.1.1

or

$ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.25506.2.12.1.1.1

Weaponizing


Files relevant to this disclosure:

hh3c-localuser-enum.rb - Metasploit auxiliary scanner module snmp-h3c-login.nse - Nmap Scripting Engine module

These will soon be posted to https://github.com/grutz/h3c-pt-tools and requested to be added to each tool.

Mitigation


By itself this is already bad but most users who do any of the following may already be protected:

  1. Use complex SNMP community strings or disable SNMPv1
  2. Have disabled the mib entries for (h)h3c-user
  3. Do not define local users, use RADIUS or TACACS+

More specific routines can be found in the vendor's release.

Why this is a bigger problem


People make poor choices. They like to think their equipment won't rat them out so they use cleartext passwords on networking equipment.

The cipher is an interesting one because it's basically an unknown... What, you think the only thing I had to share at Toorcon was SNMP and some cleartext credentials?

Timeline


June-ish 2012: Research begins after seeing something cool on a penetration test

August 6, 2012: Contacted US-CERT to coordinate vendor disclosure, VU#225404

September 5, 2012: No response from H3C, contacted US-CERT again

September 6, 2012: H3C (through US-CERT) requests more time, I state intention to present findings at Toorcon (Oct 19/20, 2012) or disclose if talk not accepted.

September 18, 2012: Approved for Toorcon! Information goes up not long after on Toorcon website.

September 18-October 16, 2012: Build slides, work on tools, no contact with US-CERT or vendors.

October 16, 2012: HP contacts me directly asking that I not present this information at Toorcon

October 18, 2012: Publicly state agreement to cancel the Toorcon talk

October 22, 2012: HP discloses! What what? Why bother putting any pressure not to give the talk if you're gonna give everything out 2 days later?

October 23, 2012: So I publish. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03515685

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03515685 Version: 2

HPSBHF02819 SSRT100920 rev.2 - HP, 3COM, and H3C Routers & Switches, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2012-10-25 Last Updated: 2012-10-25

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP, 3COM, and H3C routers and switches. The vulnerabilities could be remotely exploited resulting in disclosure of information.

For more information, refer to CERT VU#225404 on the CERT website.

References: SSRT100962, CVE-2012-3268, CERT VU#225404

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Vendor Product Name Product Number

HP 10500/7500 Advanced VPN Firewall Module JD249A

H3C S7500E SecBlade VPN Firewall Module 0231A832, LSQ1FWBSC0

HP 10504 Switch Chassis JC613A

HP 10508 Switch Chassis JC612A

HP 10508-V Switch Chassis JC611A

HP 10512 Switch Chassis JC748A

HP 12500 VPN Firewall Module JC635A

HP 12508 DC Switch Chassis JC652A

HP 12508 Switch Chassis JC086A

H3C S12508 Chassis 0235A38N

HP 12508 Switch Chassis JF431A

HP A12508 Switch Chassis

H3C S12508 Chassis 0235A0E6

HP 12508 Switch Chassis JF431B

HP A12508 Switch Chassis

H3C S12508 (AC-1) Routing Switch 0235A0GE

HP 12508 Switch Chassis JF431C

HP 12518 DC Switch Chassis JC653A

HP 12518 DC Switch Chassis JC653A

HP 12518 Switch Chassis JC085A

HP A12518 Switch Chassis

H3C S12518 Chassis 0235A38M

HP 12518 Switch Chassis JF430A

HP A12518 Switch Chassis

H3C S12518 Chassis 0235A0E7

HP 12518 Switch Chassis JF430B

HP A12518 Switch Chassis

H3C S12518 (AC-1) Routing Switch 0235A0GF

HP 12518 Switch Chassis JF430C

HP 1910-16G Switch JE005A

3Com Baseline Plus 2900G Switch - 20 port 3CRBSG2093

HP 1910-24G Switch JE006A

3Com Baseline Plus 2900G Switch - 28 port 3CRBSG2893

HP 1910-24G-PoE (365W) Switch JE007A

3Com Baseline Plus 2900G Switch - 28HPWR 3CRBSG28HPWR93

HP 1910-24G-PoE (170W) Switch JE008A

HP V1910-24G-PoE (170W) Switch

3Com Baseline Plus 2900G Switch - 28PWR 3CRBSG28PWR93

HP 1910-48G Switch JE009A

3Com Baseline Plus 2900 Switch Gigabit Family - 52 port 3CRBSG5293

HP 1910-8G Switch JG348A

HP 1910-8G-PoE+ (180W) Switch JG350A

HP 1910-8G-PoE+ (65W) Switch JG349A

HP 200-CS UTM Appliance JD268A

H3C SecPath U200-CS 0235A0CT

HP 200-M UTM Appliance JD274A

HP 3000-10G-PoE+ Wireless Switch JD450A

HP A3000-10G-PoE+ Wireless Switch

H3C WX3010,8 PoEPlus 0235A37U

HP 3000-24G-PoE+ Wireless Switch JD449A

HP A3000-24G-PoE+ Wireless Switch

H3C WX3024,4SFPCombo Plus Slot Plus PoEPlus 0235A37T

HP 3000-8G-PoE+ Wireless Switch JD444A

H3C WX3008, 4 POE Plus 0235A0AS

HP 3012 Router JD916A

3Com 3012 Router 3C13612

HP 3013 Router JD917A

3Com 3013 Router 3C13613

HP 3016 Router JD918A

3Com 3016 Router 3C13616

HP 3036 Router JD921A

3Com 3036 Router 3C13636

HP 3040 Router JD922A

3Com 3040 Router 3C13640

HP 3041 Router JD923A

3Com 3041 Router 3C13641

HP 3100-16 DC EI Switch JD314A

HP A3100-16 DC EI Switch

H3C S3100-16TP-EI - model LS-3100-16TP-EI-H3-D-O 0235A23H

HP 3100-16 EI Switch JD319A

H3C S3100-16TP-EI - model LS-3100-16TP-EI-H3-A-O 0235A300

HP 3100-16 SI Switch JD305A

H3C S3100-16T-SI - model LS-S3100-16T-SI-AC-OVS 0235A15C

HP 3100-16 v2 EI Switch JD319B

HP 3100-16 v2 SI Switch JG222A

HP 3100-16-PoE EI Switch JD312A

H3C S3100-16TP-PWR-EI - model LS-3100-16TP-PWR-EI-H3 0235A19C

HP 3100-24 DC EI Switch JD315A

HP A3100-24 DC EI Switch

H3C S3100-26TP-EI - model LS-3100-26TP-EI-H3-D-O 0235A23P

HP 3100-24 EI Switch JD320A

HP A3100-24 EI Switch

H3C S3100-26TP-EI - model LS-3100-26TP-EI-H3-A-O 0235A301

HP 3100-24 SI Switch JD306A

HP A3100-24 SI Switch

H3C S3100-26T-SI - model LS-S3100-26T-SI-AC-OVS 0235A15D

HP 3100-24 v2 EI Switch JD320B

HP 3100-24 v2 SI Switch JG223A

HP 3100-24-PoE EI Switch JD313A

HP A3100-24-PoE EI Switch

H3C S3100-26TP-PWR-EI - model LS-3100-26TP-PWR-EI-H3 0235A19D

HP 3100-24-PoE v2 EI Switch JD313B

HP 3100-48 Switch JD317A

H3C S3100-52P - model LS-3100-52P-OVS-H3 0235A248

HP 3100-48 v2 Switch JG315A

HP 3100-8 DC EI Switch JD316A

H3C S3100-8TP-EI - model LS-3100-8TP-EI-H3-D-O 0235A23T

HP 3100-8 EI Switch JD318A

H3C S3100-8TP-EI - model LS-3100-8TP-EI-H3-A-O 0235A29Y

HP 3100-8 SI Switch JD304A

HP A3100-8 SI Switch

H3C S3100-8T-SI - model LS-S3100-8T-SI-AC-OVS 0235A15B

HP 3100-8 SI Switch JD307A

H3C S3100-8C-SI - model LS-S3100-8C-SI-AC-OVS 0235A15F

HP 3100-8 v2 EI Switch JD318B

HP 3100-8 v2 SI Switch JG221A

HP 3100-8-PoE EI Switch JD311A

H3C S3100-8TP-PWR-EI - model LS-3100-8TP-PWR-EI-H3 0235A19B

HP 3600-24 EI Switch JD331A

HP A3600-24 EI Switch

H3C S3600-28P-EI - model LS-3600-28P-EI-OVS 0235A10H

HP 3600-24 SI Switch JD330A

HP A3600-24 SI Switch

H3C S3600-28P-SI - model LS-3600-28P-SI-OVS 0235A10G

HP 3600-24 v2 EI Switch JG299A

HP 3600-24 v2 SI Switch JG304A

HP 3600-24-PoE EI Switch JD326A

HP A3600-24-PoE EI Switch

H3C S3600-28P-PWR-EI - model LS-3600-28P-PWR-EI-OVS 0235A10C

HP 3600-24-PoE SI Switch JD325A

HP A3600-24-PoE SI Switch

H3C S3600-28P-PWR-SI - model LS-3600-28P-PWR-SI-OVS 0235A10B

HP 3600-24-PoE+ v2 EI Switch JG301A

HP 3600-24-SFP EI Switch JD334A

HP A3600-24-SFP EI Switch

H3C S3600-28F-EI - model LS-3600-28F-EI-OVS 0235A10L

HP 3600-24-SFP v2 EI Switch JG303A

HP 3600-24TP SI Switch JD329A

HP A3600-24TP SI Switch

H3C S3600-28TP-SI - model LS-3600-28TP-SI-OVS 0235A10F

HP 3600-48 EI Switch JD333A

HP A3600-48 EI Switch

H3C S3600-52P-EI - model LS-3600-52P-EI-OVS 0235A10K

HP 3600-48 SI Switch JD332A

H3C S3600-52P-SI - model LS-3600-52P-SI-OVS 0235A10J

HP 3600-48 v2 EI Switch JG300A

HP 3600-48 v2 SI Switch JG305A

HP 3600-48-PoE EI Switch JD328A

HP A3600-48-PoE EI Switch

H3C S3600-52P-PWR-EI - model LS-3600-52P-PWR-EI-OVS 0235A10E

HP 3600-48-PoE SI Switch JD327A

HP A3600-48-PoE SI Switch

H3C S3600-52P-PWR-SI - model LS-3600-52P-PWR-SI-OVS 0235A10D

HP 3600-48-PoE+ v2 EI Switch JG302A

HP 3600-48-PoE+ v2 SI Switch JG307A

HP 3610-24-2G-2G-SFP Switch JD337A

HP A3610-24-2G-SFP Switch

H3C S3610-28TP - model LS-3610-28TP-OVS 0235A22E

HP 3610-24-4G-SFP Switch JD336A

HP A3610-24-4G Switch

H3C S3610-28P - model LS-3610-28P-OVS 0235A22D

HP 3610-24-SFP Switch JD338A

HP A3610-24-SFP Switch

H3C S3610-28F - model LS-3610-28F-OVS 0235A22F

HP 3610-48 Switch JD335A

HP A3610-48 Switch

H3C S3610-52P - model LS-3610-52P-OVS 0235A22C

HP 4200-12G Switch JE015A

HP E4200-12G Switch

3Com 4200G Switch 12-Port 3CR17660-91

HP 4210-16 Switch JE024A

HP E4210-16 Switch

3Com 4210 Switch 18-Port 3CR17332-91

HP 4210-16 Switch JE025A

3Com SWITCH 4210 18-Port 3CR17332A-91

HP 4210-24 Switch JE026A

3Com 4210 Switch 26-Port 3CR17333-91

HP 4210-24 Switch JF427A

HP E4210-24 Switch

3Com 4210 Switch 26-Port 3CR17333A-91

HP 4210-24G Switch JF844A

HP E4210-24G Switch

3Com 4210-24G Switch 3CRS42G-24-91

HP 4210-24G-PoE Switch JF846A

HP E4210-24G-PoE Switch

3Com Switch E4210-24G-PoE 3CRS42G-24P-91

HP 4210-24-PoE Switch JE032A

3Com 4210 Switch PWR 26-Port 3CR17343-91

HP 4210-24-PoE Switch JE033A

3Com 4210 PWR Switch 26-Port 3CR17343A-91

HP 4210-48 Switch JE027A

3Com 4210 Switch 52-Port 3CR17334-91

HP 4210-48G Switch JF845A

HP E4210-48G Switch

3Com 4210-48G Switch 3CRS42G-48-91

HP 4210-8 Switch JE021A

3Com 4210 Switch 9-Port 3CR17331-91

HP 4210-8 Switch JE022A

3Com 4210 Switch 9-Port 3CR17331A-91

HP 4210-8-PoE Switch JE028A

3Com 4210 PWR Switch 9-Port 3CR17341-91

HP 4210-8-PoE Switch JE029A

3Com 4210 PWR Switch 9-Port 3CR17341A-91

HP 4500-24 Switch JE045A

3Com 4500 Switch 26-Port 3CR17561-91

HP 4500-24G-PoE Switch JE061A

3Com 4500G PWR Switch 24-Port 3CR17771-91

HP 4500-24-PoE Switch JE047A

3Com 4500 PWR Switch 26-Port 3CR17571-91

HP 4500-48 Switch JE046A

3Com 4500 Switch 50-Port 3CR17562-91

HP 4500-48G-PoE Switch JE063A

HP E4500-48G-PoE Switch

3Com 4500G PWR Switch 48-Port 3CR17772-91

HP 4500-48-PoE Switch JE048A

3Com 4500 PWR Switch 50-Port 3CR17572-91

HP 4510-24G Switch JF847A

HP E4510-24G Switch

3Com Switch E4510-24G 3CRS45G-24-91

HP 4510-48G Switch JF428A

HP E4510-48G Switch

3Com 4510G Switch 48 Port 3CRS45G-48-91

HP 4800-24G Switch JD007A

3Com 4800G Switch 24-Port 3CRS48G-24-91

HP 4800-24G-PoE Switch JD008A

3Com 4800G PWR Switch 24-Port 3CRS48G-24P-91

HP 4800-24G-SFP Switch JD009A

HP E4800-24G-SFP Switch

3Com 4800G Switch 24-Port SFP 3CRS48G-24S-91

HP 4800-48G Switch JD010A

3Com 4800G Switch 48-Port 3CRS48G-48-91

HP 4800-48G-PoE Switch JD011A

3Com 4800G PWR Switch 48-Port 3CRS48G-48P-91

HP 5012 Router JD935A

3Com 5012 Router 3C13701

HP 5120-16G SI Switch JE073A

H3C S5120-20P-SI L2, 16GE Plus 4SFP 0235A42B

HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots JG245A

HP 5120-24G SI Switch JE074A

H3C S5120-28P-SI 24GE Plus 4 SFP 0235A42D

HP 5120-24G-PoE+ (170W) SI Switch JG092A

H3C S5120-28P-PWR-SI 0235A0E3

HP 5120-24G-PoE+ (370W) SI Switch JG091A

H3C S5120-28P-HPWR-SI 0235A0E5

HP 5120-24G-PoE+ EI Switch with 2 Interface Slots JG236A

HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots JG247A

HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots JG246A

HP 5120-48G SI Switch JE072A

HP A5120-48G SI Switch

H3C S5120-52P-SI 48GE Plus 4 SFP 0235A41W

HP 5120-48G-PoE+ EI Switch with 2 Interface Slots JG237A

HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots JG248A

HP 5232 Router JD943A

3Com 5232 Router 3C13751

HP 5500-24G DC EI Switch JD373A

H3C S5500-28C-EI-DC,Ethernet Switch 0235A24S

HP 5500-24G EI Switch JD377A

H3C S5500-28C-EI,Ethernet Switch 0235A253

HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots JG250A

HP 5500-24G SI Switch JD369A

H3C S5500-28C-SI,Ethernet Switch 0235A04U

HP 5500-24G-4SFP HI Switch with 2 Interface Slots JG311A

HP 5500-24G-PoE EI Switch JD378A

H3C S5500-28C-PWR-EI,Ethernet Switch 0235A255

HP 5500-24G-PoE SI Switch JD371A

H3C S5500-28C-PWR-SI,Ethernet Switch 0235A05H

HP 5500-24G-PoE+ EI Switch with 2 Interface Slots JG241A

HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots JG252A

HP 5500-24G-PoE+ SI Switch with 2 Interface Slots JG238A

HP 5500-24G-SFP DC EI Switch JD379A

H3C S5500-28F-EI,Eth Swtch,DC Single Pwr 0235A259

HP 5500-24G-SFP EI Switch JD374A

H3C S5500-28F-EI,Eth Switch,AC Single 0235A24U

HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface Slots JG249A

HP 5500-48G EI Switch JD375A

H3C S5500-52C-EI,Ethernet Switch 0235A24X

HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots JG251A

HP 5500-48G SI Switch JD370A

H3C S5500-52C-SI,Ethernet Switch 0235A04V

HP 5500-48G-4SFP HI Switch with 2 Interface Slots JG312A

HP 5500-48G-PoE EI Switch JD376A

H3C S5500-52C-PWR-EI,Ethernet Switch 0235A251

HP 5500-48G-PoE SI Switch JD372A

H3C S5500-52C-PWR-SI,Ethernet Switch 0235A05J

HP 5500-48G-PoE+ EI Switch with 2 Interface Slots JG240A

HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots JG253A

HP 5500-48G-PoE+ SI Switch with 2 Interface Slots JG239A

HP 5500G-24 EI 10/100/1000 No Power Supply Unit Switch JF551A

3Com SS4 5500G-EI Switch 24PT (NO PSU) 3CR17254-91

HP 5500G-24 EI SFP No Power Supply Unit Switch JF553A

3Com SS4 5500G-EI 24 Port,SFP (NO PSU) 3CR17259-91

HP 5500G-48 EI 10/100/1000 No Power Supply Unit Switch JF552A

3Com SS4 5500G-EI Switch 48PT (NO PSU) 3CR17255-91

HP 5682 Router JD946A

3Com 5682 Router 3C13759

HP 5800-24G Switch JC100A

H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot 0235A36U

HP 5800-24G TAA-compliant Switch JG255A

HP 5800-24G-PoE Switch JC099A

H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP Plus ) Plus 1 media module, PoE 0235A36S

HP 5800-24G-PoE+ TAA-compliant Switch JG254A

HP 5800-24G-SFP Switch JC103A

H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus media module (no power) 0235A374

HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot JG256A

HP 5800-48G Switch JC105A

H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus ) Plus media module 0235A379

HP 5800-48G Switch with 2 Slots JC101A

H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM 0235A36W

HP 5800-48G TAA-compliant Switch with 1 Interface Slot JG258A

HP 5800-48G-PoE Switch JC104A

H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module 0235A378

HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot JG257A

HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots JG242A

HP 5800AF-48G Switch JG225A

HP 5810-48G Switch JF242A

HP A5810-48G with 2 SFP+ slots AC Switch

H3C S5810 48-BT, 2 SFP Plus , AC 0235A42H

HP 5820 VPN Firewall Module JD255A

HP A5820 VPN Firewall Module

H3C S5820 SecBlade VPN Firewall Module LSWM1FW10, 0231A94J

HP 5830 CTO Built Switch JG478A

HP 5830AF-48G Switch with 1 Interface Slot JC691A

HP 5830AF-96G Switch JC694A

HP 6600 Firewall Processing Router Module JD250A

HP A6600 Firewall Processing Module

H3C SR66 Gigabit Firewall Module 0231A88A

HP 6600 RPE-X1 Router Module JC165A

HP A6600 RPE-X1 Main Processing Unit

H3C RT-SR66-RPE-X1-H3 RPE-X1, 0231A761

HP 6600 RSE-X1 Router Main Processing Unit JC566A

HP 6602 Router Chassis JC176A

HP A6602 Router

H3C SR6602 1U Router Host 0235A27D

HP 6604 Router Chassis JC178A

HP A6604 Router Chassis

H3C RT-SR6604-OVS-H3 0235A37X

HP 6604 Router Chassis JC178B

HP 6608 Router JC177A

HP A6608 Router

H3C RT-SR6608-OVS-H3 0235A32X

HP 6608 Router Chassis JC177B

HP 6616 Router Chassis JC496A

HP A6616 Router Chassis

H3C SR6616 Router Chassis 0235A41D

HP 7500 384Gbps Fabric Module JD194A

HP A7500 384Gbps Fabric/Main Processing Unit

H3C S7500E 384 Gbps Fabric 0231A73K

HP 7500 384Gbps Fabric Module with 2 XFP Ports JD193A

HP A7500 384Gbps Fabric/Main Processing Unit with 2 10GbE XFP Ports

H3C S7500E 384 Gbps Fabric w/ 2-port 10GBASE-X (XFP) 0231A73J

HP 7500 384Gbps Fabric Module with 2 XFP Ports JD193B

HP A7500 384Gbps Fabric/Main Processing Unit with 2 10GbE XFP Ports

H3C S7500E Salience VI-10G Switch and Route Processing Unit,with 2 XFP Interfaces LSQ1SRP2XB0, 0231A0KW

HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit JC700A

HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports JC699A

HP 7500 768Gbps Fabric Module JD220A

HP A7510 768Gbps Fabric/Main Processing Unit

H3C S7510E 768 Gbps Fabric LSQ1SRPD0, 0231A86P

HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit JC701A

HP A7510 768Gbps TAA-compliant Fabric/Main Processing Unit

HP 7502 Switch Chassis JD242A

HP A7502 Switch Chassis

H3C S7502E Chassis w/ fans 0235A29A

HP 7502 Switch Chassis JD242B

H3C S7502E Ethernet Switch Chassis with Fan 0235A0G4

HP 7502 TAA-compliant Main Processing Unit JC697A

HP A7502 TAA-compliant Main Processing Unit

HP 7503 Switch Chassis JD240A

HP A7503 Switch Chassis

H3C S7503E Chassis w/ fans 0235A27R

HP 7503 Switch Chassis JD240B

HP A7503 Switch Chassis

H3C S7503E Ethernet Switch Chassis with Fan 0235A0G2

HP 7503 Switch Chassis with 1 Fabric Slot JD243A

HP A7503-S Switch Chassis

H3C S7503E-S Chassis w/ fans 0235A33R

HP 7503 Switch Chassis with 1 Fabric Slot JD243B

H3C S7503E-S Ethernet Switch Chassis with Fan 0235A0G5

HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo JC666A

HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports JC698A

HP 7506 Switch Chassis JD239A

HP A7506 Switch Chassis H3C S7506E Chassis w/ fans 0235A27Q

HP 7506 Switch Chassis JD239B

HP A7506 Switch Chassis

H3C S7506E Ethernet Switch Chassis with Fan 0235A0G1

HP 7506 Vertical Switch Chassis JD241A

HP A7506-V Switch Chassis

H3C S7506E-V Chassis w/ fans 0235A27S

HP 7506 Vertical Switch Chassis JD241B

HP A7506-V Switch Chassis

H3C S7506E-V Ethernet Switch Chassis with Fan 0235A0G3

HP 7510 Switch Chassis JD238A

HP A7510 Switch Chassis

H3C S7510E Chassis w/ fans 0235A25N

HP 7510 Switch Chassis JD238B

HP A7510 Switch Chassis

H3C S7510E Ethernet Switch Chassis with Fan 0235A0G0

HP 8800 Firewall Processing Module JD251A

H3C SR88 Firewall Processing Module 0231A88L

HP 8802 Router Chassis JC147A

HP A8802 Router Chassis

H3C SR8802 10G Core Router Chassis 0235A31B

HP 8802 Router Chassis JC147B

HP A8802 Router Chassis

H3C SR8802 10G Core Router Chassis 0235A0GC

HP 8805 Router Chassis JC148A

HP A8805 Router Chassis

H3C SR8805 10G Core Router Chassis 0235A31C

HP 8805 Router Chassis JC148B

HP A8805 Router Chassis

H3C SR8805 10G Core Router Chassis 0235A0G8

HP 8807 7-slot Chassis Kit JE203A

3Com 8807 Switch 7-slot Chassis Kit 3C17543

HP 8807 Kit (TAA) Switch JE204A

3Com SW8807 Kit TAA 3C17543TAA

HP 8808 Router Chassis JC149A

HP A8808 Router Chassis

H3C SR8808 10G Core Router Chassis 0235A31D

HP 8808 Router Chassis JC149B

HP A8808 Router Chassis

H3C SR8808 10G Core Router Chassis 0235A0G9

HP 8810 10-slot AC (TAA) Chassis Kit JE201A

3Com SW8810 AC Chassis Kit TAA 3C17541TAA

HP 8810 10-slot Chassis Kit JE200A

3Com 8810 Switch 10-slot Chassis Kit 3C17541

HP 8812 Router Chassis JC150A

HP A8812 Router Chassis

H3C SR8812 10G Core Router Chassis 0235A31E

HP 8812 Router Chassis JC150B

HP A8812 Router Chassis

H3C SR8812 10G Core Router Chassis 0235A0GA

HP 8814 14-slot AC (TAA) Chassis Kit JE199A

3Com SW8814 AC Chassis Kit TAA 3C17540TAA

HP 8814 14-slot Chassis Kit JE198A

3Com 8814 Switch 14-slot Chassis Kit 3C17540

HP 9500 VPN Firewall Module JD245A

H3C S9500E SecBlade VPN Firewall Module LSR1FW2A1, 0231A0AV

HP 9505 Switch Chassis JC124B

HP A9505 Switch Chassis

H3C S9505E Routing-Switch Chassis 0235A0G6

HP 9508-V Switch Chassis JC474A

H3C S9508E-V Routing-Switch Chassis 0235A38Q

HP 9508-V Switch Chassis JC474B

H3C S9508E-V Routing-Switch Chassis 0235A38Q

HP 9512 Switch Chassis JC125A

HP A9512 Switch Chassis

H3C S9512E Chassis w/ Fans 0235A38R

HP 9512 Switch Chassis JC125B

HP A9512 Switch Chassis

H3C S9512E Routing-Switch Chassis 0235A0G7

HP A3100 (LS6MCFL1UB) Ethernet Switch JE545A

H3C S3100 Ethernet Switch,LS6MCFL1UB,Sin 0231A65T

HP A3100-16 DC SI 2-slot Switch JD302A

H3C S3100-16C-SI - model LS-S3100-16C-SI-DC-OVS 0235A14V

HP A3100-16 SI with 2 External Slots Switch JD308A

H3C S3100-16C-SI - model LS-S3100-16C-SI-AC-OVS 0235A15G

HP A3100-24 DC SI 2-slot Switch JD303A

H3C S3100-26C-SI - model LS-S3100-26C-SI-DC-OVS 0235A14W

HP A3100-24 SI 2-slot Switch JD309A

H3C S3100-26C-SI - model LS-S3100-26C-SI-AC-OVS 0235A15H

HP A3100-26C-EPON-EI Switch JG059A

HP A3100-8 SI 1-slot Switch JD310A

H3C S3100-8C-SI - model LS-S3100-8C-SI-DC-OVS 0235A15J

HP A5100-16G EI Switch JD351A

H3C S5100-16P-EI - model LS-5100-16P-EI-OVS-H3 0235A21Q

HP A5100-16G SI Switch JD356A

H3C S5100-16P-SI - model LS-5100-16P-SI-OVS-H3 0235A22R

HP A5100-16G-PoE EI Switch JD353A

H3C S5100-16P-PWR-EI - model LS-5100-16P-PWR-EI-OVS 0235A22K

HP A5100-24G EI Switch JD346A

H3C S5100-24P-EI - model LS-5100-24P-EI-OVS 0235A08K

HP A5100-24G EI Switch with SFP Uplink JD344A

H3C S5100-26C-EI - model LS-5100-26C-EI-OVS 0235A08F

HP A5100-24G SI Switch JD348A

H3C S5100-24P-SI - model LS-5100-24P-SI-OVS-H3 0235A20Q

HP A5100-24G-PoE EI Switch JD354A

H3C S5100-26C-PWR-EI - model LS-5100-26C-PWR-EI-OVS 0235A22M

HP A5100-48G EI Switch JD347A

H3C S5100-48P-EI - model LS-5100-48P-EI-OVS 0235A08M

HP A5100-48G EI Switch with SFP Uplink JD345A

H3C S5100-50C-EI - model LS-5100-50C-EI-OVS 0235A08H

HP A5100-48G SI Switch JD349A

H3C S5100-48P-SI - model LS-5100-48P-SI-OVS-H3 0235A20R

HP A5100-48G-PoE EI Switch JD355A

H3C S5100-50C-PWR-EI - model LS-5100-50C-PWR-EI-OVS 0235A22P

HP A5100-8G EI Switch JD350A

H3C S5100-8P-EI - model LS-5100-8P-EI-OVS-H3 0235A21P

HP A5100-8G SI Switch JD357A

H3C S5100-8P-SI - model LS-5100-8P-SI-OVS-H3 0235A22T

HP A5100-8G-PoE EI Switch JD352A

H3C S5100-8P-PWR-EI - model LS-5100-8P-PWR-EI-OVS 0235A22H

HP A5120-24G EI Switch JE066A

H3C S5120-24P-EI 24GE Plus 4ComboSFP 0235A0BQ

HP A5120-24G EI Switch with 2 Interface Slots JE068A

H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt 0235A0BS

HP A5120-24G-PoE EI 2-slot Switch JE070A

H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE 0235A0BU

HP A5120-48G EI Switch JE067A

H3C S5120-48P-EI 48GE Plus 4ComboSFP 0235A0BR

HP A5120-48G EI Switch with 2 Interface Slots JE069A

H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt 0235A0BT

HP A5120-48G-PoE EI 2-slot Switch JE071A

H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE 0235A0BV

HP A6604 Router Bundle with RPE-X1 Modules and Power Supply JE528A

H3C SR6604 Router Bundle with RPE-X1 and Pow 0150A12B

HP A6604 Router with 2 RPE-X1 Modules JC158A

H3C RT-SR6604-OVS Plus 2 RPE-X1 Plus 2 AC-H3 0150A12C

HP A6608 Router (RT-SR6608-OVS+2 RPE-X1+2 AC-H3) Bundle JE527A

H3C RT-SR6608-OVS Plus 2 RPE-X1 Plus 2 AC-H3 0150A12A

HP A6608 Router Bundle with RPE-X1 Modules and Power Supply JE526A

H3C SR6608 Router Bundle with RPE-X1 and Pow 0150A129

HP A9508 Switch Chassis JC124A

H3C S9505E Chassis w/ Fans 0235A38P

HP A-MSR20-15 A Multi-service Router JD670A

H3C MSR 20-15 A 0235A31Q

HP A-MSR20-15 AW Multi-service Router JD671A

H3C MSR 20-15 A W 0235A31R

HP A-MSR20-15 I Multi-service Router JD672A

H3C MSR 20-15 I 0235A31N

HP A-MSR20-15 IW Multi-service Router JD667A

H3C MSR 20-15 IW 0235A31P

HP A-MSR20-21 Router JD432A

H3C MSR-20-21 Router 0235A19J

HP A-MSR20-21 Router JD663A

H3C MSR 20-21 0235A325

HP A-MSR30-20 Multi-service Router Security Bundle JF286A

H3C MSR 30-20 Router Host RTVZ33020AS, 0235A20S

HP A-MSR30-40, RT-MSR3040-AC-OVS-AS-H3 Multi-service Router JF232A

H3C RT-MSR3040-AC-OVS-AS-H3 0235A20V

HP AR 18-31E Router JD172A

H3C AR18-31E Router 0235A09T

HP E4200-24 SI Switch JE013A

3Com 4200-SI Switch 28 Port 3C17304A

HP E4200-24G Switch JE016A

3Com 4200G Switch 24-Port 3CR17661-91

HP E4200-24G-PoE Switch JE020A

3Com 4200G Switch PWR 24-Port 3CR17671-91

HP E4200-48 SI Switch JE012A

3Com 4200-SI Switch 50 Port 3C17302A

HP E4200-48G Switch JE018A

3Com 4200G Switch 48-Port 3CR17662-91

HP E4210 8-port (TAA) Switch JE023A

3Com 4210 Switch 9-Port TAA 3CR17331TAA-91

HP E4210-16-PoE Switch JE031A

3Com 4210 Switch PWR 18-Port 3CR17342-91

HP E4210-8-PoE (TAA) Switch JE030A

3Com 4210 Switch PWR 9P TAA 3CR17341TAA-91

HP E4500-24G (TAA) Switch JE058A

3Com 4500G Switch 24-Port TAA 3CR17761TAA-91

HP E4500-24G Switch JE057A

3Com 4500G Switch 24-Port 3CR17761-91

HP E4500-24G-PoE (TAA) Switch JE062A

3Com 4500G PWR Switch 24-Port TAA 3CR17771TAA-91

HP E4500-48G (TAA) Switch JE060A

3Com 4500G Switch 48-Port TAA 3CR17762TAA-91

HP E4500-48G Switch JE059A

3Com 4500G Switch 48-Port 3CR17762-91

HP E4500-48G-PoE (TAA) Switch JE064A

3Com 4500G PWR Switch 48-Port TAA 3CR17772TAA-91

HP E5500-24 EI (TAA) Switch JE102A

3Com TAA 5500-EI Switch 28-Port 3CR17161TAA-91

HP E5500-24 SI Switch JE099A

3Com SS4 5500-SI Switch 28 Port 3CR17151-91

HP E5500-24 Switch JE101A

3Com 5500-EI Switch 28-Port 3CR17161-91

HP E5500-24G (TAA) Switch JE089A

3Com TAA COMPLIANT 5500G-EI 24-Port 3CR17250TAA-91

HP E5500-24G Switch JE088A

3Com 5500G-EI Switch 24 Port 3CR17250-91

HP E5500-24G-PoE (TAA) Switch JE093A

3Com TAA COMPLIANT 5500G-EI PWR 24P 3CR17252TAA-91

HP E5500-24G-PoE Switch JE092A

3Com 5500G-EI Switch PWR 24-Port 3CR17252-91

HP E5500-24G-SFP (TAA) Switch JE097A

3Com TAA COMPLIANT 5500G-EI SFP 24P 3CR17258TAA-91

HP E5500-24G-SFP Switch JE096A

3Com 5500G-EI Switch SFP 24-Port 3CR17258-91

HP E5500-24-PoE EI (TAA) Switch JE106A

3Com TAA 5500-EI PWR Switch 28-Port 3CR17171TAA-91

HP E5500-24-PoE Switch JE105A

3Com 5500-EI PWR Switch 28-Port 3CR17171-91

HP E5500-24-SFP Switch JE109A

3Com 5500-EI Switch 28-Port FX 3CR17181-91

HP E5500-24-SPF EI (TAA) Switch JE110A

3Com TAA SWITCH 5500-EI 28-Port FX 3CR17181TAA-91

HP E5500-48 EI (TAA) Switch JE104A

3Com TAA SWITCH 5500-EI 52-Port 3CR17162TAA-91

HP E5500-48 SI Switch JE100A

3Com SS4 SWITCH 5500-SI 52 Port 3CR17152-91

HP E5500-48 Switch JE103A

3Com 5500-EI Switch 52-Port 3CR17162-91

HP E5500-48G (TAA) Switch JE091A

3Com TAA COMPLIANT 5500G-EI 48-Port 3CR17251TAA-91

HP E5500-48G Switch JE090A

3Com 5500G-EI Switch 48-Port 3CR17251-91

HP E5500-48G-PoE (TAA) Switch JE095A

3Com TAA COMPLIANT 5500G-EI PWR 48P 3CR17253TAA-91

HP E5500-48G-PoE Switch JE094A

3Com 5500G-EI PWR Switch 48-Port 3CR17253-91

HP E5500-48-PoE EI (TAA) Switch JE108A

3Com TAA 5500-EI PWR Switch 52-Port 3CR17172TAA-91

HP E5500-48-PoE Switch JE107A

3Com 5500-EI PWR Switch 52-Port 3CR17172-91

HP E7902 Switch Chassis JE164A

3Com S7902E Chassis Kit w/ fans 3CS7902E

HP E7903 1 Fabric Slot Switch Chassis JE166A

3Com S7903E-S Chassis Kit w/ fans 3CS7903ES

HP E7903 Switch Chassis JE165A

3Com S7903E Chassis Kit w/ fans 3CS7903E

HP E7906 Switch Chassis JE167A

3Com S7906E Chassis Kit w/ fans 3CS7906E

HP E7906 Vertical Switch Chassis JE168A

3Com S7906E-V Chassis Kit w/ fans 3CS7906EV

HP F1000-E VPN Firewall Appliance JD272A

H3C F1000-E VPN Firewall 0235A26G

HP F1000-EI VPN Firewall Appliance JG214A

HP F1000-S-EI VPN Firewall Appliance JG213A

HP F5000 Firewall Main Processing Unit JG215A

HP MSR 50-40 Router JD655A

H3C MSR 50-40 Chassis 0235A20N

HP MSR20-10 Router JD431A

H3C MSR 20-10 0235A0A7

HP MSR20-11 Router JD673A

H3C MSR 20-11 0235A31V

HP MSR20-11 Router JF239A

H3C RT-MSR2011-AC-OVS-H3 0235A395

HP MSR20-12 Router JD674A

H3C MSR 20-12 0235A32E

HP MSR20-12 Router JF241A

H3C RT-MSR2012-AC-OVS-H3 0235A396

HP MSR20-12-T Router JD676A

H3C MSR 20-12 T1 0235A32B

HP MSR20-12-T Router JF806A

H3C RT-MSR2012-T-AC-OVS-H3 0235A398

HP MSR20-12-T-W Router (NA) JG209A

HP MSR20-12-W Router JD675A

H3C MSR20-12 W 0235A32G

HP MSR20-12-W Router JF807A

H3C RT-MSR2012-AC-OVS-W-H3 0235A397

HP MSR20-13 Router JD668A

H3C MSR 20-13 0235A31W

HP MSR20-13 Router JF240A

H3C RT-MSR2013-AC-OVS-H3 0235A390

HP MSR20-13-W Router JD669A

H3C MSR 20-13 W 0235A31X

HP MSR20-13-W Router JF808A

H3C RT-MSR2013-AC-OVS-W-H3 0235A391

HP MSR20-13-W Router (NA) JG210A

HP MSR20-15 Router JF817A

H3C MSR 20-15 Router Host (AC), 1 FE, 4 LSW, 1 ADSLoPOTS, 1 DSIC 0235A0A8

HP MSR20-15-A Router JF237A

H3C RT-MSR2015-AC-OVS-A-H3 0235A392

HP MSR20-15-A-W Router JF809A

H3C RT-MSR2015-AC-OVS-IW-H3 0235A38V

HP MSR20-15-I Router JF236A

H3C RT-MSR2015-AC-OVS-I-H3 0235A394

HP MSR20-15-I-W Router JF238A

H3C RT-MSR2015-AC-OVS-AW-H3 0235A393

HP MSR20-20 Router JD662A

HP A-MSR20-20 Router

H3C MSR 20-20 0235A19H

HP MSR20-20 Router JF283A

H3C RT-MSR2020-AC-OVS-H3C 0235A324

HP MSR20-21 Router JD663B

HP MSR20-40 Router JD664A

H3C MSR 20-40 0235A19K

HP MSR20-40 Router JF228A

H3C RT-MSR2040-AC-OVS-H3 0235A326

HP MSR30-10 DC Router JG184A

HP MSR30-10 Router JF816A

H3C MSR 30-10 Router Host (AC), 2FE, 2SIC, 1XMIM, 256DDR 0235A39H

HP MSR30-11 Router JF800A

H3C RT-MSR3011-AC-OVS-H3 0235A29L

HP MSR30-11E Router JG182A

HP MSR30-11F Router JG183A

HP MSR30-16 PoE Router JD659A

H3C MSR 30-16 POE 0235A238

HP MSR30-16 PoE Router JF234A

H3C RT-MSR3016-AC-POE-OVS-H3 0235A321

HP MSR30-16 Router JD665A

H3C MSR 30-16 0235A237

HP MSR30-16 Router JF233A

H3C RT-MSR3016-AC-OVS-H3 0235A327

HP MSR30-16 Router with VCX and 4-port FXO and 2-port FXS Modules JD025A

HP A-MSR30-16 Router with VCX and 4-port FXO and 2-port FXS Modules

3Com MSR 3016 VCX CPM 4FXO/2FXS Bundle 3CRBVCXMSR03A

HP MSR30-16 Router with VCX Enterprise Branch Communications MIM Module JD024A

HP A-MSR30-16 Router with VCX Ent MIM Module

3Com MSR 3016 VCX Ent MIM Bundle 3CRBVCXMSR02A

HP MSR30-20 DC Router JF235A

H3C RT-MSR3020-DC-OVS-H3 0235A267

HP MSR30-20 PoE Router JD660A

H3C MSR 30-20 POE 0235A239

HP MSR30-20 PoE Router JF802A

H3C RT-MSR3020-AC-POE-OVS-H3 0235A322

HP MSR30-20 Router JD666A

H3C MSR 30-20 0235A19L

HP MSR30-20 Router JF284A

H3C MSR 30-20 Router 0235A328

HP MSR30-40 DC Router JF287A

H3C MSR 30-40 Router Host (DC) 0235A268

HP MSR30-40 PoE Router JD661A

H3C MSR 30-40 POE 0235A25R

HP MSR30-40 PoE Router JF803A

H3C RT-MSR3040-AC-POE-OVS-H3 0235A323

HP MSR30-40 Router JD657A

H3C MSR 30-40 0235A20J

HP MSR30-40 Router JF229A

H3C RT-MSR3040-AC-OVS-H 0235A299

HP MSR30-40 Router with VCX and 8-port BRI and 4-port FXS Modules JD027A

3Com MSR 3040 VCX CPM 8BRI/4FXS Bundle 3CRBVCXMSR06A

HP MSR30-40 Router with VCX and 8-port FXO and 4-port FXS Modules JD026A

3Com MSR 3040 VCX CPM 8FXO/4FXS Bundle 3CRBVCXMSR05A

HP MSR30-40 Router with VCX and E1 and 4-port BRI and 4-port FXS Modules JD029A

HP A-MSR30-40 Router with VCX and E1 and 4-port BRI and 4-port FXS Modules

3Com MSR 3040 VCX CPM E1/4BRI/4FXS Bundle 3CRBVCXMSR08A

HP MSR30-40 Router with VCX and T1 and 4-port FX0 and 4-port FXS Modules JD028A

HP A-MSR30-40 Router with VCX and T1 and 4-port FX0 and 4-port FXS Modules

3Com MSR 3040 VCX CPM T1/4FXO/4FXS Bundle 3CRBVCXMSR07A

HP MSR30-40 Router with VCX MIM Module JD023A

3Com MSR 3040 VCX Ent MIM Bundle 3CRBVCXMSR01A

HP MSR30-60 DC Router JF801A

H3C RT-MSR3060-DC-OVS-H3 0235A269

HP MSR30-60 PoE Router JD654A

H3C MSR 30-60 POE 0235A25S

HP MSR30-60 PoE Router JF804A

H3C RT-MSR3060-AC-POE-OVS-H3 0235A296

HP MSR30-60 Router JD658A

H3C MSR 30-60 0235A20K

HP MSR30-60 Router JF230A

H3C RT-MSR3060-AC-OVS-H3 0235A320

HP MSR50-40 DC Router JF285A

HP A-MSR50-40 DC Router Chassis

H3C MSR5040-DC-OVS-H3C 0235A20P

HP MSR50-40 Router JD433A

H3C MSR 50-40 Router 0235A297

HP MSR50-60 Router JD656A

H3C MSR 50-60 Chassis 0235A20L

HP MSR50-60 Router JF231A

H3C RT-MSR5060-AC-OVS-H3 0235A298

HP MSR50-60 Router Chassis with DC Power Supply JF640A

HP MSR900 2-port FE WAN / 4 -port FE LAN Router JF812A

H3C MSR 900 Router, 2 FE WAN, 4 FE LAN, 256DDR 0235A0BX

HP MSR900-W Router JF814A

H3C MSR 900 Router with 802.11b/g, 2 FE WAN, 4 FE LAN, 256DDR, 802.11b 0235A0C2

HP MSR900-W Router (NA) JG207A

HP MSR920 2-port FE WAN / 8-port FE LAN / 802.11b/g Router JF815A

H3C MSR 920 Router with 802.11b/g, 2 FE WAN, 8 FE LAN, 256DDR 0235A0C4

HP MSR920 Router JF813A

H3C MSR 920 Router, 2 FE WAN, 8 FE LAN, 256DDR 0235A0C0

HP MSR920-W Router (NA) JG208A

HP 6040 Router Chassis JD967A

3Com 6040 Router Chassis 3C13840

HP 6080 Router Chassis JD972A

3Com 6080 Router Chassis 3C13880

HP S5600-26C Ethernet Switch JD393A

H3C S5600-26C Ethernet Switch 0235A11F

HP S5600-26C-PoE Ethernet Switch JD394A

H3C S5600-26C-PWR Ethernet Switch 0235A11G

HP S5600-26F Ethernet Switch JD395A

H3C S5600-26F Ethernet Switch 0235A11H

HP S5600-50C Ethernet Switch JD391A

H3C S5600-50C Ethernet Switch 0235A11D

HP S5600-50C PoE Ethernet Switch JD392A

H3C S5600-50C-PWR Ethernet Switch 0235A11E

HP S9502 (LS-9502-OVS-H3) Routing Switch Chassis JE551A

H3C LS-9502-OVS-H3 0235A21X

HP S9505 Routing Switch Chassis JC055A

H3C S9505 Routing Switch Chassis 0235A17A

HP S9508 Routing Switch Chassis JC054A

H3C S9508 Routing Switch Chassis 0235A16T

HP S9512 Routing Switch Chassis JC056A

H3C S9512 Routing Switch Chassis 0235A17B

HP U200-A UTM Appliance JD275A

HP A-U200-A Unified Threat Management Appliance

H3C SecPath U200-A 0235A36Q

HP U200-S UTM Appliance JD273A

HP A-U200-S Unified Threat Management Appliance

H3C SecPath U200-S 0235A36N

HP WX5002 Access Controller JD447A

H3C WX5002 Access Controller 0235A34B

HP WX5002 Access Controller JD447B

HP A-WX5002 Access Controller

H3C WX5002 Access Controller 0235A34B

HP WX5002 Access Controller JD468A

3Com WX 5002 Access Controller 3CRUWX500275

HP WX5004 Access Controller JD448A

HP A-WX5004 Access Controller

H3C WX5004 Access Controller 0235A35J

HP WX5004 Access Controller JD448B

HP A-WX5004 Access Controller

H3C WX5004 4-Port 1000BASE-X/1000BASE-T (Combo) Access Controller 0235A0GD

HP WX5004 Access Controller JD469A

3Com WX 5004 Access Controller 3CRUWX500475

HP WX6103 Access Controller Support up to 128 Access Points JF247A

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2012-3268 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks Kurt Grutzmacher (grutz@jingojango.net) and CERT/CC for reporting these vulnerabilities to security-alert@hp.com

RESOLUTION

If your product is listed as vulnerable, a software update to address this issue may be available for download.

Using a web browser, go to http://www.hp.com/networking/support .

Enter the product number or product description into Auto Search.

Select the displayed result and click ' Display selected '.

Click Software Downloads from the list of choices provided below.

There is a section called ' Early Availability ' which will contain software that addresses this issue. The descriptive text of the software should indicate SSRT100920 as a further indication that the software addresses this issue. There are important considerations about using Early Availability software:

Early Availability software is recommended for use in:

Lab testing prior to upgrading a production network

Evaluation of new features prior to general deployment

Evaluation with specific applications prior to wider deployment

Please evaluate this software thoroughly prior to deployment in a production environment.

If your product is listed as vulnerable and software is not available via the process outlined previously, you may contact HP Networking support directly by going to this URL: https://h10145.www1.hp.com/help/Help_ContactInfo.aspx?cwp=2&SelectedTab=2 and clicking on your location to get the technical support telephone number. There are other support options such as Electronic Case submission available.

If your product is listed as vulnerable and a software update is not yet available, HP is currently working to address these vulnerabilities with a new software update. This Security Bulletin will be revised when the software update is available. Prior to the update being made available and you have an impacted product, the following mitigations are recommended:

Moving to SNMPv3 with authentication and privacy for all network management applications.

Using SNMPv3s VACM to block access to the H3C-USER-MIB for SNMPv1/v2c users.

Here is an example configuration using the snmp-agent command:

snmp-agent mib-view include readView iso snmp-agent mib-view exclude readView hh3cUserPassword snmp-agent mib-view include writeView iso snmp-agent mib-view exclude writeView hh3cUserPassword snmp-agent mib-view include notifyView iso snmp-agent group v1 testV1ReadGroup read-view readView snmp-agent usm-user v1 testV1ReadUser testV1ReadGroup snmp-agent group v1 testV1WriteGroup read-view readView write-view writeView notify-view notifyView snmp-agent usm-user v1 testV1WriteUser testV1WriteGroup snmp-agent community read testV1ReadUser mib-view readView snmp-agent community write testV1WriteUser mib-view writeView You may also further control SNMP MIB access using an ACL. For v1/2 snmp-agent community write testV1WriteUser mib-view writeView acl snmp-agent community read testV1ReadUser mib-view readView acl For v3 snmp-agent group v3 testV3Group privacy read-view readView write-view writeView acl snmp-agent usm-user v3 testV3User testV3Group authentication-mode sha privacy-mode aes128

Configure SNMP community strings with ACLs to limit access to SNMP to just network management workstation(s).

Here is an example configuration:

acl number 2001 rule 1 permit source 192.168.100.0 0.0.0.255 rule 1 permit source 192.168.100.1 0 acl number 2002 rule 1 permit source 192.168.100.1 0

snmp-agent community read READONLY acl 2001 snmp-agent community write READONLY acl 2002

Disable all local user administrative accounts and use RADIUS or TACACS+ authentication instead.

Disable SNMP.

Regarding secure use of switch or router configuration information:

Avoid using plaintext protocols such as TFTP or FTP to transfer configuration files that contain local user accounts.

Control user privileges on displaying any configuration information or displaying the content of a configuration file. For example, display current-configuration or more '.

HISTORY Version:1 (rev.1) - 22 October 2012 Initial release Version:2 (rev.2) - 25 October 2012 Updated product list and the summary section.

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430

Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlCJl+QACgkQ4B86/C0qfVl9cgCcDoJkIjTWzBdeJdAdOimzRNg7 YJgAoPmQ5ycXX07g21tV9nvSaLLvPPE5 =cmPB -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201302-0018",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "jd373a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc101a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a17b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc125b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf247a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cs7906e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a21x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg183a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a26g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a21p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je071a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd317a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17771taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf808a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je110a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd318a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf233a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17342-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je068a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a29l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cs7902e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd010a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je527a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je023a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd655a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbvcxmsr06a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd369a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17161taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je526a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbvcxmsr02a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a21q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a27s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je030a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd023a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd658a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg182a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17161-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17540taa",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs42g-48-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg242a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc086a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne40e\\\u002680e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "0235a20v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13613",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0br",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je167a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17762taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf800a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17572-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd449a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0gf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a321",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg214a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17341-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15j",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc496a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc748a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a393",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je027a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je102a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd333a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je013a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a238",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17771-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc666a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17171taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je021a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a761",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13612",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17171-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a392",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd352a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd320a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd943a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je048a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a08f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a27d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg092a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc149b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd370a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf803a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf804a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc700a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17253-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17254-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17181taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs42g-24-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a14v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc699a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a42d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg256a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd309a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg238a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13759",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg312a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd347a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a23h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je100a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd307a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a38p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je031a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc691a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je022a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17259-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je057a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a397",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je029a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd274a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd331a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd313b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd657a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je005a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd335a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je063a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd344a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd656a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd193b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je067a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf640a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17662-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd306a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd243b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd310a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg348a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je012a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g9",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je070a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17341a-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je101a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg248a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0bt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a65t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf230a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg311a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd303a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a395",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc147b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc176a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd667a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "0235a36n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg254a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd320b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd468a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg302a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0e3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbsg5293",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg255a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd946a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbsg2093",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a37u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd935a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je106a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd376a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0bs",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "model": "je204a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0c2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf806a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0e5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc103a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0gd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd272a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jr024a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf228a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a298",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd662a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13751",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc099a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd325a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd375a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0bx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a390",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je092a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a29y",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je007a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "jf845a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg350a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je104a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd220a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd250a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf427a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf815a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0150a12a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd249a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a36q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17250-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg300a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a37x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne40\\\u002680",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "model": "ma5200g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003"
      },
      {
        "model": "je528a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a39h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17541",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17331a-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf430a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a325",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je099a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg349a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc124b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17772-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13840",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0ge",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13616",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a17a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc055a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd379a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd238a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17152-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a268",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235aa2m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf239a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc085a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a326",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd665a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a38m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf242a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a88l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je168a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc148b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17343a-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg304a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd672a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je094a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je107a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf241a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17341taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a86p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "model": "jd669a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd654a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd450a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd311a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne40e\\\u002680e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "0235a0ga",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0gc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a08k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd025a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc054a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf431c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf817a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg215a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17772taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0150a129",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf847a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je020a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg299a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je088a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a398",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs48g-24s-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbvcxmsr01a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "juc653a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc698a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd011a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je551a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc694a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "lsq1fwbsc0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je061a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd660a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17660-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd239b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je033a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd447b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc147a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg478a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "rpe-x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg223a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf231a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je064a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc177a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd378a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jr430b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd334a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd241a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc165a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg247a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd346a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd029a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd923a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd972a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0bq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf238a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g8",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je201a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg303a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd242b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg213a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je545a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc150a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd351a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd312a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd377a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17258-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je091a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je200a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a267",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17541taa",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg249a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je096a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf809a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je199a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg253a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd371a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf807a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cs7906ev",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbsg28hpwr93",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je093a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a35j",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs48g-24-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd328a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd337a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17761-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je009a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17331taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg209a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc635a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf431a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je073a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd448b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a38q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd354a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a27q",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je072a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd921a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf802a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a14w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs48g-24p-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd332a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd666a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0e7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17562-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17250taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17561-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf814a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a33r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne40e\\\u002680e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "model": "jd027a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf236a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0c0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je109a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je045a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg246a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd663b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a0av",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a23p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc149a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd242a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd268a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17162-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd338a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf430c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg252a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg241a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r005c00spc600"
      },
      {
        "model": "3crbvcxmsr08a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je018a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "rtvz33020as",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17258taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne20e-x6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "jd024a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a237",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd671a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbvcxmsr07a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a41d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd315a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc056a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf286a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg225a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17671-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd314a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "je008a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17172-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbvcxmsr05a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd917a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd349a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20j",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd668a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd922a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd918a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cruwx500475",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd345a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg059a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a394",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je089a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je198a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a32b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf237a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17302a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc150b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc178b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf235a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd673a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17162taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0a8",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je026a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc125a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd241b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a27r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a296",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0a7",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r005"
      },
      {
        "model": "jf816a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17334-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf551a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg258a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg236a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0c4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd661a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17762-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc148a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd239a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd305a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf552a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd350a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd330a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je105a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je069a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je164a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd313a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf285a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd319a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a32e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbsg28pwr93",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd302a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a322",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a323",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc612a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf801a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a25s",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je028a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf232a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17253taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc177b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg301a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd675a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17181-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc613a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd432a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd193a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd469a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd431a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc100a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je103a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd348a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cs7903es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a38n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc105a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf284a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg237a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a23t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg251a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf813a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "lsr1fw2a1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je032a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc611a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd240b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je074a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17332-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc178a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17251taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd356a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf428a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd374a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg208a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd355a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cs7903e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd916a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a324",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg307a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs45g-48-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je095a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd357a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a32g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf846a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a15c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a37t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a301",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd674a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd275a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a396",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd670a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf287a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne40e\\\u002680e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "model": "3cr17331-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg207a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd433a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd240a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je015a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je165a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd273a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd663a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd194a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a25n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a248",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17343-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17251-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd676a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0as",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a16t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd967a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbvcxmsr03a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je166a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a34b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a391",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd243a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd007a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je046a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg245a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17661-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17543taa",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "atn",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c01"
      },
      {
        "model": "3crs48g-48-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17543",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs45g-24-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd444a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0e6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd327a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf240a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a327",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "jd372a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0150a12b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a832",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a269",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc701a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jr431b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17172taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd659a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg305a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cruwx500275",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0ct",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17333a-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je060a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg315a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a09t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a10j",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg210a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je059a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je108a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg240a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17304a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a328",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a320",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17571-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd251a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0bu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd664a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je058a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je025a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd028a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17761taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc652a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "jg091a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "-ma5200g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "model": "je006a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf844a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je097a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "lsq1srpd0",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd329a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf234a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a32x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc653a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf283a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "jg250a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc474b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je066a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je016a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13701",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd319b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd353a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a42b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf812a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd326a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19k",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a25r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf229a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd304a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17332a-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a20l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v800r003"
      },
      {
        "model": "0235a08h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc697a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c13641",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je203a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd172a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd009a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd447a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd448a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg239a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3c17540",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0231a88a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a0g2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v800r002"
      },
      {
        "model": "jd318b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg221a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc474a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a38r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a19j",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a297",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a31n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc104a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd316a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd245a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg184a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd336a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r007"
      },
      {
        "model": "0235a08m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je062a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs48g-48p-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jf553a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg257a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "atb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "3cr17333-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd026a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a38v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd308a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a299",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jg222a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17151-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crs42g-24p-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc566a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0150a12c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3cr17252taa-91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd008a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "3crbsg2893",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jc158a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a29a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "0235a22f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "jd238b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "je090a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "",
        "scope": null,
        "trust": 0.8,
        "vendor": "multiple vendors",
        "version": null
      },
      {
        "model": "h3c s3100 series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s3100 series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "3com",
        "version": null
      },
      {
        "model": "h3c s3600 series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "3com",
        "version": null
      },
      {
        "model": "h3c s5100 series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "3com",
        "version": null
      },
      {
        "model": "switch family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "3com",
        "version": "4200"
      },
      {
        "model": "switch family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "3com",
        "version": "4500"
      },
      {
        "model": "switch family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "3com",
        "version": "5500"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "3com",
        "version": "8800"
      },
      {
        "model": "h3c msr series routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "20"
      },
      {
        "model": "h3c msr series routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "30"
      },
      {
        "model": "h3c msr series routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "50"
      },
      {
        "model": "h3c msr series routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "900"
      },
      {
        "model": "h3c s12500 series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s5120-ei series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s5120-si series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s5500-ei series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s5500-si series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s5800 series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s7500e series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c s9500e core routing switch",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c secpath f1000-e",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c secpath u200 series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c sr6600 series routers",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c sr8800 series routers",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c wx3000 series integrated switch",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "h3c wx5000 series access controllers",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "10500"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "12500"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "1910"
      },
      {
        "model": "unified threat management appliance series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "200"
      },
      {
        "model": "ei switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "3100"
      },
      {
        "model": "si switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "3100"
      },
      {
        "model": "ei switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "3600"
      },
      {
        "model": "si switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "3600"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "3610"
      },
      {
        "model": "4200g switch series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "4210"
      },
      {
        "model": "4210g switch series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "4500g switch series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "4800g switch series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "ei switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "5120"
      },
      {
        "model": "si switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "5120"
      },
      {
        "model": "ei switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "5500"
      },
      {
        "model": "hi switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "5500"
      },
      {
        "model": "si switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "5500"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "5800"
      },
      {
        "model": "router series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "6600"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "7500"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "8800"
      },
      {
        "model": "switch series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "9500"
      },
      {
        "model": "firewall series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "msr20 series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "msr30 series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "msr50 series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "msr900 series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "wx5000 access controller series",
        "scope": null,
        "trust": 0.6,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "5500-24g si switch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jd369a"
      },
      {
        "model": "5500-48g-poe\\+ si switch with 2 interface slots",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jg239a"
      },
      {
        "model": "msr20-20 router",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jd662a"
      },
      {
        "model": "s3610-28tp-model ls-3610-28tp-ovs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "0235a22e"
      },
      {
        "model": "5500-48g ei switch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jd375a"
      },
      {
        "model": "5500-24g ei taa-compliant switch with 2 interface slots",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jg250a"
      },
      {
        "model": "4500 switch 50-port",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "3cr17562-91"
      },
      {
        "model": "s3610-52p-model ls-3610-52p-ovs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "0235a22c"
      },
      {
        "model": "5500-48g ei taa-compliant switch with 2 interface slots",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jg251a"
      },
      {
        "model": "8802 router chassis",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "jc147a"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17161-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg091a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd249a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc613a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc611a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc612a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc748a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc635a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc652a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc086a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf431a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf431c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jr431b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc653a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:juc653a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc085a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf430a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf430c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jr430b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je005a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je008a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je007a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je006a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je009a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg350a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg349a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg348a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd268a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd274a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd450a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd449a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd444a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13612:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd916a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13613:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd917a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13616:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd918a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13636:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd921a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13640:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd922a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13641:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd923a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd312a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd314a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd319a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd305a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd319b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg222a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd313a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd313b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd315a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd320a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd306a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd320b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg223a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd317a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg315a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd311a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd316a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd318a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd304a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd307a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd318b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg221a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg301a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd326a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd325a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd334a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg303a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd331a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd330a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd329a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg299a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg304a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg302a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg307a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd328a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd327a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd333a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd332a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg300a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg305a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd337a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd336a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd338a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd335a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je015a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17304a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17302a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17660-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17661-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17662-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17671-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je025a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jr024a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je032a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je033a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je026a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf427a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf846a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs42g-24-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf844a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je027a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs42g-48-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf845a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je028a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je029a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je021a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je022a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17343a-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17341-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17341a-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17332-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17333-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17333a-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17334-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17331-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17331a-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17331taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17342-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17343-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17341taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je045a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je061a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je048a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je046a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je063a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17571-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17572-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17561-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17562-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17771-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17771taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17772-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17772taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17761-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17761taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17762-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17762taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf847a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf428a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs45g-48-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd008a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd009a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd007a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd011a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd010a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs48g-24p-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs48g-48p-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs48g-24-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs48g-24s-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs48g-48-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13701:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd935a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je073a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg092a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg236a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg247a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg245a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je074a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg237a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg248a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg246a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je072a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13751:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd943a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg311a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg241a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg252a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg238a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd378a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd371a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd379a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd374a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg249a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd373a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd377a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg250a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd369a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg312a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg240a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg253a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg239a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd376a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd372a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd375a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg251a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd370a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17171-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17172-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17181-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17162-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf551a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf553a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf552a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17253-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17250-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17251-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17258-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13759:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd946a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg254a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc099a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc103a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg256a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc100a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg255a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg257a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg242a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc104a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc105a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc101a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg258a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg225a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf242a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg478a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc691a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc694a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c13840:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd967a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd972a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd250a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc165a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc566a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc176a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc178a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc178b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc177a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc177b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc496a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd194a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd193a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd193b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc700a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc699a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd220a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc701a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd242a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd242b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc697a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc666a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc698a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd240a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd240b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd243a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd243b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd239a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd239b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd241a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd241b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd238a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd238b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd251a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc147a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc147b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc148a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc148b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je203a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je204a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17543:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc149a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc149b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je201a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je200a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17541:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc150a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc150b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je199a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je198a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17540:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd245a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc124b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc474a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc474b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc125a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc125b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd670a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd671a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd672a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd667a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd432a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd663a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf286a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf232a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd302a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd308a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd303a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd309a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg059a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd310a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je545a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd353a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd351a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd356a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd354a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd346a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd344a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd348a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd355a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd347a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd345a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd349a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd352a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd350a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd357a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je070a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je066a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je068a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je071a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je067a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je069a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je528a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc158a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je527a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je526a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a27q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a38r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a09t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd172a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbsg5293:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbsg2093:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbsg2893:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbsg28hpwr93:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbsg28pwr93:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je013a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je020a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je016a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je012a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je018a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je031a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je030a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je023a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je062a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je058a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je057a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je064a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je060a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je059a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je106a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je105a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je109a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je110a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je102a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je099a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je101a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je093a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je092a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je097a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je096a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je089a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je088a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je108a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je107a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je104a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je100a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je103a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je095a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je094a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je091a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je090a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je164a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je166a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je165a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je167a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je168a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd272a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a26g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg214a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg213a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg215a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a21x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19j:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd431a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd673a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf239a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg209a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd676a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf806a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd675a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf807a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd674a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf241a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a32g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd669a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf808a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg210a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd668a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf240a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf809a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf237a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf238a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf236a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf817a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd662a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf283a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd663b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd664a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf228a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg184a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf816a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf800a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg182a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg183a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd659a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf234a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd665a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf233a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd025a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd024a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf235a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd660a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf802a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd666a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf284a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd661a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf803a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd657a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf229a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd027a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd026a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd029a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd028a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf801a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd654a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf804a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd658a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf230a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf285a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd433a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd656a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf231a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf640a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf814a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg207a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf812a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jg208a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf815a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf813a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0a7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a32e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a32b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31w:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0a8:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a325:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a39h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a237:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a238:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a328:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:rtvz33020as:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20j:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a25r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a268:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a25s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr03a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr02a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr06a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr05a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr08a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr07a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crbvcxmsr01a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a297:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd655a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0bx:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0c2:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0c0:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0c4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf287a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd023a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a395:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a396:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a397:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a398:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a390:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a391:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a392:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a393:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a394:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a38v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a324:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a326:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a29l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a327:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a321:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a322:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a267:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a299:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a323:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a320:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a296:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a269:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a298:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a761:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:rpe-x1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a37x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0150a12c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a32x:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0150a12a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0ge:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0e6:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a38n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0gf:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0e7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a38m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a14v:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a300:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a23h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a14w:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a301:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a23p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a248:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15j:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a15b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a29y:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a23t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a19b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a65t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10g:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10j:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a10d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a21q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a08k:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a08f:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235aa2m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a08m:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a20r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a08h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a21p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22h:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a22t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a42b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0bq:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0bs:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0bu:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0e5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0e3:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a42d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0br:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0bt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a832:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:lsq1fwbsc0:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a29a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a33r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a27r:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g2:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a27s:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g3:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a86p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:lsq1srpd0:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a25n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g0:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cs7902e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cs7903es:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cs7903e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cs7906ev:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cs7906e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a0av:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:lsr1fw2a1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:je551a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a17a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc055a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a38p:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g6:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a16t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc054a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a38q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a17b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jc056a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a36q:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0ct:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a36n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a27d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0150a12b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0150a129:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a41d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a88a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0gc:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g8:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31c:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0g9:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31d:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0ga:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a31e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0231a88l:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17151-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17259-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17254-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17152-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17543taa:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17541taa:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3c17540taa:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17332a-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs42g-24p-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3crs45g-24-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17171taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17172taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17161taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17250taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17251taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17252taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17253taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17258taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17181taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cr17162taa-91:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd275a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd273a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0as:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a37u:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a37t:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a34b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd447a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd447b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd468a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a0gd:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:0235a35j:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd448a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd448b:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jd469a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:jf247a:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cruwx500275:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:hp:3cruwx500475:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne20e-x6:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\\u002680e:v600r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:-ma5200g:v300r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40\\\u002680:v300r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\\u002680e:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:atb:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\\u002680e:v300r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\\u002680e:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kurt Grutzmacher and CERT/CC.",
    "sources": [
      {
        "db": "BID",
        "id": "56183"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-3268",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 9.3,
            "collateralDamagePotential": "MEDIUM-HIGH",
            "confidentialityImpact": "COMPLETE",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 7.7,
            "exploitability": "FUNCTIONAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-3268",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "CONFIRMED",
            "severity": "HIGH",
            "targetDistribution": "HIGH",
            "trust": 0.8,
            "userInterationRequired": null,
            "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 8.5,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2012-3268",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "VHN-56549",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-3268",
            "trust": 1.6,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-3268",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201210-540",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-56549",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community. HP/H3C Made and Huawei There are vulnerabilities in network devices that lack access restrictions. HP/H3C Made and Huawei Network devices SNMP There is a problem with request processing and there is a vulnerability with insufficient access restrictions.A remote attacker may gain access to the management functions of the product. Multiple HP products have security vulnerabilities that allow attackers to exploit vulnerabilities to obtain sensitive information. No detailed vulnerability details are currently available. Hewlett-Packard (HP) is the world\u0027s leading high-tech provider, providing a full range of products such as notebooks, desktop computers, and workstations. The vulnerability is caused by the program not implementing access control correctly as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0. Through SNMP requests with read-only communities, remote authentication attackers exploit this vulnerability to discover credentials in UserInfoEntry values. \n\n\nIdentifiers\n- -----------\n\n US-CERT VU#225404\n CVE-2012-3268\n\n\nVendor release\n- --------------\n\n HP/H3C:\nhttps://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03515685\u0026ac.admitted=1350939600802.876444892.492883150\n\n Huawei: In the works\n\n\nResearcher\n- ----------\n\n Kurt Grutzmacher\n grutz \u003cat\u003e jingojango dot net\n http://grutztopia.jingojango.net/\n twitter: @grutz\n\n\nDetails\n- -------\n\nHuawei/H3C have two OIDs, \u0027old\u0027 and \u0027new\u0027:\n\n  old: 1.3.6.1.4.1.2011.10\n  new: 1.3.6.1.4.1.25506\n\nMost devices support both formats. \n\nThe MIBs h3c-user.mib and hh3c-user.mib, for the purpose of this\ndocument, will be referred to as (h)h3c-user.mib. This MIB defines the\ninternal table and objects to \"Manage configuration and Monitor running\nstate for userlog feature.\"\n\nThis means there are some cool objects with data in this MIB penetration\ntesters or malicious actors would want to get their dirty little hands\non. Most objects are only accessible with the read/write community string. \n\nIn the revision history of (h)h3c-user.mib, version 2.0 modified the\nMAX-ACCESS from read-only to read-create the following objects within\nthe (h)h3cUserInfoEntry sequence:\n\n  (h)h3cUserName\n  (h)h3cUserPassword\n  (h)h3cAuthMode\n  (h)h3cUserLevel\n\nThe purpose of these objects are to provide the locally configured users\nto those with a valid SNMP community. After the change only those with\nthe read-write community string should have access, however this was not\nthe case and the code still retained the earlier access of read-only. \n\nSo if you have the SNMP public community string then you have the\nability to view these entries. \n\n\nWhy this is impactful\n- ---------------------\n\nThe (h)h3cUserPassword is presented in one of three formats as defined\nin the (h)h3cAuthMode object and mirrors how passwords are stored in the\ndevice configuration:\n\n  0 -- password simple, meaning cleartext\n  7 -- password cipher, meaning ciphertext\n  9 -- password sha-256, meaning one-way sha-256 hash\n\nSHA-256 is a recent addition and is not supported on all devices yet. \n\n\nGlobbing some users\n- -------------------\n\nYou must have an SNMP read-only or read-write string and access to the\nSNMP port (udp/161) for this to work:\n\n $ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.2011.10.2.12.1.1.1\n\nor\n\n $ snmpwalk ?c public ?v 1 $IP 1.3.6.1.4.1.25506.2.12.1.1.1\n\n\nWeaponizing\n- -----------\n\nFiles relevant to this disclosure:\n\n  hh3c-localuser-enum.rb - Metasploit auxiliary scanner module\n  snmp-h3c-login.nse - Nmap Scripting Engine module\n\nThese will soon be posted to https://github.com/grutz/h3c-pt-tools and\nrequested to be added to each tool. \n\n\nMitigation\n- ----------\n\nBy itself this is already bad but most users who do any of the following\nmay already be protected:\n\n  1. Use complex SNMP community strings or disable SNMPv1\n  2. Have disabled the mib entries for (h)h3c-user\n  3. Do not define local users, use RADIUS or TACACS+\n\nMore specific routines can be found in the vendor\u0027s release. \n\n\nWhy this is a bigger problem\n- ----------------------------\n\nPeople make poor choices. They like to think their equipment won\u0027t rat\nthem out so they use cleartext passwords on networking equipment. \n\nThe cipher is an interesting one because it\u0027s basically an unknown... \nWhat, you think the only thing I had to share at Toorcon was SNMP and\nsome cleartext credentials?\n\n\nTimeline\n- --------\n\nJune-ish 2012: Research begins after seeing something cool on a\npenetration test\n\nAugust 6, 2012: Contacted US-CERT to coordinate vendor disclosure, VU#225404\n\nSeptember 5, 2012: No response from H3C, contacted US-CERT again\n\nSeptember 6, 2012: H3C (through US-CERT) requests more time, I state\nintention to present findings at Toorcon (Oct 19/20, 2012) or disclose\nif talk not accepted. \n\nSeptember 18, 2012: Approved for Toorcon! Information goes up not long\nafter on Toorcon website. \n\nSeptember 18-October 16, 2012: Build slides, work on tools, no contact\nwith US-CERT or vendors. \n\nOctober 16, 2012: HP contacts me directly asking that I not present this\ninformation at Toorcon\n\nOctober 18, 2012: Publicly state agreement to cancel the Toorcon talk\n\nOctober 22, 2012: HP discloses! What what? Why bother putting any\npressure not to give the talk if you\u0027re gonna give everything out 2 days\nlater?\n\nOctober 23, 2012: So I publish. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03515685\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03515685\nVersion: 2\n\nHPSBHF02819 SSRT100920 rev.2 - HP, 3COM, and H3C Routers \u0026 Switches, Remote\nDisclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-10-25\nLast Updated: 2012-10-25\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP, 3COM, and\nH3C routers and switches. The vulnerabilities could be remotely exploited\nresulting in disclosure of information. \n\nFor more information, refer to CERT VU#225404 on the CERT website. \n\nReferences: SSRT100962, CVE-2012-3268, CERT VU#225404\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nVendor\n Product Name\n Product Number\n\nHP\n 10500/7500 Advanced VPN Firewall Module\n JD249A\n\nH3C\n S7500E SecBlade VPN Firewall Module\n 0231A832, LSQ1FWBSC0\n\nHP\n 10504 Switch Chassis\n JC613A\n\nHP\n 10508 Switch Chassis\n JC612A\n\nHP\n 10508-V Switch Chassis\n JC611A\n\nHP\n 10512 Switch Chassis\n JC748A\n\nHP\n 12500 VPN Firewall Module\n JC635A\n\nHP\n 12508 DC Switch Chassis\n JC652A\n\nHP\n 12508 Switch Chassis\n JC086A\n\nH3C\n S12508 Chassis\n 0235A38N\n\nHP\n 12508 Switch Chassis\n JF431A\n\nHP\n A12508 Switch Chassis\n\nH3C\n S12508 Chassis\n 0235A0E6\n\nHP\n 12508 Switch Chassis\n JF431B\n\nHP\n A12508 Switch Chassis\n\nH3C\n S12508 (AC-1) Routing Switch\n 0235A0GE\n\nHP\n 12508 Switch Chassis\n JF431C\n\nHP\n 12518 DC Switch Chassis\n JC653A\n\nHP\n 12518 DC Switch Chassis\n JC653A\n\nHP\n 12518 Switch Chassis\n JC085A\n\nHP\n A12518 Switch Chassis\n\nH3C\n S12518 Chassis\n 0235A38M\n\nHP\n 12518 Switch Chassis\n JF430A\n\nHP\n A12518 Switch Chassis\n\nH3C\n S12518 Chassis\n 0235A0E7\n\nHP\n 12518 Switch Chassis\n JF430B\n\nHP\n A12518 Switch Chassis\n\nH3C\n S12518 (AC-1) Routing Switch\n 0235A0GF\n\nHP\n 12518 Switch Chassis\n JF430C\n\nHP\n 1910-16G Switch\n JE005A\n\n3Com\n Baseline Plus 2900G Switch - 20 port\n 3CRBSG2093\n\nHP\n 1910-24G Switch\n JE006A\n\n3Com\n Baseline Plus 2900G Switch - 28 port\n 3CRBSG2893\n\nHP\n 1910-24G-PoE (365W) Switch\n JE007A\n\n3Com\n Baseline Plus 2900G Switch - 28HPWR\n 3CRBSG28HPWR93\n\nHP\n 1910-24G-PoE (170W) Switch\n JE008A\n\nHP\n V1910-24G-PoE (170W) Switch\n\n3Com\n Baseline Plus 2900G Switch - 28PWR\n 3CRBSG28PWR93\n\nHP\n 1910-48G Switch\n JE009A\n\n3Com\n Baseline Plus 2900 Switch Gigabit Family - 52 port\n 3CRBSG5293\n\nHP\n 1910-8G Switch\n JG348A\n\nHP\n 1910-8G-PoE+ (180W) Switch\n JG350A\n\nHP\n 1910-8G-PoE+ (65W) Switch\n JG349A\n\nHP\n 200-CS UTM Appliance\n JD268A\n\nH3C\n SecPath U200-CS\n 0235A0CT\n\nHP\n 200-M UTM Appliance\n JD274A\n\nHP\n 3000-10G-PoE+ Wireless Switch\n JD450A\n\nHP\n A3000-10G-PoE+ Wireless Switch\n\nH3C\n WX3010,8 PoEPlus\n 0235A37U\n\nHP\n 3000-24G-PoE+ Wireless Switch\n JD449A\n\nHP\n A3000-24G-PoE+ Wireless Switch\n\nH3C\n WX3024,4SFPCombo Plus Slot Plus PoEPlus\n 0235A37T\n\nHP\n 3000-8G-PoE+ Wireless Switch\n JD444A\n\nH3C\n WX3008, 4 POE Plus\n 0235A0AS\n\nHP\n 3012 Router\n JD916A\n\n3Com\n 3012 Router\n 3C13612\n\nHP\n 3013 Router\n JD917A\n\n3Com\n 3013 Router\n 3C13613\n\nHP\n 3016 Router\n JD918A\n\n3Com\n 3016 Router\n 3C13616\n\nHP\n 3036 Router\n JD921A\n\n3Com\n 3036 Router\n 3C13636\n\nHP\n 3040 Router\n JD922A\n\n3Com\n 3040 Router\n 3C13640\n\nHP\n 3041 Router\n JD923A\n\n3Com\n 3041 Router\n 3C13641\n\nHP\n 3100-16 DC EI Switch\n JD314A\n\nHP\n A3100-16 DC EI Switch\n\nH3C\n S3100-16TP-EI - model LS-3100-16TP-EI-H3-D-O\n 0235A23H\n\nHP\n 3100-16 EI Switch\n JD319A\n\nH3C\n S3100-16TP-EI - model LS-3100-16TP-EI-H3-A-O\n 0235A300\n\nHP\n 3100-16 SI Switch\n JD305A\n\nH3C\n S3100-16T-SI - model LS-S3100-16T-SI-AC-OVS\n 0235A15C\n\nHP\n 3100-16 v2 EI Switch\n JD319B\n\nHP\n 3100-16 v2 SI Switch\n JG222A\n\nHP\n 3100-16-PoE EI Switch\n JD312A\n\nH3C\n S3100-16TP-PWR-EI - model LS-3100-16TP-PWR-EI-H3\n 0235A19C\n\nHP\n 3100-24 DC EI Switch\n JD315A\n\nHP\n A3100-24 DC EI Switch\n\nH3C\n S3100-26TP-EI - model LS-3100-26TP-EI-H3-D-O\n 0235A23P\n\nHP\n 3100-24 EI Switch\n JD320A\n\nHP\n A3100-24 EI Switch\n\nH3C\n S3100-26TP-EI - model LS-3100-26TP-EI-H3-A-O\n 0235A301\n\nHP\n 3100-24 SI Switch\n JD306A\n\nHP\n A3100-24 SI Switch\n\nH3C\n S3100-26T-SI - model LS-S3100-26T-SI-AC-OVS\n 0235A15D\n\nHP\n 3100-24 v2 EI Switch\n JD320B\n\nHP\n 3100-24 v2 SI Switch\n JG223A\n\nHP\n 3100-24-PoE EI Switch\n JD313A\n\nHP\n A3100-24-PoE EI Switch\n\nH3C\n S3100-26TP-PWR-EI - model LS-3100-26TP-PWR-EI-H3\n 0235A19D\n\nHP\n 3100-24-PoE v2 EI Switch\n JD313B\n\nHP\n 3100-48 Switch\n JD317A\n\nH3C\n S3100-52P - model LS-3100-52P-OVS-H3\n 0235A248\n\nHP\n 3100-48 v2 Switch\n JG315A\n\nHP\n 3100-8 DC EI Switch\n JD316A\n\nH3C\n S3100-8TP-EI - model LS-3100-8TP-EI-H3-D-O\n 0235A23T\n\nHP\n 3100-8 EI Switch\n JD318A\n\nH3C\n S3100-8TP-EI - model LS-3100-8TP-EI-H3-A-O\n 0235A29Y\n\nHP\n 3100-8 SI Switch\n JD304A\n\nHP\n A3100-8 SI Switch\n\nH3C\n S3100-8T-SI - model LS-S3100-8T-SI-AC-OVS\n 0235A15B\n\nHP\n 3100-8 SI Switch\n JD307A\n\nH3C\n S3100-8C-SI - model LS-S3100-8C-SI-AC-OVS\n 0235A15F\n\nHP\n 3100-8 v2 EI Switch\n JD318B\n\nHP\n 3100-8 v2 SI Switch\n JG221A\n\nHP\n 3100-8-PoE EI Switch\n JD311A\n\nH3C\n S3100-8TP-PWR-EI - model LS-3100-8TP-PWR-EI-H3\n 0235A19B\n\nHP\n 3600-24 EI Switch\n JD331A\n\nHP\n A3600-24 EI Switch\n\nH3C\n S3600-28P-EI - model LS-3600-28P-EI-OVS\n 0235A10H\n\nHP\n 3600-24 SI Switch\n JD330A\n\nHP\n A3600-24 SI Switch\n\nH3C\n S3600-28P-SI - model LS-3600-28P-SI-OVS\n 0235A10G\n\nHP\n 3600-24 v2 EI Switch\n JG299A\n\nHP\n 3600-24 v2 SI Switch\n JG304A\n\nHP\n 3600-24-PoE EI Switch\n JD326A\n\nHP\n A3600-24-PoE EI Switch\n\nH3C\n S3600-28P-PWR-EI - model LS-3600-28P-PWR-EI-OVS\n 0235A10C\n\nHP\n 3600-24-PoE SI Switch\n JD325A\n\nHP\n A3600-24-PoE SI Switch\n\nH3C\n S3600-28P-PWR-SI - model LS-3600-28P-PWR-SI-OVS\n 0235A10B\n\nHP\n 3600-24-PoE+ v2 EI Switch\n JG301A\n\nHP\n 3600-24-SFP EI Switch\n JD334A\n\nHP\n A3600-24-SFP EI Switch\n\nH3C\n S3600-28F-EI - model LS-3600-28F-EI-OVS\n 0235A10L\n\nHP\n 3600-24-SFP v2 EI Switch\n JG303A\n\nHP\n 3600-24TP SI Switch\n JD329A\n\nHP\n A3600-24TP SI Switch\n\nH3C\n S3600-28TP-SI - model LS-3600-28TP-SI-OVS\n 0235A10F\n\nHP\n 3600-48 EI Switch\n JD333A\n\nHP\n A3600-48 EI Switch\n\nH3C\n S3600-52P-EI - model LS-3600-52P-EI-OVS\n 0235A10K\n\nHP\n 3600-48 SI Switch\n JD332A\n\nH3C\n S3600-52P-SI - model LS-3600-52P-SI-OVS\n 0235A10J\n\nHP\n 3600-48 v2 EI Switch\n JG300A\n\nHP\n 3600-48 v2 SI Switch\n JG305A\n\nHP\n 3600-48-PoE EI Switch\n JD328A\n\nHP\n A3600-48-PoE EI Switch\n\nH3C\n S3600-52P-PWR-EI - model LS-3600-52P-PWR-EI-OVS\n 0235A10E\n\nHP\n 3600-48-PoE SI Switch\n JD327A\n\nHP\n A3600-48-PoE SI Switch\n\nH3C\n S3600-52P-PWR-SI - model LS-3600-52P-PWR-SI-OVS\n 0235A10D\n\nHP\n 3600-48-PoE+ v2 EI Switch\n JG302A\n\nHP\n 3600-48-PoE+ v2 SI Switch\n JG307A\n\nHP\n 3610-24-2G-2G-SFP Switch\n JD337A\n\nHP\n A3610-24-2G-SFP Switch\n\nH3C\n S3610-28TP - model LS-3610-28TP-OVS\n 0235A22E\n\nHP\n 3610-24-4G-SFP Switch\n JD336A\n\nHP\n A3610-24-4G Switch\n\nH3C\n S3610-28P - model LS-3610-28P-OVS\n 0235A22D\n\nHP\n 3610-24-SFP Switch\n JD338A\n\nHP\n A3610-24-SFP Switch\n\nH3C\n S3610-28F - model LS-3610-28F-OVS\n 0235A22F\n\nHP\n 3610-48 Switch\n JD335A\n\nHP\n A3610-48 Switch\n\nH3C\n S3610-52P - model LS-3610-52P-OVS\n 0235A22C\n\nHP\n 4200-12G Switch\n JE015A\n\nHP\n E4200-12G Switch\n\n3Com\n 4200G Switch 12-Port\n 3CR17660-91\n\nHP\n 4210-16 Switch\n JE024A\n\nHP\n E4210-16 Switch\n\n3Com\n 4210 Switch 18-Port\n 3CR17332-91\n\nHP\n 4210-16 Switch\n JE025A\n\n3Com\n SWITCH 4210 18-Port\n 3CR17332A-91\n\nHP\n 4210-24 Switch\n JE026A\n\n3Com\n 4210 Switch 26-Port\n 3CR17333-91\n\nHP\n 4210-24 Switch\n JF427A\n\nHP\n E4210-24 Switch\n\n3Com\n 4210 Switch 26-Port\n 3CR17333A-91\n\nHP\n 4210-24G Switch\n JF844A\n\nHP\n E4210-24G Switch\n\n3Com\n 4210-24G Switch\n 3CRS42G-24-91\n\nHP\n 4210-24G-PoE Switch\n JF846A\n\nHP\n E4210-24G-PoE Switch\n\n3Com\n Switch E4210-24G-PoE\n 3CRS42G-24P-91\n\nHP\n 4210-24-PoE Switch\n JE032A\n\n3Com\n 4210 Switch PWR 26-Port\n 3CR17343-91\n\nHP\n 4210-24-PoE Switch\n JE033A\n\n3Com\n 4210 PWR Switch 26-Port\n 3CR17343A-91\n\nHP\n 4210-48 Switch\n JE027A\n\n3Com\n 4210 Switch 52-Port\n 3CR17334-91\n\nHP\n 4210-48G Switch\n JF845A\n\nHP\n E4210-48G Switch\n\n3Com\n 4210-48G Switch\n 3CRS42G-48-91\n\nHP\n 4210-8 Switch\n JE021A\n\n3Com\n 4210 Switch 9-Port\n 3CR17331-91\n\nHP\n 4210-8 Switch\n JE022A\n\n3Com\n 4210 Switch 9-Port\n 3CR17331A-91\n\nHP\n 4210-8-PoE Switch\n JE028A\n\n3Com\n 4210 PWR Switch 9-Port\n 3CR17341-91\n\nHP\n 4210-8-PoE Switch\n JE029A\n\n3Com\n 4210 PWR Switch 9-Port\n 3CR17341A-91\n\nHP\n 4500-24 Switch\n JE045A\n\n3Com\n 4500 Switch 26-Port\n 3CR17561-91\n\nHP\n 4500-24G-PoE Switch\n JE061A\n\n3Com\n 4500G PWR Switch 24-Port\n 3CR17771-91\n\nHP\n 4500-24-PoE Switch\n JE047A\n\n3Com\n 4500 PWR Switch 26-Port\n 3CR17571-91\n\nHP\n 4500-48 Switch\n JE046A\n\n3Com\n 4500 Switch 50-Port\n 3CR17562-91\n\nHP\n 4500-48G-PoE Switch\n JE063A\n\nHP\n E4500-48G-PoE Switch\n\n3Com\n 4500G PWR Switch 48-Port\n 3CR17772-91\n\nHP\n 4500-48-PoE Switch\n JE048A\n\n3Com\n 4500 PWR Switch 50-Port\n 3CR17572-91\n\nHP\n 4510-24G Switch\n JF847A\n\nHP\n E4510-24G Switch\n\n3Com\n Switch E4510-24G\n 3CRS45G-24-91\n\nHP\n 4510-48G Switch\n JF428A\n\nHP\n E4510-48G Switch\n\n3Com\n 4510G Switch 48 Port\n 3CRS45G-48-91\n\nHP\n 4800-24G Switch\n JD007A\n\n3Com\n 4800G Switch 24-Port\n 3CRS48G-24-91\n\nHP\n 4800-24G-PoE Switch\n JD008A\n\n3Com\n 4800G PWR Switch 24-Port\n 3CRS48G-24P-91\n\nHP\n 4800-24G-SFP Switch\n JD009A\n\nHP\n E4800-24G-SFP Switch\n\n3Com\n 4800G Switch 24-Port SFP\n 3CRS48G-24S-91\n\nHP\n 4800-48G Switch\n JD010A\n\n3Com\n 4800G Switch 48-Port\n 3CRS48G-48-91\n\nHP\n 4800-48G-PoE Switch\n JD011A\n\n3Com\n 4800G PWR Switch 48-Port\n 3CRS48G-48P-91\n\nHP\n 5012 Router\n JD935A\n\n3Com\n 5012 Router\n 3C13701\n\nHP\n 5120-16G SI Switch\n JE073A\n\nH3C\n S5120-20P-SI L2, 16GE Plus 4SFP\n 0235A42B\n\nHP\n 5120-24G EI TAA-compliant Switch with 2 Interface Slots\n JG245A\n\nHP\n 5120-24G SI Switch\n JE074A\n\nH3C\n S5120-28P-SI 24GE Plus 4 SFP\n 0235A42D\n\nHP\n 5120-24G-PoE+ (170W) SI Switch\n JG092A\n\nH3C\n S5120-28P-PWR-SI\n 0235A0E3\n\nHP\n 5120-24G-PoE+ (370W) SI Switch\n JG091A\n\nH3C\n S5120-28P-HPWR-SI\n 0235A0E5\n\nHP\n 5120-24G-PoE+ EI Switch with 2 Interface Slots\n JG236A\n\nHP\n 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots\n JG247A\n\nHP\n 5120-48G EI TAA-compliant Switch with 2 Interface Slots\n JG246A\n\nHP\n 5120-48G SI Switch\n JE072A\n\nHP\n A5120-48G SI Switch\n\nH3C\n S5120-52P-SI 48GE Plus 4 SFP\n 0235A41W\n\nHP\n 5120-48G-PoE+ EI Switch with 2 Interface Slots\n JG237A\n\nHP\n 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots\n JG248A\n\nHP\n 5232 Router\n JD943A\n\n3Com\n 5232 Router\n 3C13751\n\nHP\n 5500-24G DC EI Switch\n JD373A\n\nH3C\n S5500-28C-EI-DC,Ethernet Switch\n 0235A24S\n\nHP\n 5500-24G EI Switch\n JD377A\n\nH3C\n S5500-28C-EI,Ethernet Switch\n 0235A253\n\nHP\n 5500-24G EI TAA-compliant Switch with 2 Interface Slots\n JG250A\n\nHP\n 5500-24G SI Switch\n JD369A\n\nH3C\n S5500-28C-SI,Ethernet Switch\n 0235A04U\n\nHP\n 5500-24G-4SFP HI Switch with 2 Interface Slots\n JG311A\n\nHP\n 5500-24G-PoE EI Switch\n JD378A\n\nH3C\n S5500-28C-PWR-EI,Ethernet Switch\n 0235A255\n\nHP\n 5500-24G-PoE SI Switch\n JD371A\n\nH3C\n S5500-28C-PWR-SI,Ethernet Switch\n 0235A05H\n\nHP\n 5500-24G-PoE+ EI Switch with 2 Interface Slots\n JG241A\n\nHP\n 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots\n JG252A\n\nHP\n 5500-24G-PoE+ SI Switch with 2 Interface Slots\n JG238A\n\nHP\n 5500-24G-SFP DC EI Switch\n JD379A\n\nH3C\n S5500-28F-EI,Eth Swtch,DC Single Pwr\n 0235A259\n\nHP\n 5500-24G-SFP EI Switch\n JD374A\n\nH3C\n S5500-28F-EI,Eth Switch,AC Single\n 0235A24U\n\nHP\n 5500-24G-SFP EI TAA-compliant Switch with 2 Interface Slots\n JG249A\n\nHP\n 5500-48G EI Switch\n JD375A\n\nH3C\n S5500-52C-EI,Ethernet Switch\n 0235A24X\n\nHP\n 5500-48G EI TAA-compliant Switch with 2 Interface Slots\n JG251A\n\nHP\n 5500-48G SI Switch\n JD370A\n\nH3C\n S5500-52C-SI,Ethernet Switch\n 0235A04V\n\nHP\n 5500-48G-4SFP HI Switch with 2 Interface Slots\n JG312A\n\nHP\n 5500-48G-PoE EI Switch\n JD376A\n\nH3C\n S5500-52C-PWR-EI,Ethernet Switch\n 0235A251\n\nHP\n 5500-48G-PoE SI Switch\n JD372A\n\nH3C\n S5500-52C-PWR-SI,Ethernet Switch\n 0235A05J\n\nHP\n 5500-48G-PoE+ EI Switch with 2 Interface Slots\n JG240A\n\nHP\n 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots\n JG253A\n\nHP\n 5500-48G-PoE+ SI Switch with 2 Interface Slots\n JG239A\n\nHP\n 5500G-24 EI 10/100/1000 No Power Supply Unit Switch\n JF551A\n\n3Com\n SS4 5500G-EI Switch 24PT (NO PSU)\n 3CR17254-91\n\nHP\n 5500G-24 EI SFP No Power Supply Unit Switch\n JF553A\n\n3Com\n SS4 5500G-EI 24 Port,SFP (NO PSU)\n 3CR17259-91\n\nHP\n 5500G-48 EI 10/100/1000 No Power Supply Unit Switch\n JF552A\n\n3Com\n SS4 5500G-EI Switch 48PT (NO PSU)\n 3CR17255-91\n\nHP\n 5682 Router\n JD946A\n\n3Com\n 5682 Router\n 3C13759\n\nHP\n 5800-24G Switch\n JC100A\n\nH3C\n S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot\n 0235A36U\n\nHP\n 5800-24G TAA-compliant Switch\n JG255A\n\nHP\n 5800-24G-PoE Switch\n JC099A\n\nH3C\n S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP\nPlus ) Plus 1 media module, PoE\n 0235A36S\n\nHP\n 5800-24G-PoE+ TAA-compliant Switch\n JG254A\n\nHP\n 5800-24G-SFP Switch\n JC103A\n\nH3C\n S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus\nmedia module (no power)\n 0235A374\n\nHP\n 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n JG256A\n\nHP\n 5800-48G Switch\n JC105A\n\nH3C\n S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus )\nPlus media module\n 0235A379\n\nHP\n 5800-48G Switch with 2 Slots\n JC101A\n\nH3C\n S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM\n 0235A36W\n\nHP\n 5800-48G TAA-compliant Switch with 1 Interface Slot\n JG258A\n\nHP\n 5800-48G-PoE Switch\n JC104A\n\nH3C\n S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module\n 0235A378\n\nHP\n 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n JG257A\n\nHP\n 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots\n JG242A\n\nHP\n 5800AF-48G Switch\n JG225A\n\nHP\n 5810-48G Switch\n JF242A\n\nHP\n A5810-48G with 2 SFP+ slots AC Switch\n\nH3C\n S5810 48-BT, 2 SFP Plus , AC\n 0235A42H\n\nHP\n 5820 VPN Firewall Module\n JD255A\n\nHP\n A5820 VPN Firewall Module\n\nH3C\n S5820 SecBlade VPN Firewall Module\n LSWM1FW10, 0231A94J\n\nHP\n 5830 CTO Built Switch\n JG478A\n\nHP\n 5830AF-48G Switch with 1 Interface Slot\n JC691A\n\nHP\n 5830AF-96G Switch\n JC694A\n\nHP\n 6600 Firewall Processing Router Module\n JD250A\n\nHP\n A6600 Firewall Processing Module\n\nH3C\n SR66 Gigabit Firewall Module\n 0231A88A\n\nHP\n 6600 RPE-X1 Router Module\n JC165A\n\nHP\n A6600 RPE-X1 Main Processing Unit\n\nH3C\n RT-SR66-RPE-X1-H3\n RPE-X1, 0231A761\n\nHP\n 6600 RSE-X1 Router Main Processing Unit\n JC566A\n\nHP\n 6602 Router Chassis\n JC176A\n\nHP\n A6602 Router\n\nH3C\n SR6602 1U Router Host\n 0235A27D\n\nHP\n 6604 Router Chassis\n JC178A\n\nHP\n A6604 Router Chassis\n\nH3C\n RT-SR6604-OVS-H3\n 0235A37X\n\nHP\n 6604 Router Chassis\n JC178B\n\nHP\n 6608 Router\n JC177A\n\nHP\n A6608 Router\n\nH3C\n RT-SR6608-OVS-H3\n 0235A32X\n\nHP\n 6608 Router Chassis\n JC177B\n\nHP\n 6616 Router Chassis\n JC496A\n\nHP\n A6616 Router Chassis\n\nH3C\n SR6616 Router Chassis\n 0235A41D\n\nHP\n 7500 384Gbps Fabric Module\n JD194A\n\nHP\n A7500 384Gbps Fabric/Main Processing Unit\n\nH3C\n S7500E 384 Gbps Fabric\n 0231A73K\n\nHP\n 7500 384Gbps Fabric Module with 2 XFP Ports\n JD193A\n\nHP\n A7500 384Gbps Fabric/Main Processing Unit with 2 10GbE XFP Ports\n\nH3C\n S7500E 384 Gbps Fabric w/ 2-port 10GBASE-X (XFP)\n 0231A73J\n\nHP\n 7500 384Gbps Fabric Module with 2 XFP Ports\n JD193B\n\nHP\n A7500 384Gbps Fabric/Main Processing Unit with 2 10GbE XFP Ports\n\nH3C\n S7500E Salience VI-10G Switch and Route Processing Unit,with 2 XFP\nInterfaces\n LSQ1SRP2XB0, 0231A0KW\n\nHP\n 7500 384Gbps TAA-compliant Fabric / Main Processing Unit\n JC700A\n\nHP\n 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports\n JC699A\n\nHP\n 7500 768Gbps Fabric Module\n JD220A\n\nHP\n A7510 768Gbps Fabric/Main Processing Unit\n\nH3C\n S7510E 768 Gbps Fabric\n LSQ1SRPD0, 0231A86P\n\nHP\n 7500 768Gbps TAA-compliant Fabric / Main Processing Unit\n JC701A\n\nHP\n A7510 768Gbps TAA-compliant Fabric/Main Processing Unit\n\nHP\n 7502 Switch Chassis\n JD242A\n\nHP\n A7502 Switch Chassis\n\nH3C\n S7502E Chassis w/ fans\n 0235A29A\n\nHP\n 7502 Switch Chassis\n JD242B\n\nH3C\n S7502E Ethernet Switch Chassis with Fan\n 0235A0G4\n\nHP\n 7502 TAA-compliant Main Processing Unit\n JC697A\n\nHP\n A7502 TAA-compliant Main Processing Unit\n\nHP\n 7503 Switch Chassis\n JD240A\n\nHP\n A7503 Switch Chassis\n\nH3C\n S7503E Chassis w/ fans\n 0235A27R\n\nHP\n 7503 Switch Chassis\n JD240B\n\nHP\n A7503 Switch Chassis\n\nH3C\n S7503E Ethernet Switch Chassis with Fan\n 0235A0G2\n\nHP\n 7503 Switch Chassis with 1 Fabric Slot\n JD243A\n\nHP\n A7503-S Switch Chassis\n\nH3C\n S7503E-S Chassis w/ fans\n 0235A33R\n\nHP\n 7503 Switch Chassis with 1 Fabric Slot\n JD243B\n\nH3C\n S7503E-S Ethernet Switch Chassis with Fan\n 0235A0G5\n\nHP\n 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo\n JC666A\n\nHP\n 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports\n JC698A\n\nHP\n 7506 Switch Chassis\n JD239A\n\nHP\n A7506 Switch Chassis H3C S7506E Chassis w/ fans\n 0235A27Q\n\nHP\n 7506 Switch Chassis\n JD239B\n\nHP\n A7506 Switch Chassis\n\nH3C\n S7506E Ethernet Switch Chassis with Fan\n 0235A0G1\n\nHP\n 7506 Vertical Switch Chassis\n JD241A\n\nHP\n A7506-V Switch Chassis\n\nH3C\n S7506E-V Chassis w/ fans\n 0235A27S\n\nHP\n 7506 Vertical Switch Chassis\n JD241B\n\nHP\n A7506-V Switch Chassis\n\nH3C\n S7506E-V Ethernet Switch Chassis with Fan\n 0235A0G3\n\nHP\n 7510 Switch Chassis\n JD238A\n\nHP\n A7510 Switch Chassis\n\nH3C\n S7510E Chassis w/ fans\n 0235A25N\n\nHP\n 7510 Switch Chassis\n JD238B\n\nHP\n A7510 Switch Chassis\n\nH3C\n S7510E Ethernet Switch Chassis with Fan\n 0235A0G0\n\nHP\n 8800 Firewall Processing Module\n JD251A\n\nH3C\n SR88 Firewall Processing Module\n 0231A88L\n\nHP\n 8802 Router Chassis\n JC147A\n\nHP\n A8802 Router Chassis\n\nH3C\n SR8802 10G Core Router Chassis\n 0235A31B\n\nHP\n 8802 Router Chassis\n JC147B\n\nHP\n A8802 Router Chassis\n\nH3C\n SR8802 10G Core Router Chassis\n 0235A0GC\n\nHP\n 8805 Router Chassis\n JC148A\n\nHP\n A8805 Router Chassis\n\nH3C\n SR8805 10G Core Router Chassis\n 0235A31C\n\nHP\n 8805 Router Chassis\n JC148B\n\nHP\n A8805 Router Chassis\n\nH3C\n SR8805 10G Core Router Chassis\n 0235A0G8\n\nHP\n 8807 7-slot Chassis Kit\n JE203A\n\n3Com\n 8807 Switch 7-slot Chassis Kit\n 3C17543\n\nHP\n 8807 Kit (TAA) Switch\n JE204A\n\n3Com\n SW8807 Kit TAA\n 3C17543TAA\n\nHP\n 8808 Router Chassis\n JC149A\n\nHP\n A8808 Router Chassis\n\nH3C\n SR8808 10G Core Router Chassis\n 0235A31D\n\nHP\n 8808 Router Chassis\n JC149B\n\nHP\n A8808 Router Chassis\n\nH3C\n SR8808 10G Core Router Chassis\n 0235A0G9\n\nHP\n 8810 10-slot AC (TAA) Chassis Kit\n JE201A\n\n3Com\n SW8810 AC Chassis Kit TAA\n 3C17541TAA\n\nHP\n 8810 10-slot Chassis Kit\n JE200A\n\n3Com\n 8810 Switch 10-slot Chassis Kit\n 3C17541\n\nHP\n 8812 Router Chassis\n JC150A\n\nHP\n A8812 Router Chassis\n\nH3C\n SR8812 10G Core Router Chassis\n 0235A31E\n\nHP\n 8812 Router Chassis\n JC150B\n\nHP\n A8812 Router Chassis\n\nH3C\n SR8812 10G Core Router Chassis\n 0235A0GA\n\nHP\n 8814 14-slot AC (TAA) Chassis Kit\n JE199A\n\n3Com\n SW8814 AC Chassis Kit TAA\n 3C17540TAA\n\nHP\n 8814 14-slot Chassis Kit\n JE198A\n\n3Com\n 8814 Switch 14-slot Chassis Kit\n 3C17540\n\nHP\n 9500 VPN Firewall Module\n JD245A\n\nH3C\n S9500E SecBlade VPN Firewall Module\n LSR1FW2A1, 0231A0AV\n\nHP\n 9505 Switch Chassis\n JC124B\n\nHP\n A9505 Switch Chassis\n\nH3C\n S9505E Routing-Switch Chassis\n 0235A0G6\n\nHP\n 9508-V Switch Chassis\n JC474A\n\nH3C\n S9508E-V Routing-Switch Chassis\n 0235A38Q\n\nHP\n 9508-V Switch Chassis\n JC474B\n\nH3C\n S9508E-V Routing-Switch Chassis\n 0235A38Q\n\nHP\n 9512 Switch Chassis\n JC125A\n\nHP\n A9512 Switch Chassis\n\nH3C\n S9512E Chassis w/ Fans\n 0235A38R\n\nHP\n 9512 Switch Chassis\n JC125B\n\nHP\n A9512 Switch Chassis\n\nH3C\n S9512E Routing-Switch Chassis\n 0235A0G7\n\nHP\n A3100 (LS6MCFL1UB) Ethernet Switch\n JE545A\n\nH3C\n S3100 Ethernet Switch,LS6MCFL1UB,Sin\n 0231A65T\n\nHP\n A3100-16 DC SI 2-slot Switch\n JD302A\n\nH3C\n S3100-16C-SI - model LS-S3100-16C-SI-DC-OVS\n 0235A14V\n\nHP\n A3100-16 SI with 2 External Slots Switch\n JD308A\n\nH3C\n S3100-16C-SI - model LS-S3100-16C-SI-AC-OVS\n 0235A15G\n\nHP\n A3100-24 DC SI 2-slot Switch\n JD303A\n\nH3C\n S3100-26C-SI - model LS-S3100-26C-SI-DC-OVS\n 0235A14W\n\nHP\n A3100-24 SI 2-slot Switch\n JD309A\n\nH3C\n S3100-26C-SI - model LS-S3100-26C-SI-AC-OVS\n 0235A15H\n\nHP\n A3100-26C-EPON-EI Switch\n JG059A\n\nHP\n A3100-8 SI 1-slot Switch\n JD310A\n\nH3C\n S3100-8C-SI - model LS-S3100-8C-SI-DC-OVS\n 0235A15J\n\nHP\n A5100-16G EI Switch\n JD351A\n\nH3C\n S5100-16P-EI - model LS-5100-16P-EI-OVS-H3\n 0235A21Q\n\nHP\n A5100-16G SI Switch\n JD356A\n\nH3C\n S5100-16P-SI - model LS-5100-16P-SI-OVS-H3\n 0235A22R\n\nHP\n A5100-16G-PoE EI Switch\n JD353A\n\nH3C\n S5100-16P-PWR-EI - model LS-5100-16P-PWR-EI-OVS\n 0235A22K\n\nHP\n A5100-24G EI Switch\n JD346A\n\nH3C\n S5100-24P-EI - model LS-5100-24P-EI-OVS\n 0235A08K\n\nHP\n A5100-24G EI Switch with SFP Uplink\n JD344A\n\nH3C\n S5100-26C-EI - model LS-5100-26C-EI-OVS\n 0235A08F\n\nHP\n A5100-24G SI Switch\n JD348A\n\nH3C\n S5100-24P-SI - model LS-5100-24P-SI-OVS-H3\n 0235A20Q\n\nHP\n A5100-24G-PoE EI Switch\n JD354A\n\nH3C\n S5100-26C-PWR-EI - model LS-5100-26C-PWR-EI-OVS\n 0235A22M\n\nHP\n A5100-48G EI Switch\n JD347A\n\nH3C\n S5100-48P-EI - model LS-5100-48P-EI-OVS\n 0235A08M\n\nHP\n A5100-48G EI Switch with SFP Uplink\n JD345A\n\nH3C\n S5100-50C-EI - model LS-5100-50C-EI-OVS\n 0235A08H\n\nHP\n A5100-48G SI Switch\n JD349A\n\nH3C\n S5100-48P-SI - model LS-5100-48P-SI-OVS-H3\n 0235A20R\n\nHP\n A5100-48G-PoE EI Switch\n JD355A\n\nH3C\n S5100-50C-PWR-EI - model LS-5100-50C-PWR-EI-OVS\n 0235A22P\n\nHP\n A5100-8G EI Switch\n JD350A\n\nH3C\n S5100-8P-EI - model LS-5100-8P-EI-OVS-H3\n 0235A21P\n\nHP\n A5100-8G SI Switch\n JD357A\n\nH3C\n S5100-8P-SI - model LS-5100-8P-SI-OVS-H3\n 0235A22T\n\nHP\n A5100-8G-PoE EI Switch\n JD352A\n\nH3C\n S5100-8P-PWR-EI - model LS-5100-8P-PWR-EI-OVS\n 0235A22H\n\nHP\n A5120-24G EI Switch\n JE066A\n\nH3C\n S5120-24P-EI 24GE Plus 4ComboSFP\n 0235A0BQ\n\nHP\n A5120-24G EI Switch with 2 Interface Slots\n JE068A\n\nH3C\n S5120-28C-EI 24GE Plus 4Combo Plus 2Slt\n 0235A0BS\n\nHP\n A5120-24G-PoE EI 2-slot Switch\n JE070A\n\nH3C\n S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE\n 0235A0BU\n\nHP\n A5120-48G EI Switch\n JE067A\n\nH3C\n S5120-48P-EI 48GE Plus 4ComboSFP\n 0235A0BR\n\nHP\n A5120-48G EI Switch with 2 Interface Slots\n JE069A\n\nH3C\n S5120-52C-EI 48GE Plus 4Combo Plus 2Slt\n 0235A0BT\n\nHP\n A5120-48G-PoE EI 2-slot Switch\n JE071A\n\nH3C\n S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE\n 0235A0BV\n\nHP\n A6604 Router Bundle with RPE-X1 Modules and Power Supply\n JE528A\n\nH3C\n SR6604 Router Bundle with RPE-X1 and Pow\n 0150A12B\n\nHP\n A6604 Router with 2 RPE-X1 Modules\n JC158A\n\nH3C\n RT-SR6604-OVS Plus 2 RPE-X1 Plus 2 AC-H3\n 0150A12C\n\nHP\n A6608 Router (RT-SR6608-OVS+2 RPE-X1+2 AC-H3) Bundle\n JE527A\n\nH3C\n RT-SR6608-OVS Plus 2 RPE-X1 Plus 2 AC-H3\n 0150A12A\n\nHP\n A6608 Router Bundle with RPE-X1 Modules and Power Supply\n JE526A\n\nH3C\n SR6608 Router Bundle with RPE-X1 and Pow\n 0150A129\n\nHP\n A9508 Switch Chassis\n JC124A\n\nH3C\n S9505E Chassis w/ Fans\n 0235A38P\n\nHP\n A-MSR20-15 A Multi-service Router\n JD670A\n\nH3C\n MSR 20-15 A\n 0235A31Q\n\nHP\n A-MSR20-15 AW Multi-service Router\n JD671A\n\nH3C\n MSR 20-15 A W\n 0235A31R\n\nHP\n A-MSR20-15 I Multi-service Router\n JD672A\n\nH3C\n MSR 20-15 I\n 0235A31N\n\nHP\n A-MSR20-15 IW Multi-service Router\n JD667A\n\nH3C\n MSR 20-15 IW\n 0235A31P\n\nHP\n A-MSR20-21 Router\n JD432A\n\nH3C\n MSR-20-21 Router\n 0235A19J\n\nHP\n A-MSR20-21 Router\n JD663A\n\nH3C\n MSR 20-21\n 0235A325\n\nHP\n A-MSR30-20 Multi-service Router Security Bundle\n JF286A\n\nH3C\n MSR 30-20 Router Host\n RTVZ33020AS, 0235A20S\n\nHP\n A-MSR30-40, RT-MSR3040-AC-OVS-AS-H3 Multi-service Router\n JF232A\n\nH3C\n RT-MSR3040-AC-OVS-AS-H3\n 0235A20V\n\nHP\n AR 18-31E Router\n JD172A\n\nH3C\n AR18-31E Router\n 0235A09T\n\nHP\n E4200-24 SI Switch\n JE013A\n\n3Com\n 4200-SI Switch 28 Port\n 3C17304A\n\nHP\n E4200-24G Switch\n JE016A\n\n3Com\n 4200G Switch 24-Port\n 3CR17661-91\n\nHP\n E4200-24G-PoE Switch\n JE020A\n\n3Com\n 4200G Switch PWR 24-Port\n 3CR17671-91\n\nHP\n E4200-48 SI Switch\n JE012A\n\n3Com\n 4200-SI Switch 50 Port\n 3C17302A\n\nHP\n E4200-48G Switch\n JE018A\n\n3Com\n 4200G Switch 48-Port\n 3CR17662-91\n\nHP\n E4210 8-port (TAA) Switch\n JE023A\n\n3Com\n 4210 Switch 9-Port TAA\n 3CR17331TAA-91\n\nHP\n E4210-16-PoE Switch\n JE031A\n\n3Com\n 4210 Switch PWR 18-Port\n 3CR17342-91\n\nHP\n E4210-8-PoE (TAA) Switch\n JE030A\n\n3Com\n 4210 Switch PWR 9P TAA\n 3CR17341TAA-91\n\nHP\n E4500-24G (TAA) Switch\n JE058A\n\n3Com\n 4500G Switch 24-Port TAA\n 3CR17761TAA-91\n\nHP\n E4500-24G Switch\n JE057A\n\n3Com\n 4500G Switch 24-Port\n 3CR17761-91\n\nHP\n E4500-24G-PoE (TAA) Switch\n JE062A\n\n3Com\n 4500G PWR Switch 24-Port TAA\n 3CR17771TAA-91\n\nHP\n E4500-48G (TAA) Switch\n JE060A\n\n3Com\n 4500G Switch 48-Port TAA\n 3CR17762TAA-91\n\nHP\n E4500-48G Switch\n JE059A\n\n3Com\n 4500G Switch 48-Port\n 3CR17762-91\n\nHP\n E4500-48G-PoE (TAA) Switch\n JE064A\n\n3Com\n 4500G PWR Switch 48-Port TAA\n 3CR17772TAA-91\n\nHP\n E5500-24 EI (TAA) Switch\n JE102A\n\n3Com\n TAA 5500-EI Switch 28-Port\n 3CR17161TAA-91\n\nHP\n E5500-24 SI Switch\n JE099A\n\n3Com\n SS4 5500-SI Switch 28 Port\n 3CR17151-91\n\nHP\n E5500-24 Switch\n JE101A\n\n3Com\n 5500-EI Switch 28-Port\n 3CR17161-91\n\nHP\n E5500-24G (TAA) Switch\n JE089A\n\n3Com\n TAA COMPLIANT 5500G-EI 24-Port\n 3CR17250TAA-91\n\nHP\n E5500-24G Switch\n JE088A\n\n3Com\n 5500G-EI Switch 24 Port\n 3CR17250-91\n\nHP\n E5500-24G-PoE (TAA) Switch\n JE093A\n\n3Com\n TAA COMPLIANT 5500G-EI PWR 24P\n 3CR17252TAA-91\n\nHP\n E5500-24G-PoE Switch\n JE092A\n\n3Com\n 5500G-EI Switch PWR 24-Port\n 3CR17252-91\n\nHP\n E5500-24G-SFP (TAA) Switch\n JE097A\n\n3Com\n TAA COMPLIANT 5500G-EI SFP 24P\n 3CR17258TAA-91\n\nHP\n E5500-24G-SFP Switch\n JE096A\n\n3Com\n 5500G-EI Switch SFP 24-Port\n 3CR17258-91\n\nHP\n E5500-24-PoE EI (TAA) Switch\n JE106A\n\n3Com\n TAA 5500-EI PWR Switch 28-Port\n 3CR17171TAA-91\n\nHP\n E5500-24-PoE Switch\n JE105A\n\n3Com\n 5500-EI PWR Switch 28-Port\n 3CR17171-91\n\nHP\n E5500-24-SFP Switch\n JE109A\n\n3Com\n 5500-EI Switch 28-Port FX\n 3CR17181-91\n\nHP\n E5500-24-SPF EI (TAA) Switch\n JE110A\n\n3Com\n TAA SWITCH 5500-EI 28-Port FX\n 3CR17181TAA-91\n\nHP\n E5500-48 EI (TAA) Switch\n JE104A\n\n3Com\n TAA SWITCH 5500-EI 52-Port\n 3CR17162TAA-91\n\nHP\n E5500-48 SI Switch\n JE100A\n\n3Com\n SS4 SWITCH 5500-SI 52 Port\n 3CR17152-91\n\nHP\n E5500-48 Switch\n JE103A\n\n3Com\n 5500-EI Switch 52-Port\n 3CR17162-91\n\nHP\n E5500-48G (TAA) Switch\n JE091A\n\n3Com\n TAA COMPLIANT 5500G-EI 48-Port\n 3CR17251TAA-91\n\nHP\n E5500-48G Switch\n JE090A\n\n3Com\n 5500G-EI Switch 48-Port\n 3CR17251-91\n\nHP\n E5500-48G-PoE (TAA) Switch\n JE095A\n\n3Com\n TAA COMPLIANT 5500G-EI PWR 48P\n 3CR17253TAA-91\n\nHP\n E5500-48G-PoE Switch\n JE094A\n\n3Com\n 5500G-EI PWR Switch 48-Port\n 3CR17253-91\n\nHP\n E5500-48-PoE EI (TAA) Switch\n JE108A\n\n3Com\n TAA 5500-EI PWR Switch 52-Port\n 3CR17172TAA-91\n\nHP\n E5500-48-PoE Switch\n JE107A\n\n3Com\n 5500-EI PWR Switch 52-Port\n 3CR17172-91\n\nHP\n E7902 Switch Chassis\n JE164A\n\n3Com\n S7902E Chassis Kit w/ fans\n 3CS7902E\n\nHP\n E7903 1 Fabric Slot Switch Chassis\n JE166A\n\n3Com\n S7903E-S Chassis Kit w/ fans\n 3CS7903ES\n\nHP\n E7903 Switch Chassis\n JE165A\n\n3Com\n S7903E Chassis Kit w/ fans\n 3CS7903E\n\nHP\n E7906 Switch Chassis\n JE167A\n\n3Com\n S7906E Chassis Kit w/ fans\n 3CS7906E\n\nHP\n E7906 Vertical Switch Chassis\n JE168A\n\n3Com\n S7906E-V Chassis Kit w/ fans\n 3CS7906EV\n\nHP\n F1000-E VPN Firewall Appliance\n JD272A\n\nH3C\n F1000-E VPN Firewall\n 0235A26G\n\nHP\n F1000-EI VPN Firewall Appliance\n JG214A\n\nHP\n F1000-S-EI VPN Firewall Appliance\n JG213A\n\nHP\n F5000 Firewall Main Processing Unit\n JG215A\n\nHP\n MSR 50-40 Router\n JD655A\n\nH3C\n MSR 50-40 Chassis\n 0235A20N\n\nHP\n MSR20-10 Router\n JD431A\n\nH3C\n MSR 20-10\n 0235A0A7\n\nHP\n MSR20-11 Router\n JD673A\n\nH3C\n MSR 20-11\n 0235A31V\n\nHP\n MSR20-11 Router\n JF239A\n\nH3C\n RT-MSR2011-AC-OVS-H3\n 0235A395\n\nHP\n MSR20-12 Router\n JD674A\n\nH3C\n MSR 20-12\n 0235A32E\n\nHP\n MSR20-12 Router\n JF241A\n\nH3C\n RT-MSR2012-AC-OVS-H3\n 0235A396\n\nHP\n MSR20-12-T Router\n JD676A\n\nH3C\n MSR 20-12 T1\n 0235A32B\n\nHP\n MSR20-12-T Router\n JF806A\n\nH3C\n RT-MSR2012-T-AC-OVS-H3\n 0235A398\n\nHP\n MSR20-12-T-W Router (NA)\n JG209A\n\nHP\n MSR20-12-W Router\n JD675A\n\nH3C\n MSR20-12 W\n 0235A32G\n\nHP\n MSR20-12-W Router\n JF807A\n\nH3C\n RT-MSR2012-AC-OVS-W-H3\n 0235A397\n\nHP\n MSR20-13 Router\n JD668A\n\nH3C\n MSR 20-13\n 0235A31W\n\nHP\n MSR20-13 Router\n JF240A\n\nH3C\n RT-MSR2013-AC-OVS-H3\n 0235A390\n\nHP\n MSR20-13-W Router\n JD669A\n\nH3C\n MSR 20-13 W\n 0235A31X\n\nHP\n MSR20-13-W Router\n JF808A\n\nH3C\n RT-MSR2013-AC-OVS-W-H3\n 0235A391\n\nHP\n MSR20-13-W Router (NA)\n JG210A\n\nHP\n MSR20-15 Router\n JF817A\n\nH3C\n MSR 20-15 Router Host (AC), 1 FE, 4 LSW, 1 ADSLoPOTS, 1 DSIC\n 0235A0A8\n\nHP\n MSR20-15-A Router\n JF237A\n\nH3C\n RT-MSR2015-AC-OVS-A-H3\n 0235A392\n\nHP\n MSR20-15-A-W Router\n JF809A\n\nH3C\n RT-MSR2015-AC-OVS-IW-H3\n 0235A38V\n\nHP\n MSR20-15-I Router\n JF236A\n\nH3C\n RT-MSR2015-AC-OVS-I-H3\n 0235A394\n\nHP\n MSR20-15-I-W Router\n JF238A\n\nH3C\n RT-MSR2015-AC-OVS-AW-H3\n 0235A393\n\nHP\n MSR20-20 Router\n JD662A\n\nHP\n A-MSR20-20 Router\n\nH3C\n MSR 20-20\n 0235A19H\n\nHP\n MSR20-20 Router\n JF283A\n\nH3C\n RT-MSR2020-AC-OVS-H3C\n 0235A324\n\nHP\n MSR20-21 Router\n JD663B\n\nHP\n MSR20-40 Router\n JD664A\n\nH3C\n MSR 20-40\n 0235A19K\n\nHP\n MSR20-40 Router\n JF228A\n\nH3C\n RT-MSR2040-AC-OVS-H3\n 0235A326\n\nHP\n MSR30-10 DC Router\n JG184A\n\nHP\n MSR30-10 Router\n JF816A\n\nH3C\n MSR 30-10 Router Host (AC), 2FE, 2SIC, 1XMIM, 256DDR\n 0235A39H\n\nHP\n MSR30-11 Router\n JF800A\n\nH3C\n RT-MSR3011-AC-OVS-H3\n 0235A29L\n\nHP\n MSR30-11E Router\n JG182A\n\nHP\n MSR30-11F Router\n JG183A\n\nHP\n MSR30-16 PoE Router\n JD659A\n\nH3C\n MSR 30-16 POE\n 0235A238\n\nHP\n MSR30-16 PoE Router\n JF234A\n\nH3C\n RT-MSR3016-AC-POE-OVS-H3\n 0235A321\n\nHP\n MSR30-16 Router\n JD665A\n\nH3C\n MSR 30-16\n 0235A237\n\nHP\n MSR30-16 Router\n JF233A\n\nH3C\n RT-MSR3016-AC-OVS-H3\n 0235A327\n\nHP\n MSR30-16 Router with VCX and 4-port FXO and 2-port FXS Modules\n JD025A\n\nHP\n A-MSR30-16 Router with VCX and 4-port FXO and 2-port FXS Modules\n\n3Com\n MSR 3016 VCX CPM 4FXO/2FXS Bundle\n 3CRBVCXMSR03A\n\nHP\n MSR30-16 Router with VCX Enterprise Branch Communications MIM Module\n JD024A\n\nHP\n A-MSR30-16 Router with VCX Ent MIM Module\n\n3Com\n MSR 3016 VCX Ent MIM Bundle\n 3CRBVCXMSR02A\n\nHP\n MSR30-20 DC Router\n JF235A\n\nH3C\n RT-MSR3020-DC-OVS-H3\n 0235A267\n\nHP\n MSR30-20 PoE Router\n JD660A\n\nH3C\n MSR 30-20 POE\n 0235A239\n\nHP\n MSR30-20 PoE Router\n JF802A\n\nH3C\n RT-MSR3020-AC-POE-OVS-H3\n 0235A322\n\nHP\n MSR30-20 Router\n JD666A\n\nH3C\n MSR 30-20\n 0235A19L\n\nHP\n MSR30-20 Router\n JF284A\n\nH3C\n MSR 30-20 Router\n 0235A328\n\nHP\n MSR30-40 DC Router\n JF287A\n\nH3C\n MSR 30-40 Router Host (DC)\n 0235A268\n\nHP\n MSR30-40 PoE Router\n JD661A\n\nH3C\n MSR 30-40 POE\n 0235A25R\n\nHP\n MSR30-40 PoE Router\n JF803A\n\nH3C\n RT-MSR3040-AC-POE-OVS-H3\n 0235A323\n\nHP\n MSR30-40 Router\n JD657A\n\nH3C\n MSR 30-40\n 0235A20J\n\nHP\n MSR30-40 Router\n JF229A\n\nH3C\n RT-MSR3040-AC-OVS-H\n 0235A299\n\nHP\n MSR30-40 Router with VCX and 8-port BRI and 4-port FXS Modules\n JD027A\n\n3Com\n MSR 3040 VCX CPM 8BRI/4FXS Bundle\n 3CRBVCXMSR06A\n\nHP\n MSR30-40 Router with VCX and 8-port FXO and 4-port FXS Modules\n JD026A\n\n3Com\n MSR 3040 VCX CPM 8FXO/4FXS Bundle\n 3CRBVCXMSR05A\n\nHP\n MSR30-40 Router with VCX and E1 and 4-port BRI and 4-port FXS Modules\n JD029A\n\nHP\n A-MSR30-40 Router with VCX and E1 and 4-port BRI and 4-port FXS Modules\n\n3Com\n MSR 3040 VCX CPM E1/4BRI/4FXS Bundle\n 3CRBVCXMSR08A\n\nHP\n MSR30-40 Router with VCX and T1 and 4-port FX0 and 4-port FXS Modules\n JD028A\n\nHP\n A-MSR30-40 Router with VCX and T1 and 4-port FX0 and 4-port FXS Modules\n\n3Com\n MSR 3040 VCX CPM T1/4FXO/4FXS Bundle\n 3CRBVCXMSR07A\n\nHP\n MSR30-40 Router with VCX MIM Module\n JD023A\n\n3Com\n MSR 3040 VCX Ent MIM Bundle\n 3CRBVCXMSR01A\n\nHP\n MSR30-60 DC Router\n JF801A\n\nH3C\n RT-MSR3060-DC-OVS-H3\n 0235A269\n\nHP\n MSR30-60 PoE Router\n JD654A\n\nH3C\n MSR 30-60 POE\n 0235A25S\n\nHP\n MSR30-60 PoE Router\n JF804A\n\nH3C\n RT-MSR3060-AC-POE-OVS-H3\n 0235A296\n\nHP\n MSR30-60 Router\n JD658A\n\nH3C\n MSR 30-60\n 0235A20K\n\nHP\n MSR30-60 Router\n JF230A\n\nH3C\n RT-MSR3060-AC-OVS-H3\n 0235A320\n\nHP\n MSR50-40 DC Router\n JF285A\n\nHP\n A-MSR50-40 DC Router Chassis\n\nH3C\n MSR5040-DC-OVS-H3C\n 0235A20P\n\nHP\n MSR50-40 Router\n JD433A\n\nH3C\n MSR 50-40 Router\n 0235A297\n\nHP\n MSR50-60 Router\n JD656A\n\nH3C\n MSR 50-60 Chassis\n 0235A20L\n\nHP\n MSR50-60 Router\n JF231A\n\nH3C\n RT-MSR5060-AC-OVS-H3\n 0235A298\n\nHP\n MSR50-60 Router Chassis with DC Power Supply\n JF640A\n\nHP\n MSR900 2-port FE WAN / 4 -port FE LAN Router\n JF812A\n\nH3C\n MSR 900 Router, 2 FE WAN, 4 FE LAN, 256DDR\n 0235A0BX\n\nHP\n MSR900-W Router\n JF814A\n\nH3C\n MSR 900 Router with 802.11b/g, 2 FE WAN, 4 FE LAN, 256DDR, 802.11b\n 0235A0C2\n\nHP\n MSR900-W Router (NA)\n JG207A\n\nHP\n MSR920 2-port FE WAN / 8-port FE LAN / 802.11b/g Router\n JF815A\n\nH3C\n MSR 920 Router with 802.11b/g, 2 FE WAN, 8 FE LAN, 256DDR\n 0235A0C4\n\nHP\n MSR920 Router\n JF813A\n\nH3C\n MSR 920 Router, 2 FE WAN, 8 FE LAN, 256DDR\n 0235A0C0\n\nHP\n MSR920-W Router (NA)\n JG208A\n\nHP\n 6040 Router Chassis\n JD967A\n\n3Com\n 6040 Router Chassis\n 3C13840\n\nHP\n 6080 Router Chassis\n JD972A\n\n3Com\n 6080 Router Chassis 3C13880\n\nHP\n S5600-26C Ethernet Switch\n JD393A\n\nH3C\n S5600-26C Ethernet Switch\n 0235A11F\n\nHP\n S5600-26C-PoE Ethernet Switch\n JD394A\n\nH3C\n S5600-26C-PWR Ethernet Switch\n 0235A11G\n\nHP\n S5600-26F Ethernet Switch\n JD395A\n\nH3C\n S5600-26F Ethernet Switch\n 0235A11H\n\nHP\n S5600-50C Ethernet Switch\n JD391A\n\nH3C\n S5600-50C Ethernet Switch\n 0235A11D\n\nHP\n S5600-50C PoE Ethernet Switch\n JD392A\n\nH3C\n S5600-50C-PWR Ethernet Switch\n 0235A11E\n\nHP\n S9502 (LS-9502-OVS-H3) Routing Switch Chassis\n JE551A\n\nH3C\n LS-9502-OVS-H3\n 0235A21X\n\nHP\n S9505 Routing Switch Chassis\n JC055A\n\nH3C\n S9505 Routing Switch Chassis\n 0235A17A\n\nHP\n S9508 Routing Switch Chassis\n JC054A\n\nH3C\n S9508 Routing Switch Chassis\n 0235A16T\n\nHP\n S9512 Routing Switch Chassis\n JC056A\n\nH3C\n S9512 Routing Switch Chassis\n 0235A17B\n\nHP\n U200-A UTM Appliance\n JD275A\n\nHP\n A-U200-A Unified Threat Management Appliance\n\nH3C\n SecPath U200-A\n 0235A36Q\n\nHP\n U200-S UTM Appliance\n JD273A\n\nHP\n A-U200-S Unified Threat Management Appliance\n\nH3C\n SecPath U200-S\n 0235A36N\n\nHP\n WX5002 Access Controller\n JD447A\n\nH3C\n WX5002 Access Controller\n 0235A34B\n\nHP\n WX5002 Access Controller\n JD447B\n\nHP\n A-WX5002 Access Controller\n\nH3C\n WX5002 Access Controller\n 0235A34B\n\nHP\n WX5002 Access Controller\n JD468A\n\n3Com\n WX 5002 Access Controller\n 3CRUWX500275\n\nHP\n WX5004 Access Controller\n JD448A\n\nHP\n A-WX5004 Access Controller\n\nH3C\n WX5004 Access Controller\n 0235A35J\n\nHP\n WX5004 Access Controller\n JD448B\n\nHP\n A-WX5004 Access Controller\n\nH3C\n WX5004 4-Port 1000BASE-X/1000BASE-T (Combo) Access Controller\n 0235A0GD\n\nHP\n WX5004 Access Controller\n JD469A\n\n3Com\n WX 5004 Access Controller\n 3CRUWX500475\n\nHP\n WX6103 Access Controller Support up to 128 Access Points\n JF247A\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2012-3268    (AV:N/AC:M/Au:N/C:C/I:C/A:C)       9.3\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks Kurt Grutzmacher (grutz@jingojango.net)\nand CERT/CC for reporting these vulnerabilities to security-alert@hp.com\n\nRESOLUTION\n\nIf your product is listed as vulnerable, a software update to address this\nissue may be available for download. \n\nUsing a web browser, go to http://www.hp.com/networking/support . \n\nEnter the product number or product description into Auto Search. \n\nSelect the displayed result and click \u0027 Display selected \u0027. \n\nClick Software Downloads from the list of choices provided below. \n\nThere is a section called \u0027 Early Availability \u0027 which will contain software\nthat addresses this issue. The descriptive text of the software should\nindicate SSRT100920 as a further indication that the software addresses this\nissue. There are important considerations about using Early Availability\nsoftware:\n\nEarly Availability software is recommended for use in:\n\nLab testing prior to upgrading a production network\n\nEvaluation of new features prior to general deployment\n\nEvaluation with specific applications prior to wider deployment\n\nPlease evaluate this software thoroughly prior to deployment in a production\nenvironment. \n\nIf your product is listed as vulnerable and software is not available via the\nprocess outlined previously, you may contact HP Networking support directly\nby going to this URL:\nhttps://h10145.www1.hp.com/help/Help_ContactInfo.aspx?cwp=2\u0026SelectedTab=2 and\nclicking on your location to get the technical support telephone number. \nThere are other support options such as Electronic Case submission available. \n\nIf your product is listed as vulnerable and a software update is not yet\navailable, HP is currently working to address these vulnerabilities with a\nnew software update. This Security Bulletin will be revised when the software\nupdate is available. Prior to the update being made available and you have an\nimpacted product, the following mitigations are recommended:\n\nMoving to SNMPv3 with authentication and privacy for all network management\napplications. \n\nUsing SNMPv3s VACM to block access to the H3C-USER-MIB for SNMPv1/v2c users. \n\nHere is an example configuration using the snmp-agent command:\n\nsnmp-agent mib-view include readView iso\nsnmp-agent mib-view exclude readView hh3cUserPassword\nsnmp-agent mib-view include writeView iso\nsnmp-agent mib-view exclude writeView hh3cUserPassword\nsnmp-agent mib-view include notifyView iso\nsnmp-agent group v1 testV1ReadGroup read-view readView\nsnmp-agent usm-user v1 testV1ReadUser testV1ReadGroup\nsnmp-agent group v1 testV1WriteGroup read-view readView write-view writeView\nnotify-view notifyView\nsnmp-agent usm-user v1 testV1WriteUser testV1WriteGroup\nsnmp-agent community read testV1ReadUser mib-view readView\nsnmp-agent community write testV1WriteUser mib-view writeView\nYou may also further control SNMP MIB access using an ACL. \nFor v1/2\nsnmp-agent community write testV1WriteUser mib-view writeView acl\n\u003cacl-number\u003e\nsnmp-agent community read testV1ReadUser mib-view readView acl \u003cacl-number\u003e\nFor v3\nsnmp-agent group v3 testV3Group privacy read-view readView write-view\nwriteView acl \u003cacl-number\u003e\nsnmp-agent usm-user v3 testV3User testV3Group authentication-mode sha\n\u003cauth-passwd\u003e privacy-mode aes128 \u003cpriv-password\u003e\n\nConfigure SNMP community strings with ACLs to limit access to SNMP to just\nnetwork management workstation(s). \n\nHere is an example configuration:\n\n#\nacl number 2001\nrule 1 permit source 192.168.100.0 0.0.0.255\nrule 1 permit source 192.168.100.1 0\nacl number 2002\nrule 1 permit source 192.168.100.1 0\n#\nsnmp-agent community read READONLY acl 2001\nsnmp-agent community write READONLY acl 2002\n#\n\nDisable all local user administrative accounts and use RADIUS or TACACS+\nauthentication instead. \n\nDisable SNMP. \n\nRegarding secure use of switch or router configuration information:\n\nAvoid using plaintext protocols such as TFTP or FTP to transfer configuration\nfiles that contain local user accounts. \n\nControl user privileges on displaying any configuration information or\ndisplaying the content of a configuration file. For example,  display\ncurrent-configuration  or  more \u003cconfiguration file\u003e \u0027. \n\nHISTORY\nVersion:1 (rev.1) - 22 October 2012 Initial release\nVersion:2 (rev.2) - 25 October 2012 Updated product list and the summary\nsection. \n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niEYEARECAAYFAlCJl+QACgkQ4B86/C0qfVl9cgCcDoJkIjTWzBdeJdAdOimzRNg7\nYJgAoPmQ5ycXX07g21tV9nvSaLLvPPE5\n=cmPB\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "BID",
        "id": "56183"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "db": "PACKETSTORM",
        "id": "117623"
      },
      {
        "db": "PACKETSTORM",
        "id": "117625"
      },
      {
        "db": "PACKETSTORM",
        "id": "117678"
      }
    ],
    "trust": 3.51
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-56549",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-3268",
        "trust": 4.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#225404",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "56183",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1027694",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "117623",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "117678",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "117625",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "db": "BID",
        "id": "56183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "PACKETSTORM",
        "id": "117623"
      },
      {
        "db": "PACKETSTORM",
        "id": "117625"
      },
      {
        "db": "PACKETSTORM",
        "id": "117678"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "id": "VAR-201302-0018",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      }
    ],
    "trust": 1.5981997663414633
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:58:12.956000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBHF02819 SSRT100920 rev.1 - HP, 3COM, and H3C Routers \u0026 Switches, Remote Disclosure of Information",
        "trust": 0.8,
        "url": "https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03515685\u0026ac.admitted=1351149896696.876444892.492883150"
      },
      {
        "title": "Huawei-SA-20121025-01 - SNMP vulnerability on Huawei multiple products",
        "trust": 0.8,
        "url": "http://support.huawei.com/enterprise/newsreadaction.action?newtype=0301\u0026contentid=news1000001165\u0026idabspath=0301_10001\u0026nameabspath=services%2520news"
      },
      {
        "title": "Multiple HP Product Information Disclosure Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/24211"
      },
      {
        "title": "HP Repair measures for information disclosure vulnerabilities of various products",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146562"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-522",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-200",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/225404"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/56183"
      },
      {
        "trust": 1.7,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/moro-8zdjdp"
      },
      {
        "trust": 1.7,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03515685"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1027694"
      },
      {
        "trust": 1.6,
        "url": "https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03515685\u0026ac.admitted=1351086123601.876444892.492883150"
      },
      {
        "trust": 1.6,
        "url": "http://support.huawei.com/enterprise/newsreadaction.action?newtype=0301\u0026contentid=news1000001165\u0026idabspath=0301_10001\u0026nameabspath=services%2520news"
      },
      {
        "trust": 1.0,
        "url": "http://support.huawei.com/support/pages/news/newsinfoaction.do?doc_id=in0000054930\u0026colid=rootenweb%7cco0000000170\u0026actionflag=view"
      },
      {
        "trust": 0.8,
        "url": "http://support.huawei.com/enterprise/newsreadaction.action?newtype=0301\u0026contentid=news1000001069\u0026idabspath=0301_10001\u0026nameabspath=services%2520news"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3268"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu225404/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3268"
      },
      {
        "trust": 0.6,
        "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03515685"
      },
      {
        "trust": 0.6,
        "url": "http://support.huawei.com/support/pages/news/newsinfoaction.do?doc_id=in0000054930\u0026colid=rootenweb"
      },
      {
        "trust": 0.3,
        "url": "http://www.hp.com/"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3268"
      },
      {
        "trust": 0.2,
        "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 0.2,
        "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
      },
      {
        "trust": 0.2,
        "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
      },
      {
        "trust": 0.2,
        "url": "http://www.hp.com/networking/support"
      },
      {
        "trust": 0.2,
        "url": "https://h10145.www1.hp.com/help/help_contactinfo.aspx?cwp=2\u0026selectedtab=2"
      },
      {
        "trust": 0.1,
        "url": "http://support.huawei.com/enterprise/newsreadaction.action?newtype=0301\u0026amp;contentid=news1000001165\u0026amp;idabspath=0301_10001\u0026amp;nameabspath=services%2520news"
      },
      {
        "trust": 0.1,
        "url": "http://support.huawei.com/support/pages/news/newsinfoaction.do?doc_id=in0000054930\u0026amp;colid=rootenweb%7cco0000000170\u0026amp;actionflag=view"
      },
      {
        "trust": 0.1,
        "url": "http://grutztopia.jingojango.net/"
      },
      {
        "trust": 0.1,
        "url": "http://enigmail.mozdev.org/"
      },
      {
        "trust": 0.1,
        "url": "https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03515685\u0026ac.admitted=1350939600802.876444892.492883150"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/grutz/h3c-pt-tools"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "db": "BID",
        "id": "56183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "PACKETSTORM",
        "id": "117623"
      },
      {
        "db": "PACKETSTORM",
        "id": "117625"
      },
      {
        "db": "PACKETSTORM",
        "id": "117678"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "db": "BID",
        "id": "56183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "db": "PACKETSTORM",
        "id": "117623"
      },
      {
        "db": "PACKETSTORM",
        "id": "117625"
      },
      {
        "db": "PACKETSTORM",
        "id": "117678"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-10-24T00:00:00",
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "date": "2012-10-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "date": "2013-02-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "date": "2012-10-23T00:00:00",
        "db": "BID",
        "id": "56183"
      },
      {
        "date": "2012-10-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "date": "2012-10-23T23:55:55",
        "db": "PACKETSTORM",
        "id": "117623"
      },
      {
        "date": "2012-10-24T15:05:01",
        "db": "PACKETSTORM",
        "id": "117625"
      },
      {
        "date": "2012-10-26T15:13:41",
        "db": "PACKETSTORM",
        "id": "117678"
      },
      {
        "date": "2013-02-01T11:49:52.647000",
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "date": "2012-10-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-10-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#225404"
      },
      {
        "date": "2012-10-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6060"
      },
      {
        "date": "2018-08-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56549"
      },
      {
        "date": "2012-10-24T17:31:00",
        "db": "BID",
        "id": "56183"
      },
      {
        "date": "2013-02-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005125"
      },
      {
        "date": "2023-11-07T02:11:32.310000",
        "db": "NVD",
        "id": "CVE-2012-3268"
      },
      {
        "date": "2021-04-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP/H3C and Huawei networking equipment h3c-user snmp vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#225404"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-540"
      }
    ],
    "trust": 0.6
  }
}

var-201306-0006
Vulnerability from variot

The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================

[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)

[VULNERABILITY INFORMATION] Class: Information disclosure

[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600

Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.

A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.

from Crypto.Cipher import DES

def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')

def ascii_to_binary(s): assert len(s) == 24

out = [0]*18
i = 0
j = 0

for i in range(0, len(s), 4):
    y = decode_char(s[i + 0])
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 1])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 2])
    y = (y | k) & 0xffffff
    y = (y << 6) & 0xffffff

    k = decode_char(s[i + 3])
    y = (y | k) & 0xffffff

    out[j+2] = chr(y       & 0xff)
    out[j+1] = chr((y>>8)  & 0xff)
    out[j+0] = chr((y>>16) & 0xff)

    j += 3

return "".join(out)

def decrypt_password(p): r = ascii_to_binary(p)

r = r[:16]

d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)

return r.rstrip("\x00")

[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141

[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.

[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "acu",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003c01spc100"
      },
      {
        "model": "acu",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "acu",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00spc100"
      },
      {
        "model": "ar g3",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "ar g3",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c01"
      },
      {
        "model": "ar g3",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r002c00spc200"
      },
      {
        "model": "atn",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "atn",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c01"
      },
      {
        "model": "cx200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "cx300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "cx600",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "e200e-b",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "model": "e200e-c",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "e200e-x1",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "model": "e200e-x2",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "model": "eudemon1000",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r006c02"
      },
      {
        "model": "eudemon1000e-u",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "eudemon1000e-x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "model": "eudemon100e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r007"
      },
      {
        "model": "eudemon200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "eudemon300",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r006c02"
      },
      {
        "model": "eudemon500",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r006c02"
      },
      {
        "model": "eudemon8000e-x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00spc600"
      },
      {
        "model": "ma5200g",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003"
      },
      {
        "model": "ma5200g",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "me60",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r005c00spc600"
      },
      {
        "model": "ne20",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r005"
      },
      {
        "model": "ne40",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "model": "ne40e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r007"
      },
      {
        "model": "ne5000e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v800r002"
      },
      {
        "model": "ne80",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "model": "ne80e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "model": "ne80e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "ne80e",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "nip100",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "model": "nip1000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "model": "nip200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "model": "nip2100",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "nip2200",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "nip5100",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "s2300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s2700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "s3300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s3300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s3300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s3700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "s5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s5300hi",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s5306",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s5306",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s5700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "s5700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s5700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s6300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s6300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s6700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s6700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "model": "s7700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r003"
      },
      {
        "model": "s9300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r006"
      },
      {
        "model": "svn2000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "svn3000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r002c02spc802b041"
      },
      {
        "model": "svn5000",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "svn5300",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v100r001c01b019"
      },
      {
        "model": "wlan ac 6605",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00"
      },
      {
        "model": "wlan ac 6605",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r001c00spc100"
      },
      {
        "model": "cx600",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "eudemon 8160e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "eudemon usg5500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "model": "e200x3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "h3c ar\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "r2209"
      },
      {
        "model": "ar 19\\/29\\/49",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "r2207"
      },
      {
        "model": "e200x7",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "e200 usg2200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "eudemon usg9500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001c00spc600"
      },
      {
        "model": "e200 usg5100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "eudemon usg5300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "ne40e\\/80e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "eudemon 8080e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "e200e-usg2100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "model": "ne40e\\/80e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "e200x5",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "ne40e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "model": "ne20e-x6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r005"
      },
      {
        "model": "eudemon usg9300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar 19/29/49",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "r2207"
      },
      {
        "model": "e200e-x3",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "e200e-x5",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "e200e-x7",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "e200e/usg2100",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r005c01"
      },
      {
        "model": "e200e/usg2200",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "e200e/usg5100",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "eudemon8080e",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "eudemon8160e",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "eudemonusg5300",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001"
      },
      {
        "model": "eudemonusg5500",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r002"
      },
      {
        "model": "eudemonusg9300",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "eudemonusg9500",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v200r001c00spc600"
      },
      {
        "model": "h3c ar",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "ar x9 series r2209"
      },
      {
        "model": "ne20e-x6",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "ne40e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "model": "ne40e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "ne40e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r001"
      },
      {
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r002"
      },
      {
        "model": "ne40e/80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v600r003"
      },
      {
        "model": "ne80e",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003"
      },
      {
        "model": "s2700",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r005"
      },
      {
        "model": "ne5000e v300r007",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ne5000e v800r002",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ma5200g v200r003",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ma5200g v300r003",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ne40e/80e",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "atn v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "atn v200r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ne40/ne80 v300r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ne20e-x6 v600r003",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ne20 v200r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "me60",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cx200/cx300 v100r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "acu v100r003c01spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "acu v200r001c00spc100",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "acu v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "wlan ac v200r001c00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6605"
      },
      {
        "model": "wlan ac v200r001c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6605"
      },
      {
        "model": "s9300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s7700",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300/s3300/s5300",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300/s3300/s5300/s2700/s3 v100r005",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s2300/s3300/s5300/s3300hi/ v100r006",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "s3300hi/s5300hi/s5306/s630 v200r001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar g3 v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar g3 v200r001c01",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar g3 v200r002c00spc200",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "h3c ar ar series r2209",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=x9"
      },
      {
        "model": "ar r2207",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "19/29/49\u003c="
      },
      {
        "model": "eudemon100e v200r007",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "eudemon200 v200r001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "eudemon300\u0026500\u00261000 v200r006c02",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "eudemon1000e-u/usg5300 v200r001",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "eudemon1000e-x/usg5500 v200r002",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "eudemon8080e\u00268160e/usg9300 v100r003c00",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "eudemon8000e-x/usg9500 v200r001c00spc600",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c="
      },
      {
        "model": "svn5300 v100r001c01b019",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn2000\u00265000 series v200r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "svn3000 v100r002c02spc802b041",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip100/200/1000 v100r001",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nip2100\u00262200\u00265100 v100r001c00",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "quidway series",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "quidway series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "0"
      },
      {
        "model": "me60 v600r002c07",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cx600 v600r003c00spc900",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cx600 v600r001",
        "scope": null,
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar r2207",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "19/29/49"
      },
      {
        "model": "me60 v600r005c00spc900",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cx600 v600r005c00spc900",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cx600 v600r003c00spca00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ar r2209",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "19/29/49"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r002",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "r2209",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r006c02",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "r2207",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r006c02",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r006c02",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r001",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r001c00spc600",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r001c00spc600",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r005c01",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r005c01",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r001",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r002",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v200r003c00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r005c01",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "v100r005c01",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Roberto Paleari and Ivan Speziale from Emaze Networks",
    "sources": [
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-4960",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 6.5,
            "collateralDamagePotential": "LOW-MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 5.1,
            "exploitability": "FUNCTIONAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2012-4960",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "CONFIRMED",
            "severity": "MEDIUM",
            "targetDistribution": "MEDIUM",
            "trust": 0.8,
            "userInterationRequired": null,
            "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2012-4960",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2013-08074",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-58241",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-4960",
            "trust": 2.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-08074",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201306-403",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-58241",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date:   13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale,   Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t        Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n   * Huawei Quidway series\n   * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n    if c == \u0027a\u0027:\n        r = \u0027?\u0027\n    else:\n        r = c\n    return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n    assert len(s) == 24\n\n    out = [0]*18\n    i = 0\n    j = 0\n\n    for i in range(0, len(s), 4):\n        y = decode_char(s[i + 0])\n        y = (y \u003c\u003c 6) \u0026 0xffffff\n\n        k = decode_char(s[i + 1])\n        y = (y | k) \u0026 0xffffff\n        y = (y \u003c\u003c 6) \u0026 0xffffff\n\n        k = decode_char(s[i + 2])\n        y = (y | k) \u0026 0xffffff\n        y = (y \u003c\u003c 6) \u0026 0xffffff\n\n        k = decode_char(s[i + 3])\n        y = (y | k) \u0026 0xffffff\n\n        out[j+2] = chr(y       \u0026 0xff)\n        out[j+1] = chr((y\u003e\u003e8)  \u0026 0xff)\n        out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n        j += 3\n\n    return \"\".join(out)\n\ndef decrypt_password(p):\n    r = ascii_to_binary(p)\n\n    r = r[:16]\n\n    d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n    r = d.decrypt(r)\n\n    return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      }
    ],
    "trust": 3.87
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-58241",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4960",
        "trust": 4.2
      },
      {
        "db": "CERT/CC",
        "id": "VU#948096",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "56510",
        "trust": 1.6
      },
      {
        "db": "JVN",
        "id": "JVNVU90202792",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "118054",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "38020",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "id": "VAR-201306-0006",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      }
    ],
    "trust": 2.164663294642857
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:44:36.277000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Huawei-SA-20120827-01-CX600",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
      },
      {
        "title": "Huawei multiple product encryption is not a strong vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/34800"
      },
      {
        "title": "Huawei patch for multiple product password encryption vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/25088"
      },
      {
        "title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
      },
      {
        "trust": 1.9,
        "url": "http://www.kb.cert.org/vuls/id/948096"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu90202792/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960"
      },
      {
        "trust": 0.6,
        "url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/56510"
      },
      {
        "trust": 0.4,
        "url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com/"
      },
      {
        "trust": 0.3,
        "url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "db": "BID",
        "id": "56510"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "db": "PACKETSTORM",
        "id": "118054"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "date": "2013-06-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "date": "2012-11-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "date": "2013-06-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "date": "2012-11-13T00:00:00",
        "db": "BID",
        "id": "56510"
      },
      {
        "date": "2013-06-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "date": "2012-11-13T23:22:55",
        "db": "PACKETSTORM",
        "id": "118054"
      },
      {
        "date": "2013-06-20T15:55:00.897000",
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "date": "2012-11-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "date": "2013-06-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-10-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#948096"
      },
      {
        "date": "2013-07-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-08074"
      },
      {
        "date": "2012-11-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-6517"
      },
      {
        "date": "2013-08-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-58241"
      },
      {
        "date": "2015-03-19T08:28:00",
        "db": "BID",
        "id": "56510"
      },
      {
        "date": "2013-08-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-006004"
      },
      {
        "date": "2013-08-22T03:59:17.713000",
        "db": "NVD",
        "id": "CVE-2012-4960"
      },
      {
        "date": "2012-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "date": "2021-11-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei networking equipment weak password cipher",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#948096"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201211-280"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-403"
      }
    ],
    "trust": 1.2
  }
}

cve-2012-3268
Vulnerability from cvelistv5
Published
2013-02-01 11:00
Modified
2024-08-06 19:57
Severity ?
Summary
Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:57:50.292Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBHF02819",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8ZDJDP"
          },
          {
            "name": "SSRT100962",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
          },
          {
            "name": "56183",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56183"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930\u0026colID=ROOTENWEB%7CCO0000000170\u0026actionFlag=view"
          },
          {
            "name": "SSRT100920",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
          },
          {
            "name": "VU#225404",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/225404"
          },
          {
            "name": "1027694",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027694"
          },
          {
            "name": "20121023 HP/H3C and Huawei SNMP Weak Access to Critical Data",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301\u0026contentId=NEWS1000001165\u0026idAbsPath=0301_10001\u0026nameAbsPath=Services%2520News"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "HPSBHF02819",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8ZDJDP"
        },
        {
          "name": "SSRT100962",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
        },
        {
          "name": "56183",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56183"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930\u0026colID=ROOTENWEB%7CCO0000000170\u0026actionFlag=view"
        },
        {
          "name": "SSRT100920",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
        },
        {
          "name": "VU#225404",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/225404"
        },
        {
          "name": "1027694",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027694"
        },
        {
          "name": "20121023 HP/H3C and Huawei SNMP Weak Access to Critical Data",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301\u0026contentId=NEWS1000001165\u0026idAbsPath=0301_10001\u0026nameAbsPath=Services%2520News"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2012-3268",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBHF02819",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8ZDJDP",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8ZDJDP"
            },
            {
              "name": "SSRT100962",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
            },
            {
              "name": "56183",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56183"
            },
            {
              "name": "http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930\u0026colID=ROOTENWEB|CO0000000170\u0026actionFlag=view",
              "refsource": "CONFIRM",
              "url": "http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930\u0026colID=ROOTENWEB|CO0000000170\u0026actionFlag=view"
            },
            {
              "name": "SSRT100920",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
            },
            {
              "name": "VU#225404",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/225404"
            },
            {
              "name": "1027694",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027694"
            },
            {
              "name": "20121023 HP/H3C and Huawei SNMP Weak Access to Critical Data",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html"
            },
            {
              "name": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html",
              "refsource": "MISC",
              "url": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html"
            },
            {
              "name": "http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301\u0026contentId=NEWS1000001165\u0026idAbsPath=0301_10001\u0026nameAbsPath=Services%2520News",
              "refsource": "CONFIRM",
              "url": "http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301\u0026contentId=NEWS1000001165\u0026idAbsPath=0301_10001\u0026nameAbsPath=Services%2520News"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2012-3268",
    "datePublished": "2013-02-01T11:00:00",
    "dateReserved": "2012-06-06T00:00:00",
    "dateUpdated": "2024-08-06T19:57:50.292Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-4960
Vulnerability from cvelistv5
Published
2013-06-20 15:00
Modified
2024-08-06 20:50
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:50:18.270Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#948096",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/948096"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-22T09:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#948096",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/948096"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-4960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#948096",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/948096"
            },
            {
              "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-4960",
    "datePublished": "2013-06-20T15:00:00",
    "dateReserved": "2012-09-17T00:00:00",
    "dateUpdated": "2024-08-06T20:50:18.270Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-02-01 11:49
Modified
2024-11-21 01:40
Severity ?
Summary
Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community.
References
hp-security-alert@hp.comhttp://archives.neohapsis.com/archives/bugtraq/2012-10/0123.htmlBroken Link
hp-security-alert@hp.comhttp://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.htmlThird Party Advisory
hp-security-alert@hp.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685Broken Link, Vendor Advisory
hp-security-alert@hp.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685Broken Link, Vendor Advisory
hp-security-alert@hp.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685Broken Link, Vendor Advisory
hp-security-alert@hp.comhttp://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001165&idAbsPath=0301_10001&nameAbsPath=Services%2520NewsVendor Advisory
hp-security-alert@hp.comhttp://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930&colID=ROOTENWEB%7CCO0000000170&actionFlag=view
hp-security-alert@hp.comhttp://www.kb.cert.org/vuls/id/225404Third Party Advisory, US Government Resource
hp-security-alert@hp.comhttp://www.kb.cert.org/vuls/id/MORO-8ZDJDPThird Party Advisory, US Government Resource
hp-security-alert@hp.comhttp://www.securityfocus.com/bid/56183Third Party Advisory, VDB Entry
hp-security-alert@hp.comhttp://www.securitytracker.com/id?1027694Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&contentId=NEWS1000001165&idAbsPath=0301_10001&nameAbsPath=Services%2520NewsVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930&colID=ROOTENWEB%7CCO0000000170&actionFlag=view
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/225404Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/MORO-8ZDJDPThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/56183Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1027694Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
hp 0150a129 -
hp 0150a12a -
hp 0150a12b -
hp 0150a12c -
hp 0231a0av -
hp 0231a65t -
hp 0231a761 -
hp 0231a832 -
hp 0231a86p -
hp 0231a88a -
hp 0231a88l -
hp 0235a08f -
hp 0235a08h -
hp 0235a08k -
hp 0235a08m -
hp 0235a09t -
hp 0235a0a7 -
hp 0235a0a8 -
hp 0235a0as -
hp 0235a0bq -
hp 0235a0br -
hp 0235a0bs -
hp 0235a0bt -
hp 0235a0bu -
hp 0235a0bx -
hp 0235a0c0 -
hp 0235a0c2 -
hp 0235a0c4 -
hp 0235a0ct -
hp 0235a0e3 -
hp 0235a0e5 -
hp 0235a0e6 -
hp 0235a0e7 -
hp 0235a0g0 -
hp 0235a0g1 -
hp 0235a0g2 -
hp 0235a0g3 -
hp 0235a0g4 -
hp 0235a0g5 -
hp 0235a0g6 -
hp 0235a0g7 -
hp 0235a0g8 -
hp 0235a0g9 -
hp 0235a0ga -
hp 0235a0gc -
hp 0235a0gd -
hp 0235a0ge -
hp 0235a0gf -
hp 0235a10b -
hp 0235a10c -
hp 0235a10d -
hp 0235a10e -
hp 0235a10f -
hp 0235a10g -
hp 0235a10h -
hp 0235a10j -
hp 0235a10k -
hp 0235a10l -
hp 0235a14v -
hp 0235a14w -
hp 0235a15b -
hp 0235a15c -
hp 0235a15d -
hp 0235a15f -
hp 0235a15g -
hp 0235a15h -
hp 0235a15j -
hp 0235a16t -
hp 0235a17a -
hp 0235a17b -
hp 0235a19b -
hp 0235a19c -
hp 0235a19d -
hp 0235a19h -
hp 0235a19j -
hp 0235a19k -
hp 0235a19l -
hp 0235a20j -
hp 0235a20k -
hp 0235a20l -
hp 0235a20n -
hp 0235a20p -
hp 0235a20q -
hp 0235a20r -
hp 0235a20s -
hp 0235a20v -
hp 0235a21p -
hp 0235a21q -
hp 0235a21x -
hp 0235a22c -
hp 0235a22d -
hp 0235a22e -
hp 0235a22f -
hp 0235a22h -
hp 0235a22k -
hp 0235a22p -
hp 0235a22r -
hp 0235a22t -
hp 0235a237 -
hp 0235a238 -
hp 0235a23h -
hp 0235a23p -
hp 0235a23t -
hp 0235a248 -
hp 0235a25n -
hp 0235a25r -
hp 0235a25s -
hp 0235a267 -
hp 0235a268 -
hp 0235a269 -
hp 0235a26g -
hp 0235a27d -
hp 0235a27q -
hp 0235a27r -
hp 0235a27s -
hp 0235a296 -
hp 0235a297 -
hp 0235a298 -
hp 0235a299 -
hp 0235a29a -
hp 0235a29l -
hp 0235a29y -
hp 0235a300 -
hp 0235a301 -
hp 0235a31b -
hp 0235a31c -
hp 0235a31d -
hp 0235a31e -
hp 0235a31n -
hp 0235a31p -
hp 0235a31q -
hp 0235a31r -
hp 0235a31v -
hp 0235a31w -
hp 0235a31x -
hp 0235a320 -
hp 0235a321 -
hp 0235a322 -
hp 0235a323 -
hp 0235a324 -
hp 0235a325 -
hp 0235a326 -
hp 0235a327 -
hp 0235a328 -
hp 0235a32b -
hp 0235a32e -
hp 0235a32g -
hp 0235a32x -
hp 0235a33r -
hp 0235a34b -
hp 0235a35j -
hp 0235a36n -
hp 0235a36q -
hp 0235a37t -
hp 0235a37u -
hp 0235a37x -
hp 0235a38m -
hp 0235a38n -
hp 0235a38p -
hp 0235a38q -
hp 0235a38r -
hp 0235a38v -
hp 0235a390 -
hp 0235a391 -
hp 0235a392 -
hp 0235a393 -
hp 0235a394 -
hp 0235a395 -
hp 0235a396 -
hp 0235a397 -
hp 0235a398 -
hp 0235a39h -
hp 0235a41d -
hp 0235a42b -
hp 0235a42d -
hp 0235aa2m -
hp 3c13612 -
hp 3c13613 -
hp 3c13616 -
hp 3c13636 -
hp 3c13640 -
hp 3c13641 -
hp 3c13701 -
hp 3c13751 -
hp 3c13759 -
hp 3c13840 -
hp 3c17302a -
hp 3c17304a -
hp 3c17540 -
hp 3c17540taa -
hp 3c17541 -
hp 3c17541taa -
hp 3c17543 -
hp 3c17543taa -
hp 3cr17151-91 -
hp 3cr17152-91 -
hp 3cr17161-91 -
hp 3cr17161taa-91 -
hp 3cr17162-91 -
hp 3cr17162taa-91 -
hp 3cr17171-91 -
hp 3cr17171taa-91 -
hp 3cr17172-91 -
hp 3cr17172taa-91 -
hp 3cr17181-91 -
hp 3cr17181taa-91 -
hp 3cr17250-91 -
hp 3cr17250taa-91 -
hp 3cr17251-91 -
hp 3cr17251taa-91 -
hp 3cr17252taa-91 -
hp 3cr17253-91 -
hp 3cr17253taa-91 -
hp 3cr17254-91 -
hp 3cr17258-91 -
hp 3cr17258taa-91 -
hp 3cr17259-91 -
hp 3cr17331-91 -
hp 3cr17331a-91 -
hp 3cr17331taa-91 -
hp 3cr17332-91 -
hp 3cr17332a-91 -
hp 3cr17333-91 -
hp 3cr17333a-91 -
hp 3cr17334-91 -
hp 3cr17341-91 -
hp 3cr17341a-91 -
hp 3cr17341taa-91 -
hp 3cr17342-91 -
hp 3cr17343-91 -
hp 3cr17343a-91 -
hp 3cr17561-91 -
hp 3cr17562-91 -
hp 3cr17571-91 -
hp 3cr17572-91 -
hp 3cr17660-91 -
hp 3cr17661-91 -
hp 3cr17662-91 -
hp 3cr17671-91 -
hp 3cr17761-91 -
hp 3cr17761taa-91 -
hp 3cr17762-91 -
hp 3cr17762taa-91 -
hp 3cr17771-91 -
hp 3cr17771taa-91 -
hp 3cr17772-91 -
hp 3cr17772taa-91 -
hp 3crbsg2093 -
hp 3crbsg2893 -
hp 3crbsg28hpwr93 -
hp 3crbsg28pwr93 -
hp 3crbsg5293 -
hp 3crbvcxmsr01a -
hp 3crbvcxmsr02a -
hp 3crbvcxmsr03a -
hp 3crbvcxmsr05a -
hp 3crbvcxmsr06a -
hp 3crbvcxmsr07a -
hp 3crbvcxmsr08a -
hp 3crs42g-24-91 -
hp 3crs42g-24p-91 -
hp 3crs42g-48-91 -
hp 3crs45g-24-91 -
hp 3crs45g-48-91 -
hp 3crs48g-24-91 -
hp 3crs48g-24p-91 -
hp 3crs48g-24s-91 -
hp 3crs48g-48-91 -
hp 3crs48g-48p-91 -
hp 3cruwx500275 -
hp 3cruwx500475 -
hp 3cs7902e -
hp 3cs7903e -
hp 3cs7903es -
hp 3cs7906e -
hp 3cs7906ev -
hp jc054a -
hp jc055a -
hp jc056a -
hp jc085a -
hp jc086a -
hp jc099a -
hp jc100a -
hp jc101a -
hp jc103a -
hp jc104a -
hp jc105a -
hp jc124b -
hp jc125a -
hp jc125b -
hp jc147a -
hp jc147b -
hp jc148a -
hp jc148b -
hp jc149a -
hp jc149b -
hp jc150a -
hp jc150b -
hp jc158a -
hp jc165a -
hp jc176a -
hp jc177a -
hp jc177b -
hp jc178a -
hp jc178b -
hp jc474a -
hp jc474b -
hp jc496a -
hp jc566a -
hp jc611a -
hp jc612a -
hp jc613a -
hp jc635a -
hp jc652a -
hp jc653a -
hp jc666a -
hp jc691a -
hp jc694a -
hp jc697a -
hp jc698a -
hp jc699a -
hp jc700a -
hp jc701a -
hp jc748a -
hp jd007a -
hp jd008a -
hp jd009a -
hp jd010a -
hp jd011a -
hp jd023a -
hp jd024a -
hp jd025a -
hp jd026a -
hp jd027a -
hp jd028a -
hp jd029a -
hp jd172a -
hp jd193a -
hp jd193b -
hp jd194a -
hp jd220a -
hp jd238a -
hp jd238b -
hp jd239a -
hp jd239b -
hp jd240a -
hp jd240b -
hp jd241a -
hp jd241b -
hp jd242a -
hp jd242b -
hp jd243a -
hp jd243b -
hp jd245a -
hp jd249a -
hp jd250a -
hp jd251a -
hp jd268a -
hp jd272a -
hp jd273a -
hp jd274a -
hp jd275a -
hp jd302a -
hp jd303a -
hp jd304a -
hp jd305a -
hp jd306a -
hp jd307a -
hp jd308a -
hp jd309a -
hp jd310a -
hp jd311a -
hp jd312a -
hp jd313a -
hp jd313b -
hp jd314a -
hp jd315a -
hp jd316a -
hp jd317a -
hp jd318a -
hp jd318b -
hp jd319a -
hp jd319b -
hp jd320a -
hp jd320b -
hp jd325a -
hp jd326a -
hp jd327a -
hp jd328a -
hp jd329a -
hp jd330a -
hp jd331a -
hp jd332a -
hp jd333a -
hp jd334a -
hp jd335a -
hp jd336a -
hp jd337a -
hp jd338a -
hp jd344a -
hp jd345a -
hp jd346a -
hp jd347a -
hp jd348a -
hp jd349a -
hp jd350a -
hp jd351a -
hp jd352a -
hp jd353a -
hp jd354a -
hp jd355a -
hp jd356a -
hp jd357a -
hp jd369a -
hp jd370a -
hp jd371a -
hp jd372a -
hp jd373a -
hp jd374a -
hp jd375a -
hp jd376a -
hp jd377a -
hp jd378a -
hp jd379a -
hp jd431a -
hp jd432a -
hp jd433a -
hp jd444a -
hp jd447a -
hp jd447b -
hp jd448a -
hp jd448b -
hp jd449a -
hp jd450a -
hp jd468a -
hp jd469a -
hp jd654a -
hp jd655a -
hp jd656a -
hp jd657a -
hp jd658a -
hp jd659a -
hp jd660a -
hp jd661a -
hp jd662a -
hp jd663a -
hp jd663b -
hp jd664a -
hp jd665a -
hp jd666a -
hp jd667a -
hp jd668a -
hp jd669a -
hp jd670a -
hp jd671a -
hp jd672a -
hp jd673a -
hp jd674a -
hp jd675a -
hp jd676a -
hp jd916a -
hp jd917a -
hp jd918a -
hp jd921a -
hp jd922a -
hp jd923a -
hp jd935a -
hp jd943a -
hp jd946a -
hp jd967a -
hp jd972a -
hp je005a -
hp je006a -
hp je007a -
hp je008a -
hp je009a -
hp je012a -
hp je013a -
hp je015a -
hp je016a -
hp je018a -
hp je020a -
hp je021a -
hp je022a -
hp je023a -
hp je025a -
hp je026a -
hp je027a -
hp je028a -
hp je029a -
hp je030a -
hp je031a -
hp je032a -
hp je033a -
hp je045a -
hp je046a -
hp je048a -
hp je057a -
hp je058a -
hp je059a -
hp je060a -
hp je061a -
hp je062a -
hp je063a -
hp je064a -
hp je066a -
hp je067a -
hp je068a -
hp je069a -
hp je070a -
hp je071a -
hp je072a -
hp je073a -
hp je074a -
hp je088a -
hp je089a -
hp je090a -
hp je091a -
hp je092a -
hp je093a -
hp je094a -
hp je095a -
hp je096a -
hp je097a -
hp je099a -
hp je100a -
hp je101a -
hp je102a -
hp je103a -
hp je104a -
hp je105a -
hp je106a -
hp je107a -
hp je108a -
hp je109a -
hp je110a -
hp je164a -
hp je165a -
hp je166a -
hp je167a -
hp je168a -
hp je198a -
hp je199a -
hp je200a -
hp je201a -
hp je203a -
hp je204a -
hp je526a -
hp je527a -
hp je528a -
hp je545a -
hp je551a -
hp jf228a -
hp jf229a -
hp jf230a -
hp jf231a -
hp jf232a -
hp jf233a -
hp jf234a -
hp jf235a -
hp jf236a -
hp jf237a -
hp jf238a -
hp jf239a -
hp jf240a -
hp jf241a -
hp jf242a -
hp jf247a -
hp jf283a -
hp jf284a -
hp jf285a -
hp jf286a -
hp jf287a -
hp jf427a -
hp jf428a -
hp jf430a -
hp jf430c -
hp jf431a -
hp jf431c -
hp jf551a -
hp jf552a -
hp jf553a -
hp jf640a -
hp jf800a -
hp jf801a -
hp jf802a -
hp jf803a -
hp jf804a -
hp jf806a -
hp jf807a -
hp jf808a -
hp jf809a -
hp jf812a -
hp jf813a -
hp jf814a -
hp jf815a -
hp jf816a -
hp jf817a -
hp jf844a -
hp jf845a -
hp jf846a -
hp jf847a -
hp jg059a -
hp jg091a -
hp jg092a -
hp jg182a -
hp jg183a -
hp jg184a -
hp jg207a -
hp jg208a -
hp jg209a -
hp jg210a -
hp jg213a -
hp jg214a -
hp jg215a -
hp jg221a -
hp jg222a -
hp jg223a -
hp jg225a -
hp jg236a -
hp jg237a -
hp jg238a -
hp jg239a -
hp jg240a -
hp jg241a -
hp jg242a -
hp jg245a -
hp jg246a -
hp jg247a -
hp jg248a -
hp jg249a -
hp jg250a -
hp jg251a -
hp jg252a -
hp jg253a -
hp jg254a -
hp jg255a -
hp jg256a -
hp jg257a -
hp jg258a -
hp jg299a -
hp jg300a -
hp jg301a -
hp jg302a -
hp jg303a -
hp jg304a -
hp jg305a -
hp jg307a -
hp jg311a -
hp jg312a -
hp jg315a -
hp jg348a -
hp jg349a -
hp jg350a -
hp jg478a -
hp jr024a -
hp jr430b -
hp jr431b -
hp juc653a -
hp lsq1fwbsc0 -
hp lsq1srpd0 -
hp lsr1fw2a1 -
hp rpe-x1 -
hp rtvz33020as -
huawei -ma5200g v300r003
huawei atb v200r001c00
huawei atn v200r001c01
huawei cx600 v200r002
huawei cx600 v600r001
huawei cx600 v600r002
huawei cx600 v600r003
huawei ma5200g v200r003
huawei me60 v100r005
huawei me60 v100r006
huawei me60 v600r002
huawei me60 v600r003
huawei me60 v600r005c00spc600
huawei ne20 v200r005
huawei ne20e-x6 v600r003
huawei ne40\&80 v300r005
huawei ne40e\&80e v300r003
huawei ne40e\&80e v600r001
huawei ne40e\&80e v600r002
huawei ne40e\&80e v600r003
huawei ne5000e v300r007
huawei ne5000e v800r002
huawei ne5000e v800r003



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:0150a129:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C872D6-A50C-4EC2-B486-4B3688F9957E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0150a12a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A266D998-8E86-4AD8-9486-C2CF12563129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0150a12b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D81E420-2FB3-4BEE-B98D-CB017172D0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0150a12c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8272C9E0-0A5C-4BC7-8AC7-B2AD726F14FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a0av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9858473-DAB1-43F7-8238-0359D8670F84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a65t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3636AEFD-7FA8-4F0A-BB6E-06E759EC5616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a761:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A73ED37E-8CED-4AF1-AC36-9DBC64E1BAF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C591A61-B3A8-4D6B-A312-6A62DBC42FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a86p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A82F95-A4B4-413C-BD1D-E11A6ECF5743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a88a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D6CA16-73F6-4BD0-B9BA-D8FE87BC82AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0231a88l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34FFA797-C3A2-487F-8884-01CF81EC7507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a08f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1585509-F5A7-4E2C-B378-A21A68E2817F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a08h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A15E322-BECF-422A-AA5A-FB2BB15F0E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a08k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1010A-F5A7-4F25-AD6D-E5B5C3E726F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a08m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22CA190-FA09-4C59-8474-2E1B24C12058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a09t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32231279-DD37-4C1F-80F2-453A51E03A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0a7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA0CA57-8692-4DD4-87CA-BDF7C83EFC00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0a8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA73DF6D-1928-4953-AC10-928916A0603A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0as:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDB786A-0C1E-44C2-A5C1-6EA3DC6275B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0bq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF572CF-FF22-4B78-A12B-8D662E859922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0br:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FF96D1-3284-4EF7-8530-ABC740018AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0bs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3652C6A-43B9-4D7A-A89A-3A2EA26D9257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0bt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20EBBC83-6207-46C5-BBB3-4722B7C18EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0bu:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B156449-BEBB-4EDB-A2FB-03B87F4B3263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0bx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E269C14-5CB4-48FB-850B-5B2D973C3215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0c0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE626F6-9E60-4B1B-85FF-4307E9DB2EB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0c2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6006B0F-D752-413F-95F5-DCD2BE4AD51F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0c4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72C6430-9C0B-44E0-A5B8-B1FCD6706C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0ct:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883C2EC1-2892-4364-A3BD-7D30817D6D11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0e3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5614A8EA-8893-415C-84E0-B8FAF1C272A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0e5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BE9159-74A3-4581-B2F7-5CC0D00F3DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0e6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB754D6-3E80-440A-8FE9-50C2426A45AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0e7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3FA4C3E-1E4B-4D93-9FCD-B3908E673494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A23621-A045-4FA8-88DC-FEFFF0A3F81E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9A78D7C-7789-495C-A963-DA1BAAA9CA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C4D5DE1-B352-4EAB-BF62-84652C3BE74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D385A7-4CC6-4DE6-B0A4-73A2D583E28B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCD5E88-7D5B-4DC5-8C27-B85ED4571380",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82F5ECE-4BAD-4514-AED6-E23E7B97E446",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF8F328-54A5-4D56-9888-03DA547450C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CF25CE-5976-4ED5-AACD-982FF8D91216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30BF699-B54A-4C54-9F2F-AFA7FBCFF27D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0g9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C102D7C6-1147-4E7E-A823-60D20B2EED11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0ga:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5A9FB59-000F-46B1-91E9-9E98E5D1B234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0gc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E98842A-91AE-43DC-9FA0-161488BA1944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0gd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "555D8805-F90B-4B90-8698-C49A59EB6FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F485CA-4818-43CB-AC49-E8BA0D9EE9FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a0gf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD44BCB2-7B19-4EA8-9BB4-3A30BA5FECBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926AD134-DD79-42A1-8B94-11E21CAEAA6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F893EB9B-387B-4C78-BBC4-D052932BE69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "143C802E-CD25-47A2-8939-B76C7C2D0DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE94BC4F-5284-4F73-A133-768A5F905ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D881F3F-4DF1-4D93-904D-6EFFFECDC650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F7B9F6-B025-4996-858A-1D9371973768",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A540E79-240A-457D-9410-1FECEBDA52B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10j:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D729602A-A8A9-40CF-9B12-E68D8C541C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55A7E8D-A67E-4F22-B977-676C69EC476C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a10l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33982080-8E2F-4963-BC4B-0E5CC98D12C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a14v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4525EAC-19A3-411C-95F0-DA808ED5FB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a14w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2105CD-168C-46BF-82E8-9C4DFC34C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C378F1-0CBA-404A-9F91-DDEBAD278B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9CC7DE2-55B1-4C7A-B152-322B407924B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CB1EFE8-AB87-4554-A2A9-0BF7F6536716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D65E6E3-5E11-4538-83EB-080CD3C66C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7BDC8B7-2953-461D-B66E-BEDCDEEE6A27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "722F7A0B-46C6-48A0-9535-E937AE8C0A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a15j:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D339D92F-20B3-4DF4-8ACE-AEF11F91B1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a16t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A79D633-77CB-4C8D-B0BC-3F8116D6AB9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a17a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA1DF50-423E-433B-A6A4-EFE616156DF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a17b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E70B8D8-DBD2-45C6-9484-A71CC04D287A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F339702-7C29-40BE-A311-1EB8A742020A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3966FB3A-B791-44D8-A697-A8B0C8DFE42D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E1E0BD9-C225-42DC-AEF6-A730B109D1BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B8DEF95-3E36-40EF-9C4F-1CF2E97BD0DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19j:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "670706D3-3A4C-4808-875E-C78C392167DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "155015F9-69DC-4277-8AB5-8BF681C4114E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a19l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECFCB08A-94CA-44FA-9407-01D5B7B6B512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20j:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E90834E3-BAC2-4160-A9CE-10EBBA1C418E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2199BADF-A12B-4329-A161-1089F37607ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42A0DBA5-889D-403A-93AA-74A074446D9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "201D4049-316C-4203-801F-DBE5B1BD6632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E41A682-F164-460B-87AC-35AD9180510F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8CB672-503D-4709-B5DE-203BC21410E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC29E51-4FFB-4707-86D9-1A20D6D1AE32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FD22FB-62BE-4CD5-9A1C-675378DB7164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a20v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFF2134-0215-4619-9385-613E4E46E429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a21p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1626BC-591C-4248-9D96-BFBEE2950C2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a21q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B8E5440-3A32-46EC-93DF-6A61CD7D3508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a21x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBC70AA-24BA-4EFD-9BFA-73623E3E929C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A45C6C3-9564-4297-8444-C17F2DB8A4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEB82AC-34CD-4EF6-8D30-A57E19735FB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5BCEF2-0182-4A90-8A5B-C50083B1AF69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99427AAA-EC1A-41F5-8F5F-4A6A6AC2C71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D08D9CE-B85F-4D12-BCB3-E95AF70CE288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5590CF8-F3E6-475A-BB93-49A316A67411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2568A182-341E-4B91-8AB5-6F3CD2F8A084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E905291D-6394-45B4-9106-F9F130E8CBD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a22t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E29E6A-539E-4F61-AE0B-F57F012A6B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a237:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A12DB4A9-0CBD-4FE1-9B3B-7DB7BC49C424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a238:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4317633F-773F-4587-A05D-DA0C4E452430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a23h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777D3059-528B-4A02-9F72-5B979D4879F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a23p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "426E416F-125F-4ABE-ACFE-A346F587F7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a23t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8B8247-51AC-4A36-8F36-FAE76D9612B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a248:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E6019F-2AFB-448D-9374-B596088FD5DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a25n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CFE854-FB5B-4388-BCC0-706E38A5F116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a25r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45C1BB8-60E2-4A01-AC3B-3CE6C3DC1F65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a25s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F5BD0A-C6D0-4772-9C74-714C7680F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a267:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8A69F5-8349-4649-9CB5-A56307F20FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a268:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6AA1DE7-8EF3-47BE-9563-31C579FFBBAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a269:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "825EF7C3-0085-4DE9-8E37-263DB42F568F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a26g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19999041-3C10-4605-9A4E-8953905CDB2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a27d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC886765-0624-49BF-82CF-26A8A661E732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a27q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FCA9CB-BC16-40FF-A990-DFB9708ADBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a27r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CBF495A-F3C9-47E0-B8CB-DEAF640F52CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a27s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0221A98-CC67-481A-A3D0-7A2257858F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a296:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4BCE9AD-9E71-49F9-A9F8-879239C06213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a297:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "441290B5-060C-4F8E-A694-1F1CF3699514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a298:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3682AB5-9D20-486F-A914-E804B904AA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a299:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E093E24A-4362-48D3-BD3C-4C700E9C4F46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a29a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "236F5715-0767-4DCE-82F4-E2B71B898133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a29l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94A9420-CB38-425C-AC4A-16EB895A8609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a29y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7763C2A3-494B-4205-B2A7-D76C9DB7A9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA70F3D-0574-41E1-AC42-C837D2FDFCE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90892955-449E-4CB4-8AC4-B8C9BF07F616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97087CA7-8FA5-4A6E-B92F-29CECB7DE4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12509D9-7029-4E45-AA3B-0218A9C0B357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA042CA1-90A0-4EE0-9382-1F05CDC0EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D90AD0A-555F-4278-A966-163E680EB66E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC7ADCC-F79E-4911-9257-0981CF7658C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38375AB1-F523-4467-B39C-623A7D68AB6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "343A74BC-EB5D-4EAB-9058-FAF98680F317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B12E17FB-CB22-446F-A4A0-B6DD3FC3CCEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D70CECF-596B-4CE9-AD01-23E67974808C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A538EF6-EC37-494C-B1E6-9AD352870E8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a31x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47858B63-7CD4-4245-9F01-BBDCCFB06BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D94424B-25C2-4EE9-91BA-9AE3DED6C5E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a321:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB61DDB-C61E-4520-9E31-054DB66F39CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a322:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9A81D8B-BBAC-47FA-933D-3BC131C5BA18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a323:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0FCF70-3FFB-4F6B-A0BE-713D3786B49E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a324:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8402D6A7-5C2E-4F37-9B2E-6BC5F629B29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a325:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE04E00-1F00-497B-A85E-F466A12B1E6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a326:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39A4DC3E-A21D-4626-92EF-68D7EC95BDF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a327:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E6C96B-0F3A-4198-BE07-5DDE7CC79D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a328:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60AD88DF-8AC8-4C6A-879C-F15624FEFB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a32b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B414BCF-0821-4085-B3A5-F8E514A48FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a32e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC406EEB-43CA-4352-9DD3-19831922CEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a32g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA540E6-7570-4694-A1F1-31F06E01D7F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a32x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDFFCA6-989F-42A8-B9B1-869D5947E7A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a33r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1211DA71-2A81-4112-8E3F-F3B09057B0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a34b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC55637-492B-4D4D-9C5D-E9808A7EC04C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a35j:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C9F9E-72AB-486A-8716-A0CE412EA3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a36n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E523AEE0-DA74-41D9-A6DE-0376014DECB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a36q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C760AD2D-3E9C-4E36-B0D0-8CD6C9390268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a37t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F772F-9F59-4286-B8BE-2958717085A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a37u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6BB002-F0F7-495F-8145-1C90551ABC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a37x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "570B31AC-CA73-417E-BEC0-70F004CC6D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a38m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05DDDAEE-A837-41BA-B719-05EC1B409918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a38n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A743F254-E95D-4902-92A3-6C0070FFABA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a38p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58EFFC5-7843-4468-8538-A5E7680D9645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a38q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB9AEEF-B3E3-4639-A24F-6E55161EB6DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a38r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE2B9AF-D2E0-4806-ABC7-5AF0521109EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a38v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4756C1-DE2E-49E8-B128-3D65C0885AF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "097C1307-3316-4BD1-AF15-B8FAADE659EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a391:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7FC80C2-0FA0-426D-AFEC-D968393747E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a392:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E215CE34-1887-481E-AAD7-637C8CCBDAF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a393:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "586BB058-DB52-4072-858F-EF1D435AEEF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a394:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "747703E0-6CF7-4E6E-9AA6-44F074494AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a395:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAEDBC41-15B6-4F06-AEBA-BF371A3C3D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a396:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E3CC27-2B2F-45DB-B313-F9034A0828CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a397:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E18A5B29-10F5-4637-B0FA-BED110CCCD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a398:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C165C50E-1824-41A7-BF8F-C30E97B706F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a39h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B1AF6B-FCAE-41FE-861B-584D462FEFBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a41d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D7BEB7-4428-41D7-8A1B-4F44360ED906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a42b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5EEF79-6D01-47F1-876D-8B1E53528BD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235a42d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E1192A-8AAE-4D83-B2BF-A49D008EFBB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:0235aa2m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6BF3FD0-5269-46B8-8C0D-0B665EB4259E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13612:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58495F41-C145-4102-95D5-E25C0C1B256B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13613:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22730C03-400B-41A7-9E33-D88956BEC6E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13616:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F5BD6C3-72EC-4C8F-B677-DFDABB4D54A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13636:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B58205-91F8-42DA-B1AD-3A7645E88CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13640:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3C7FA4-76C8-4F31-8F49-F0A3BC1EC45C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13641:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25DB491-DA77-4E5B-9A4D-F6EC8C41EA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13701:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "984FEDF7-094A-4182-A7CC-87FA63EF1E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13751:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3843870A-D4A1-4FF5-BF1B-5B9BCD583065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13759:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB001392-DE07-45E5-A3F3-C89160409993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c13840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F753EA0C-AF28-463C-B4D3-A6AFFC986C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17302a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7C09F6-F1D9-4D0E-A9B3-55320FC68C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17304a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EF3B90-C5DE-4747-8640-645C6652D19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5EB1F21-350B-4DAC-98F8-02C83EB10FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17540taa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26956EAA-D559-44D6-8827-91A1D68084B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17541:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F129DFC-2735-4AC0-B230-70B4F47E6104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17541taa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A423C3FD-2CC4-4EBE-8D82-623BCB520F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F5CF918-3052-4B1F-9030-FBD3832978DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3c17543taa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8DB7CB3-B4BB-48EA-AD57-7B4E980EE36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17151-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "513CA14D-41CE-4293-BB89-EF67E31E7C2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17152-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "012C338E-92D2-425A-A5A5-9763BBF48D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17161-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBB3094-2EC7-4C84-BC8D-9DC5185B2539",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17161taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E095112-07A1-4E03-9241-19BC402FBDAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17162-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08B4763-E2CE-4705-A26E-2282ACFED54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17162taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "010F3A14-C1B3-4D1C-B664-DA22C2B61D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17171-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E527672-109A-46D4-9583-67BFF54AA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17171taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A6BF664-6045-467C-87B8-42CB36CDC71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17172-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB465A79-6A6D-48C6-8665-89597615F91D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17172taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB3B5C-736D-4CC7-A193-EADC7FB0EE3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17181-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5C062C5-D590-4A64-8A29-B6DB4291EFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17181taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "178054AC-29E6-4734-BC2B-0CBD20D0D3AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17250-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C79CE3D-6F34-40B0-B447-1AD3A4A7CEB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17250taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52649D04-23AA-4FAF-8164-8FF898A0A554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17251-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC913F3-6BEB-4315-8738-800A62E60A67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17251taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD38F70-2C9D-4CBA-94D2-518ACF318F32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17252taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27713534-3C76-48F9-A836-B74355F63F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17253-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F739B71F-BC71-400D-BAA7-3E684AB37E28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17253taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A945B6C4-4C43-4277-83CF-DA2A40AED0D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17254-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0763E6B-A283-4DE7-B7C5-413702876672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17258-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEA0581-4AFA-4830-9A9B-D5D58FA83368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17258taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CAF5CD-0B45-4E40-A458-B88F7B2B8E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17259-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DD730F-5969-485E-AAC2-310229E79BE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17331-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A81AA1-6537-4340-B45D-D8AC68C9A7FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17331a-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "872AD27C-D9FA-412A-8F47-5183047582B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17331taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8036E866-B267-42DF-97AE-E1BEF30C61C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17332-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F18BE97-4D08-40BE-9CBA-87A23111756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17332a-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8A04B8-81AE-4DCC-94A9-0F3B52455B28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17333-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A41B53-F00F-4DC8-9BB8-DA6011B7FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17333a-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B25600D-D4EF-4405-A72B-4DB00AE72D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17334-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F860D869-8895-4A84-B65C-234AF53E6812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17341-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEEFEF3D-196D-4143-B685-C6BAE032927E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17341a-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A654BDE-E242-43EB-A05F-6C34929399DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17341taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D1590E-721B-427D-85E1-992527BCB3E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17342-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1969BDE-4FAD-4C1C-BB17-F5E4C8236E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17343-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88AE37C-FF23-4A8A-911A-E2198A0F197F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17343a-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B07F2D6-61F9-4418-8F81-D820A54CD71A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17561-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BB4A79E-A851-4823-AF11-9C150648DF3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17562-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73281C3D-3BE6-4A1A-BAB6-11388E12F1B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17571-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07ED0CC1-C4F8-463B-8CFA-0928C5511477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17572-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB7A594-F3DC-4EF1-A002-D7DBD03B293F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17660-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9977B2F-3C55-4F67-957C-C884822D1333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17661-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C10F5A5-7DD9-430B-BF5A-35A1E64E3435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17662-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5310298-B21B-4719-B191-07CB54E6EDEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17671-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6281BB3-409D-4113-AB0E-DD6B347D5C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17761-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5803CCC5-0C98-423D-A01B-90BF3D83B2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17761taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC41C231-B029-43EF-B97E-5A8646E81AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17762-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0465AC-63E2-463B-A12B-1CCEFA9ACD9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17762taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D20AE916-F95F-414E-932F-E1798D2AD9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17771-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F72AB6A-48A2-49A1-8B55-BC9187AE1A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17771taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "719B2681-61C9-4BC8-83D9-4B2771255B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17772-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573E20-D395-42E6-9AD9-1E6B04D954E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cr17772taa-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "043369B6-9528-4CC3-BAC1-69438692A02A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbsg2093:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "852F4984-3F55-4EB3-96C2-31CABF58D18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbsg2893:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81FBF517-3B30-4DAE-BC7E-9CD451DC62CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbsg28hpwr93:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E529C606-AE5E-4A0E-9638-8DB4D6010ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbsg28pwr93:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5EC7C39-9BDC-4A05-9D6F-F6EBB02C3E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbsg5293:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E3AEE7-9CF8-45C3-BD46-33B56D0B6D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr01a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "569AB635-FA2F-41C7-B05A-2C856AB8A333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr02a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69FD0E11-992E-4B27-84CA-21D3F4896D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr03a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B748FAD-7251-4E6A-BCB3-71E6ACB81947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr05a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F41D55-572C-45D3-A7EB-2B994275F971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr06a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6391C86-8554-4A91-A9A3-E52D803E1A1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr07a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6E55FFF-2899-40CD-92F3-E364930D9813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crbvcxmsr08a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F90F5BD0-FE90-4782-AABB-907F1F9725A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs42g-24-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2C22CC-A951-4EBF-AEC1-CD3C181442F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs42g-24p-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D21AB7-37D9-4E22-BF20-66D059763BF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs42g-48-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D0F720-35CD-4D27-8B0C-B12E4C172424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs45g-24-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F351F8-F143-4C9D-B570-9DF203451AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs45g-48-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D954-74C1-4620-993D-16F51DBD9752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs48g-24-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC9AAE09-65E9-4903-88DF-9920EA393B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs48g-24p-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA35705-F954-41D0-B1CB-44920C7CDF0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs48g-24s-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF806CC8-BC2A-492B-B87C-B3C401E93B0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs48g-48-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "484BCA02-5752-4E06-BECD-95D3BB15E794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3crs48g-48p-91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB03EB44-1EA2-4AB6-A6B3-DBB158EAAA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cruwx500275:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4868074-925E-4114-A1DE-E383B20BF1BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cruwx500475:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCFBCB9-CAE7-40C7-B726-09348884664F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cs7902e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7415EDA-D975-471E-AE0D-FB4FE79EA150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cs7903e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "561F3970-A455-4C4B-AE1D-615F0A4BA53C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cs7903es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76AF677A-0C0F-495D-8D29-CBED0840D9AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cs7906e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A2EF59-6316-4077-91A8-45450EF15552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:3cs7906ev:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEC0869-C8B5-4B04-98B7-858042D6A316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc054a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBF4A18-84F3-49EF-9064-63111DDC2AEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc055a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61959298-386F-42F9-BB6D-124677B9714C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc056a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "089EF3E9-6936-45D8-962F-BF6D4F85D32D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc085a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C7A3E-6688-4460-BC20-5CC8ADB3CDD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc086a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA868CE-1A63-4FBB-8ECD-1C63FC2DF915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc099a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F825C3-90D6-4075-87E4-B7E7BA290197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc100a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ECF5FF1-1222-4795-BDDC-6A9F8DE1C0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc101a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA59357-6793-42BE-BD7C-8F5487FA3359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc103a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA2D6DD-AFF9-4F25-9246-507B7AD263C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc104a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96087DAB-2F50-4905-AF76-B163F4A79641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc105a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F934973-0AED-42F4-B466-9D0E7712EA32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc124b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13061A2-33A7-47D0-AF6E-603AF911CDC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc125a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E958B404-CE7A-4FB3-BBA9-DC07FF39EC35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc125b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4950795C-E9C3-431C-8ADE-22CC1621691C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc147a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C82C3580-78F9-4EB6-AE86-F67CBFAA0649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc147b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5E6060-E5A3-4783-BF23-31592C5D911E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc148a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63B96ACB-3EEC-48B1-B66F-F20EE3B3C405",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc148b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C4D9D3-7712-44BF-8E00-30070357395A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc149a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD4404F9-4621-45B6-8B34-BC1BDD5122D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc149b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "187BDF4D-65F3-4437-8E00-4C391665A9F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc150a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "979C4E7C-1770-4503-88F6-AFD11523D317",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc150b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "884654C6-B743-4D53-97CC-547C3B615829",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc158a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B84332-5CBE-416E-968A-C10AFDAE3ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc165a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ADF256D-7B43-4AC5-8CE3-8E92E802EE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc176a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CEDB87-A350-4B3F-94B2-8671EC46FA7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc177a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29AF66DC-0A39-4600-8379-B8576D3C7DD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc177b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5BCFEFF-D475-42BF-90BA-2E2BE05DE68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc178a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36AD738B-B256-448F-BDF1-EDADA162A5CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc178b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "164ABF4D-0B82-43A9-BAC8-4D9E31FC119E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc474a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DA4111E-3D38-4735-836B-57361AD24351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc474b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "166B7EAF-8E81-46AB-B526-BC977EB23F1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc496a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05961B3C-E834-49EF-9FD7-8E69F07C914B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc566a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4AAAD4-B57D-4527-8325-7AC510C51996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc611a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "267A427C-B511-4662-982E-A58EF291F255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc612a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71E9F0C-B2DA-41E3-A477-D23387AE5C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc613a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15C944B-C784-4F86-BFA9-04D7B21AFDFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc635a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA87E3B8-479F-4D26-8320-5F2E38E02D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc652a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A494943D-753F-40A5-8FE2-1158F7800C6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc653a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B2F00E-EB6C-405A-8519-E6D545C609F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc666a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEC5F8E3-0E79-469C-9378-C8142AD20B20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc691a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEA204C-4391-4F07-B74A-7E440F0E1064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc694a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E7FEF5-FB5B-411F-A666-EDD049A02677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc697a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2108F4B-59B7-4CD3-90D0-4AF84D9AD2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc698a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC3CA6C6-E008-4255-A9B6-AF8591BCA11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc699a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "972709FD-8344-46EE-887C-0B4EC77AB13A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc700a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD2A178-FDC2-48BF-B0C6-77214F8BC1E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc701a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C1F13E-F8A4-4E74-9F2A-628592B4AA6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jc748a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF76CFB-27E1-49AE-AC25-DD47EC795487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd007a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4EB4A77-4394-40D8-BB60-AB4A4AEA9618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd008a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF9AF351-8D1E-4C12-92F0-718C43B15293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd009a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93063942-31B3-4CA0-9970-A8A90D33C6A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd010a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4B8D67-357A-4CD8-BEF2-CD5777954252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd011a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4085F6A8-1EB0-4D48-9C6A-1E983C3BAE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd023a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E642BE-4E37-4B2A-A698-5721E0BC86C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd024a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5248BAB5-D635-4077-9DF6-054C32FAF87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd025a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7C2012-AF1D-464B-9B34-9AC5C2978228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd026a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "407CAE0B-EB87-4C6F-A290-BC381B58929A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd027a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFB94DE-3A10-4034-B05D-51B9AC011BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd028a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EAF99BC-BBA4-4B12-B198-809EC76CA2D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd029a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BE44280-059B-43A5-98F7-1767141FDE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd172a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "231BF0CA-9E5D-45EF-BED6-C906E08B9DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd193a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "077D49BB-16E3-49AB-92C4-DE4221B9DF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd193b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B9188F-8855-4DEF-9D24-B37FAA5E4731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd194a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE475F03-48CB-4344-A453-C35F6DF6636F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd220a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FC5EEE-2803-4C6E-BFA7-8353ADFE63FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd238a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEEB67C5-6088-4BF8-A07F-99A7883C2256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd238b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30869FEF-12BD-4C89-B4EB-6098091DE70A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd239a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5B181F0-7CE1-4CEE-B795-DAB3DAC513BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd239b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A6B6A24-FC05-4503-9B0B-B399CDD542EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd240a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56AB1C0B-3B99-4534-BE42-DCAA8AC92A6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd240b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F5C20F-E2C0-4E45-8DEF-C9BBA625D810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd241a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09CF40D0-A173-4B85-B877-184404B2A60E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd241b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72221985-3760-47F9-AB1C-91896FE3CC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd242a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB925A1-4CC7-46B1-9C56-A3AA9F43E723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd242b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A82FB7-12FA-4836-A152-0903DBE1BE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd243a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EFBFBF1-6244-4932-B5F8-32EE065C6221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd243b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "275E2C2F-45BC-4270-8B6F-357929C2ECD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd245a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB4394-ABC6-47D9-9B91-44E4BFB60D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd249a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36649548-C90D-43FD-8CD9-73E5175E63B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd250a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31EE727-4C05-4146-8149-2E52C0708CC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd251a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D0B8BE-D24E-4292-BA17-CD7EB6878711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd268a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8044A2AB-435D-464A-BD86-DDD9C84437E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd272a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A3D27DC-A203-40F9-B75E-5320B5CB9746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd273a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51F6D57-904C-497F-ACCC-AF9E6F02F9C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd274a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71BF4D4B-7B6D-4770-9501-4940C706CBF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd275a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14AD31CE-3964-44B4-98CF-D5BE89C38934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd302a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F9773A-BAEF-442C-8453-B9B24D9D1234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd303a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A869118F-5B9F-4787-9270-F8FC9AEB714D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd304a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D284D3CB-EC9A-4CB2-A5BF-112B647D061D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd305a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C273ECDC-0835-4784-BDBF-107ACD32B0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd306a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "379C68F6-FCC5-4D0F-99F3-96B13CE0E17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd307a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5859535-A9B6-4920-992B-D291B8A75F88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd308a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1472C68A-F7E4-4D7F-9C8C-E162B9DEF74F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd309a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E301DA4A-4DC4-4D67-93FA-C1676DA65A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd310a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DE07BF-9E2C-4D98-B012-42980AB3C5B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd311a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB46640-E82B-44B4-8075-688364B5A351",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd312a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F13BEF7E-0053-4D63-AB3B-CD708D9CD2D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd313a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96523C0B-F8D1-40C0-B193-2EBF9AEFE45B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd313b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C88E8C-5E54-4512-8ED8-93E269660185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd314a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE5CAF8B-E201-4289-9B8E-5CCB34382EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd315a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE430A13-ECF1-464E-9963-E494A31B1AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd316a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "667D95FE-2B1A-41A9-998E-5F0EC2652688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd317a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B9EF85-F373-4618-AF77-078336DE8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd318a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C07E4696-0165-467B-A6C0-C91D2FDD3BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd318b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B92686-E00D-40C2-AF62-369394B17C73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd319a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55ED8324-5318-4A82-83F1-496961F005CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd319b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F25B75C9-EDAF-4676-B872-8AD0B66D9B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd320a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C465DC3-A1EA-4823-872B-000478388518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd320b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7F52C4-6D0A-46D5-84C3-2B6C1B1F3DB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd325a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E041D8C-DD32-4072-A941-D2A043E00BBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd326a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FC5061-A3DD-4D9C-B9E4-787975B1205A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd327a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDAE826-E939-4DA6-B130-6B000AE754A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd328a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F5DFE08-5B37-4313-87D6-D8DCE84D2B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd329a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "529DCADB-C119-40A0-AEFE-FCDBEA16A092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd330a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67190F43-22D0-49E8-B546-A17C097FB9C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd331a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D5C9DA8-8E73-4F28-8B0B-68671AF3AF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd332a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9188537-DAAE-4210-A31B-28D6945ED026",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd333a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37673C1E-A83E-4920-8EAE-E3575CB723C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd334a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "408F0C64-3EE0-414E-B855-199EB020DDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd335a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BF124C-FF5A-4F50-A4D1-BF7B8BE33FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd336a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E10587B5-6739-4A75-80BF-DAD73FB44C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd337a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4EB068-6CF0-45D9-BC49-17CD0700BF34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd338a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E7F40C-A236-44EA-92D7-23B98FE2FE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd344a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64888C28-82E2-4B26-8865-01C6BD1C30C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd345a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6946B360-440E-4F76-8FCF-4816ABABB31A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd346a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3F1943-32F1-40BC-9DF5-AB2F99AE4708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd347a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD5F5111-CBAE-4127-9E10-8F6487AFE57D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd348a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "349AD5B9-C0AD-4F5A-A9E5-6FF513C8CE33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd349a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8E1FF9-5050-4883-A84C-10DF622ED257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd350a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D75BB2EA-5610-46E1-A14F-D4549D9A2E4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd351a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337543AB-8835-4C0A-BFB3-E00831587B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd352a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CEED454-AA1C-4566-B781-81DDD188B8B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd353a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A42313-1E1E-44D3-8C30-4D7596508CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd354a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F94E84D-8829-4DA9-84B8-5FEB322810B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd355a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC7908C-1273-4AB3-841A-E6C77E391D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd356a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F86B6C28-95D8-41E5-AE9D-BE1F917C80B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd357a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "013DB306-EB9D-4E2E-B643-F5A0493C3501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd369a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51951629-B439-48D8-B42D-68FA1ED71C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd370a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "661B13E3-92A0-4F7A-AEDD-6504634E6819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd371a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC19C97-A8E9-4F15-A5BC-CAD8F84FAF67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd372a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67CFC1F-BA56-4471-B4A8-D73BE553E857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd373a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5566A6-3923-4EC5-B1F3-781D9905DF21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd374a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33348CE9-8F14-4897-881B-EFAB0F3974DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd375a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E644F637-FEE0-4828-9376-2017E17DAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd376a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC37018-6E35-413D-88E9-120DF8F10B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd377a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F69AC47-A567-4B7D-A9D1-965330CEE05D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd378a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D067592-17BF-4A36-8618-A9CA1F3498B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd379a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F47D1C-AEC0-4EA6-B724-FFE59F7AEC25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd431a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01422D19-3CC9-457E-A1DA-4C13FC836D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd432a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA58D2AE-04DC-40D1-BA8D-76E02C4724DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd433a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A9DD456-1DBA-4FD3-9700-BC7762EE65A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd444a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2EC1B3C-7DA1-4416-836A-056816F28B45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd447a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F7A1923-CC0D-473B-BD09-88A794C11ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd447b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B342DC74-0833-46F4-8AD9-71D94B0A4341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd448a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FAF724-D8FC-4581-A245-C8D049C482EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd448b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF457FD-5397-46E6-8EDA-BF5D468B7788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd449a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B54939-E8A3-400C-9FC2-4480E88CA424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd450a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8585A732-E2D5-4B9C-BADE-7724D3BD4F1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd468a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF32C609-3E5B-49A1-AEB8-B568FEC66ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd469a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11B4D112-9C23-4DCA-A3D9-1BE0B8C9742B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd654a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7255DBB-9FCD-4CEE-9FAE-629DC528553C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd655a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C9E476-590A-4CBE-916E-7429046B8A6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd656a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4190F9A2-6B00-48E5-BA90-FD3CD0A574B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd657a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A2ED89-2611-4648-A7E0-4C7523BBC3A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd658a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A703B1-3678-4D57-B556-87A265E53B56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd659a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "953AFD84-9AD1-4E82-B5FF-38AB0DFD7A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd660a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E715695D-6051-45B6-B0E7-D095ADB8FC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd661a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF26749-EB47-4C5E-810D-C1C6783854DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd662a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08D0821-C0AE-4AA4-BD54-EE690F302DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd663a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED1BB30-F831-45A7-8287-168B7C5369FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd663b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "115D2D0A-C11C-4A2A-8AC7-E42DE184D148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd664a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF24F641-7D9D-42AB-9CAD-8F92AD00972A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd665a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4879872-441E-4D52-BC71-D4935CFEF44C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd666a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF4CD16-D2E9-4B53-BA85-938A21D503BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd667a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB32A653-4B87-4F30-AB2D-5D7AA90D925F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd668a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF921767-3E12-463A-ACAF-1589BB82ED6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd669a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCE83806-41B1-4808-A894-2BBD2F27957A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd670a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64700E64-E839-425D-905D-5B8E3B566183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd671a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A055EFF8-5939-474D-8531-8550080ACE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd672a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBAFA4E-06D4-4F1B-97A5-8B963EDBD66C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd673a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62877E7B-5383-4F8B-9594-08A1AA837BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd674a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "051BD02F-7358-4345-AC54-5048BE86E0BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd675a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71036EAE-1804-4CF2-A4CA-77207338E0C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd676a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EBA362-703E-42B8-AE07-60CD8837F22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd916a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B6FC7D2-7DB7-4404-97AE-4CF2CB8A9B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd917a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E37324-9058-446E-9795-8F2F0349D77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd918a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A81911-1DD0-447E-9F12-D54DD35CC4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd921a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF51D462-D880-4401-BA3B-51BD4639BCFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd922a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1D7189-A31A-4A55-8C8B-A9DB4B577365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd923a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4736EC0C-4B16-4A07-A076-15CE742856CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd935a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E348889E-DE31-4490-A136-685BE9695C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd943a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72D2A2F-076B-4A94-BD55-4E884D6DF753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd946a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77E11C8-B524-42A0-A973-DF335D0D3B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd967a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90D71A7C-7B93-4668-864D-34464C2EE093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jd972a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D760FE-9458-491E-A821-CFB5BCD1FBC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je005a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "425554B7-98D4-4AA5-B585-633F9CC42FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je006a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89F9BC9-D99A-4E56-8975-04B8E3BF8441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je007a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4090C65A-6BB7-4A28-B11A-8586C0880EE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je008a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F084B7B4-A0FE-4B99-9BC5-2DBF07DA3C13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je009a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F96B3C5-7F12-47DA-B608-0EAB3B2FC5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je012a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC367A35-ED9C-4098-9478-E1A1C70A01BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je013a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C8B6A4-B297-47F7-876D-11B1AE66D7B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je015a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2618BD2-5A39-4083-A16F-ECACDECFE834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je016a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A248C8A-BDF9-42CE-AD28-E06F3DE067A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je018a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAC1DB78-EA69-48C6-8451-25745502EE04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je020a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B33AED5A-EC00-40C7-BF5B-2C303D8C1A6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je021a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B6240F-203A-4888-95BB-E9796DCC93E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je022a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D457E65-F8D1-4C4B-933C-98E70C7A3635",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je023a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3755D38A-8784-4721-A489-2F22300D409E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je025a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD63C98-32CC-4909-878B-006505607407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je026a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A33ABBD5-3CBB-42CC-9274-C917985E7C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je027a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829DD2A-B049-4135-AC01-FE94A465DB4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je028a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C803DAE-74DA-4B1A-A8CF-0C45AFBAF103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je029a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B29258-80BF-487A-B1D0-7B1A92C526DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je030a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3136B7AC-FCF4-4456-BE4A-87848AFCE85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je031a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F319B4-BF18-4DC7-8043-7B2B2E9C3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je032a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2684F566-0E2D-410D-B304-F3B481B45C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je033a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43A45615-12CB-487F-93B0-1137D033BCB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je045a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C94378-59AB-4471-8054-5877D2BF07F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je046a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F90ECC39-E5FD-4846-BB7D-DFB40DAC42DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je048a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB3CCE8-C617-4A29-81CC-71F01CD2CD54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je057a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C14B5C-41DC-4916-9D89-A7D95FE443F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je058a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "113A2274-4D1B-46D7-A441-9D7CDEDDD688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je059a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36EDD2ED-C865-41C1-825A-272F7682BEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je060a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E71D5A-CC22-4CE9-8C67-0E1CC90E9E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je061a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C52B8A4B-4F33-4648-981C-F951432376A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je062a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC574E6-BAE9-4841-AAAA-DB2ED7CD9C73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je063a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9E715E-CD24-4D20-9850-8DB0B0E164E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je064a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC4BA9F0-C86C-497D-9D7B-F2C9AA8E8D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je066a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8CD9957-303B-4C5D-A109-7AC4BB42BF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je067a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2611647-6241-4C37-BEF2-BC8DD20378C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je068a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "603B5F9E-CAA7-43E3-BBB3-1E7C09BB0568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je069a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CAB49E-2BBC-42C0-BCA9-421CF4840B87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je070a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0645406F-C0FC-4151-AD0F-CB0511C15E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je071a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AA3D903-84A6-4BB3-A2EB-A1E761706E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je072a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B55FCE-6203-4042-A718-633D0A806427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je073a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F884FC-D355-46C1-9876-0717275C81D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je074a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9AD8AA-70FB-4D76-937A-4F6B2A7B5AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je088a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEB9EA1B-0265-4828-8733-DDA218340AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je089a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B402A35C-20DD-4883-91A6-6E9D5A1379A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je090a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1849FC2E-9A19-4133-8B43-BF24E3331D10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je091a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5A78B1-83DD-4E50-A065-2FCB9A9A5C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je092a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FEFDC84-FA60-462F-B8C0-1C74C3FE092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je093a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "317B8443-82F3-49B8-B469-B7C4CF902645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je094a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C262487-8F09-4FD8-BD2D-67EB1F6DD702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je095a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BC93EA-F715-4ED6-9BE2-AD0EB9F4F8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je096a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "753A43C7-D132-4068-931D-C3F206D4A37C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je097a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "519CBA7C-FC1C-4AD2-AAB2-704EFEF10569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je099a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C30BC14-8EB3-4C6E-A72D-21D2C98C8E55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je100a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B924D79-FFC3-49E1-BA5C-4FB00DB4D9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je101a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BCF4FF8-222D-47A6-9A8A-8CEB0DBC0222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je102a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B2E97D-D844-496F-979B-91E96F5236B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je103a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82295211-45B1-4A4A-8FF0-9EB8B574E354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je104a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0237E218-90C4-4255-876D-E733E852F08A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je105a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "940C4852-1A5A-433D-9840-C420D4AF4CEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je106a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F77BF1-B6D0-45A0-8A08-425DBC8F401E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je107a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DFFFF6-7324-431A-A691-AA13F19F7EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je108a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132C1E50-4AD4-4BD2-BC76-B1C930065032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je109a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1C4567-9B9D-47E9-AFDF-41E8D6ADE9DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je110a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "112222E7-B474-4668-B740-6EB0ADF9CB76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je164a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42726D4C-FAA3-4B12-BDA2-8BA0B71E1DB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je165a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73177A2-FE48-4FF0-8E3C-BC238F27AE37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je166a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93E4DD36-0B60-4722-B0A5-CBA560B59063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je167a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A29FD460-D8AF-4B5B-8391-C1DA8F7C7A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je168a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D11A5CD-13E0-4541-BD8D-C6446F1200A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je198a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "359EA2CF-D10B-4FB1-A722-C6314B1BA8FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je199a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C74F59-0459-42A6-83BD-8DA0381CF564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je200a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FE39B4-D5CD-438B-9E3D-BA98D1A90406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je201a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A3B299-F423-443F-9573-5CA950BF8F1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je203a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76957EF4-C5C5-4F87-A127-92D41A3B5B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je204a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEFE05E6-AC47-42AE-AD4D-B2187F650296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je526a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "143440DA-ACBB-4ABE-9A75-66C4F25F24E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je527a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE01429-814B-4D6C-82C9-C5739031592D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je528a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3523E151-94B2-49CD-BB43-73B6B240C8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je545a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28C85BC-F352-4E7C-9602-B8470C7B8567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:je551a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A6F1BC-E623-4C5F-B95C-FF341F03AA5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf228a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4A76F5F-99D0-43C5-B97C-75F484547B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf229a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9EDA83-6609-4298-B203-94E654F93D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf230a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA68751-3D81-4C2D-B97D-41FF909656A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf231a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "441AFB96-B146-4394-98F2-E9A47D8F5C9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf232a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7046DCFC-ECB8-45FB-B159-8478CBF999D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf233a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A17BBF-AD25-4CA3-9C16-06D04431780E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf234a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266202C8-186D-4196-8DE8-288B893938F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf235a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D90C61-D4AA-4179-BB15-1C8A331E85E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf236a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B2CDBF-AD00-47EF-A8D2-8578CC2A05BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf237a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "577875DD-22CF-4AFE-9F02-011410EAE629",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf238a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DB0C940-C744-44DC-82F4-5416242333A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf239a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBCAACE-EB0E-4C72-9F89-8AD1C2F3871F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf240a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DEF929F-3156-4244-8068-759E51F308BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf241a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B97B992C-EF9D-4616-891B-DFD273058BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf242a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FADC105B-A612-4704-B620-FDCF98064524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf247a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D75E064-2E61-470E-B7EE-0FA0C1CB9C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf283a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E76518E-26B2-47D5-B617-DFCFD5220F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf284a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5A6A2A-471A-484E-BFF7-684B3D84F105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf285a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A8EADD-324F-4873-9F5B-3F59C37A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf286a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CFB55-A177-4371-A928-86BBEBC4EF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf287a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A2C6049-BE1A-48FE-A73B-728AB4AB807B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf427a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2566797F-3079-462D-8734-A8C84B5DFD40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf428a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66CB533-F0B9-4692-9336-69453D818E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf430a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC44C61-8ED6-40B4-8C48-74AA3952C7A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf430c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2AF94A-752A-4E5B-A546-65C6D809DBDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf431a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "966018BE-4E12-448B-B957-43308B9C4271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf431c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A7575FE-C124-4B96-AE3B-13120403D87B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf551a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7896CA4D-046C-4102-A7FF-FEF6974FD1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf552a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "802A5FDA-4EA2-43D8-BFF7-1FBE375B0A46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf553a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1DB167-700D-47FD-A2A1-80AF2E39F049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf640a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5460EDD-873A-41C8-A80C-D11D74BC355A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf800a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE07B39E-61C5-4F0F-9666-70460A9924F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf801a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8492A223-A939-4B95-85FF-EE468720968D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf802a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D4CD29-6B37-4DDC-B492-8AB75D337209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf803a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0308D920-4AD8-42D4-8203-557D9BF94A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf804a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DD49233-0918-4C32-815B-75085056D463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf806a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDD024E-1FB5-4EEA-952D-D3F925917F59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf807a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3936B6EC-032C-4EA2-AE66-A474B4E49FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf808a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBE029D6-5F06-4A68-9215-5C2E2F72116B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf809a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E413ED8-04D4-40D8-B65B-95CD85D9AE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf812a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6949F82-9A0C-485F-AB3D-ECC9A67EDA78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf813a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD684EBA-3BA7-4BEA-8631-E4D664D93897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf814a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA4BFD9-B070-4AA8-B79F-1112CD73B25B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf815a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "847AAE6A-7655-4095-A983-B7835FD266CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf816a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD65DD7-FB11-4C4B-BE4E-C57CE8E58EBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf817a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0B29B6-F193-4218-8CEA-B73891943459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf844a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09A61C05-7EF6-4E51-AB12-4989D9A62C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf845a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59BCC5EF-7CA0-4DA0-B9A7-FA645468C64B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf846a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B49E99C-0365-4412-806C-4BFDD98D7D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jf847a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E131CA5-87A9-4197-BDE6-9CD50CAAA360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg059a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "184FBB20-0B0D-40D9-B26D-D159E2A52648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg091a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53DD0194-8F15-4EB3-93AF-A361A9E5C916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg092a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70711E75-9303-4E07-BFEE-C8A6B5F8778B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg182a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D1CCD3-A6B8-4D84-8EE3-E73B0F60E475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg183a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F20FB99-C8D9-4BFE-A616-70AABD7FB5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg184a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3A62689-EC43-4D33-B36E-A46DF7C35121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg207a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B9CEE9-09E0-40E0-AADD-59351ED047A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg208a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5198A349-1C31-49EB-A398-81401AFC58B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg209a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17E821A-0B63-4006-BBFE-8E34AC6C60F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg210a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E213652C-DB18-4A0E-A778-CEB2E85FADDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg213a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CA86ED-F1F8-4DCF-884C-292948D92A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg214a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8B56C6-04F1-425C-9BF9-421D717ED020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg215a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1AA114B-91FD-43D1-AF59-6C8FD18EDFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg221a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33BCEC1-738C-473E-AEE7-647D5CF4CCB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg222a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "120ADF8A-BB28-4102-9E82-B45BDB179FE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg223a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67BCD8BD-3F00-4889-A1B2-9DF4324C0AA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg225a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D481E3E2-559E-45A1-9F78-82C4906FB546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg236a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A834ADB-A5B7-4A2A-B941-D4961780F4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg237a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A0ACC2C-178E-4F9E-AA87-FF8440E77ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg238a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "117EC32C-7355-4120-AC13-9FCC52ED01E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg239a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DA384E8-09DA-4A2C-A8C2-E816AAEABD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg240a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE1EE5EB-6AAC-456C-8F42-FC070CCDF0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg241a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22DD6817-8515-4C38-B782-1EF6388338B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg242a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE2F8BD-4BE5-426D-9E1A-ADD7016A452B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg245a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4600E8A-7E49-44DD-9EDB-2851EA73426B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg246a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79FFCBDA-7838-41FA-BC88-1BA3BD3739FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg247a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "325973E4-3901-47B7-A0AA-8BBC8FA372AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg248a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16F94A1-345F-49C5-9D13-7A91C596C7A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg249a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71B52F-0DF0-4B94-BF12-055A466B8352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg250a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7880E24-FBFD-4800-8144-09D00EB0625E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg251a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6941E1E-FBA0-447F-8D61-847766F679EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg252a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D06F54C-BD9F-45A6-8C9B-E49221F07CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg253a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4EB5EF-C68E-48B4-AEA2-FEF79C2A97D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg254a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA5FB6C-D401-4153-B134-9E39CC9B2D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg255a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A424CB0-AF60-40FD-92BB-5EFC85F33BE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg256a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFB9DB1-ADFB-40AA-847E-0B56B2F2A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg257a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA6CD60-4582-49D5-814C-53BF5E46324D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg258a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F22FFC-FC76-4212-8D42-C4336D6AE3AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg299a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4841B453-D864-4CB2-9FAE-D37D4A9264A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg300a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A6B38-F736-4D24-AAA7-1291F22AA1D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg301a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8FA7C9-2B29-4A19-BF6C-982C1C4DEB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg302a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "718B06F1-7FE8-43DC-A860-216B1CF66746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg303a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF44D3EC-E815-4C06-972F-BAF456DDD301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg304a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CF980C6-7126-47B3-8728-CC63844BC1C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg305a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADC509A-613B-4249-9ADE-6497B9987ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg307a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3C334D8-D2AA-4C3E-BC9F-2FF71DDACD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg311a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60AC6C80-878F-4475-B5A5-144F9FB56F33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg312a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99653F38-FB4E-4396-87A2-431A0522E092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg315a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A231F17-0B21-431C-B495-FC866D3188E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg348a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE0BDBE-6D57-48F1-9168-FA5B2CD22E91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg349a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1F019FF-C501-49F8-9EBD-873E20005ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg350a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "072ACBBB-FCC5-4351-BDFA-D2EDDF1D31F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jg478a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12CB86C4-24DF-4908-958D-BD18A42F123D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jr024a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25472C53-B4E2-470C-A73C-EA1ABA931D36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jr430b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E8223CE-D5FE-412D-B7EC-A0726733C4A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:jr431b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "710253B3-D4FB-4551-9A32-17D6571A87FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:juc653a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "509BA356-6AC6-499E-87FA-592BAF4DFFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:lsq1fwbsc0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EB30AEF-2717-4792-9696-E7A41ACC625F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:lsq1srpd0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D4F9BE-CEE7-4AC5-8CB0-DB17FA781565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:lsr1fw2a1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF9E1C3-E9D2-4979-B7D5-BCEF5F531ECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:rpe-x1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "520ACF94-5E5C-4224-B67F-22F24DCE5679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:rtvz33020as:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4E52E2-DFE9-4241-AFFD-118E806E8029",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:-ma5200g:v300r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFE18F2-D20E-4263-955C-DC187A9F4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atb:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C3E8827-69D8-407C-BB9B-8C9E082FCC44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20e-x6:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "95FD8872-04BE-425F-B686-F2DDF59E7A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40\\\u002680:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B1A3D0-801C-4BE3-B4E1-A98F51A60A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\\u002680e:v300r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF4083B-7A4D-4C9E-8BA0-5A9E0D41C925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\\u002680e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CD6977-BA83-4E9A-A657-6F34D5AAB5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\\u002680e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "3217F01D-CA35-49E7-AA9E-88853C6267D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\\u002680e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8055D2-11F6-4855-AADB-6D14E0E9047E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v800r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "112BBFF1-C071-4E96-AD1E-45BBF5F975A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Certain HP Access Controller, Fabric Module, Firewall, Router, Switch, and UTM Appliance products; certain HP 3Com Access Controller, Router, and Switch products; certain HP H3C Access Controller, Firewall, Router, Switch, and Switch and Route Processing Unit products; and certain Huawei Firewall/Gateway, Router, Switch, and Wireless products do not properly implement access control as defined in h3c-user.mib 2.0 and hh3c-user.mib 2.0, which allows remote authenticated users to discover credentials in UserInfoEntry values via an SNMP request with the read-only community."
    },
    {
      "lang": "es",
      "value": "Determinados HP Access Controller, Fabric Module, Firewall, Router, Switch, y productos UTM Appliance; algunos  productos HP 3Com Access Controller, Router, Switch; algunos HP H3C Access Controller, Firewall, Router, Switch, y Switch y Route Processing Unit ; y determinados productos  Huawei Firewall/Gateway, Router, Switch, y Wireless  no implementan un control de acceso adecuado definido en  defined en h3c-user.mib 2.0 y hh3c-user.mib 2.0, lo que permite a usuarios autenticados remotamente descubrir credenciales en los valores de UserInfoEntry a trav\u00e9s de peticiones SNMP con la comunidad \"read-only\"."
    }
  ],
  "id": "CVE-2012-3268",
  "lastModified": "2024-11-21T01:40:32.760",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-01T11:49:52.647",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301\u0026contentId=NEWS1000001165\u0026idAbsPath=0301_10001\u0026nameAbsPath=Services%2520News"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930\u0026colID=ROOTENWEB%7CCO0000000170\u0026actionFlag=view"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/225404"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8ZDJDP"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/56183"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1027694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0123.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03515685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301\u0026contentId=NEWS1000001165\u0026idAbsPath=0301_10001\u0026nameAbsPath=Services%2520News"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.huawei.com/support/pages/news/NewsInfoAction.do?doc_id=IN0000054930\u0026colID=ROOTENWEB%7CCO0000000170\u0026actionFlag=view"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/225404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8ZDJDP"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/56183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1027694"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-06-20 15:55
Modified
2024-11-21 01:43
Severity ?
Summary
The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.
Impacted products
Vendor Product Version
huawei acu v100r003c01spc100
huawei acu v200r001c00
huawei acu v200r001c00spc100
huawei ar_19\/29\/49 *
huawei ar_g3 v200r001c00
huawei ar_g3 v200r001c01
huawei ar_g3 v200r002c00spc200
huawei atn v200r001c00
huawei atn v200r001c01
huawei cx200 v100r005
huawei cx300 v100r005
huawei cx600 v200r002
huawei cx600 v600r001
huawei cx600 v600r002
huawei cx600 v600r003
huawei e200_usg2200 *
huawei e200_usg5100 *
huawei e200e-b *
huawei e200e-c *
huawei e200e-usg2100 *
huawei e200e-x1 *
huawei e200e-x2 *
huawei e200x3 *
huawei e200x5 *
huawei e200x7 *
huawei eudemon_8080e *
huawei eudemon_8160e *
huawei eudemon_usg5300 *
huawei eudemon_usg5500 *
huawei eudemon_usg9300 *
huawei eudemon_usg9500 *
huawei eudemon1000 *
huawei eudemon1000e-u *
huawei eudemon1000e-x *
huawei eudemon100e v200r007
huawei eudemon200 v200r001
huawei eudemon300 *
huawei eudemon500 *
huawei eudemon8000e-x *
huawei h3c_ar\(oem_in\) *
huawei ma5200g v200r003
huawei ma5200g v300r003
huawei me60 v100r005
huawei me60 v100r006
huawei me60 v600r002
huawei me60 v600r003
huawei me60 v600r005c00spc600
huawei ne20 v200r005
huawei ne20e-x6 v300r005
huawei ne40 v300r005
huawei ne40e v300r005
huawei ne40e v600r001
huawei ne40e\/80e v600r002
huawei ne40e\/80e v600r003
huawei ne5000e v300r007
huawei ne5000e v800r002
huawei ne80 v300r005
huawei ne80e v600r001
huawei ne80e v600r002
huawei ne80e v600r003
huawei nip100 v100r001
huawei nip1000 v100r001
huawei nip200 v100r001
huawei nip2100 v100r001c00
huawei nip2200 v100r001c00
huawei nip5100 v100r001c00
huawei s2300 v100r002
huawei s2300 v100r003
huawei s2300 v100r005
huawei s2300 v100r006
huawei s2700 v100r006
huawei s3300 v100r002
huawei s3300 v100r003
huawei s3300 v100r005
huawei s3300 v100r006
huawei s3300hi v100r006
huawei s3300hi v200r001
huawei s3700 v100r005
huawei s3700 v100r006
huawei s3700 v200r001
huawei s5300 v100r002
huawei s5300 v100r003
huawei s5300 v100r005
huawei s5300 v100r006
huawei s5300hi v100r006
huawei s5300hi v200r001
huawei s5306 v100r006
huawei s5306 v200r001
huawei s5700 v100r005
huawei s5700 v100r006
huawei s5700 v200r001
huawei s6300 v100r006
huawei s6300 v200r001
huawei s6700 v100r006
huawei s6700 v200r001
huawei s7700 v100r003
huawei s7700 v100r006
huawei s9300 v100r001
huawei s9300 v100r002
huawei s9300 v100r003
huawei s9300 v100r006
huawei svn2000 v200r001c00
huawei svn3000 v100r002c02spc802b041
huawei svn5000 v200r001c00
huawei svn5300 v100r001c01b019
huawei wlan_ac_6605 v200r001c00
huawei wlan_ac_6605 v200r001c00spc100



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
              "versionEndIncluding": "r2207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
              "matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90",
              "versionEndIncluding": "v100r005c01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
              "versionEndIncluding": "v200r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
              "versionEndIncluding": "v200r001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
              "versionEndIncluding": "v200r002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
              "versionEndIncluding": "v100r003c00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
              "versionEndIncluding": "v200r001c00spc600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
              "versionEndIncluding": "v200r001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7",
              "versionEndIncluding": "v200r002",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
              "versionEndIncluding": "v200r006c02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
              "versionEndIncluding": "v200r001c00spc600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478",
              "versionEndIncluding": "r2209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
              "matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
              "matchCriteriaId": "94970073-415B-4358-833F-CC220653376D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
              "matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
              "matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
              "matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
    },
    {
      "lang": "es",
      "value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta."
    }
  ],
  "id": "CVE-2012-4960",
  "lastModified": "2024-11-21T01:43:49.593",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-06-20T15:55:00.897",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/948096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/948096"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}