Search criteria

21 vulnerabilities found for nexus_1000v by cisco

FKIE_CVE-2015-0775

Vulnerability from fkie_nvd - Published: 2015-06-12 14:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1f\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BC749257-E3FB-4831-8B50-CBB82A6AF162",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zn\\(99.67\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B09770FE-CD69-401E-8DC3-5DBBFB14B698",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_31128pq:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E262B017-866F-4C82-895B-F92B8D49E469",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4750621F-E7C5-4E6A-BC5F-232E75A454E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57892CBB-8C95-4E56-90F8-B77BBBDC03FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:mds_9000_nx-os:6.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D75C2A6F-BB85-41D4-8ADF-6EAF1CD2091D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n Banner (tambi\u00e9n conocida como MOTD) en Cisco NX-OS 4.1(2)E1(1f) en los dispositivos Nexus 4000, 5.2(1)SV3(2.1) en los dispositivos Nexus 1000V, 6.0(2)N2(2) en los dispositivos Nexus 5000, 6.2(11) en los dispositivos MDS 9000, 6.2(12) en los dispositivos Nexus 7000, 7.0(3) en los dispositivos Nexus 9000, y 7.2(0)ZN(99.67) en los dispositivos Nexus 3000 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reconfiguraci\u00f3n del proceso de inicio de sesi\u00f3n) a trav\u00e9s de una solicitud de sesi\u00f3n de terminal no especificada durante el montaje de la sesi\u00f3n TELNET, tambi\u00e9n conocida como Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, y CSCuu77182."
    }
  ],
  "id": "CVE-2015-0775",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-06-12T14:59:02.770",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032561"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1032562"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-5556

Vulnerability from fkie_nvd - Published: 2013-11-18 03:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted "install all iso" arguments, aka Bug ID CSCui21340.
Impacted products
Vendor Product Version
cisco nexus_1000v 4.2\(1\)vsg1\(1\)
cisco nexus_1000v 5.2\(1\)sm1\(5.1\)
cisco nexus_1000v *
cisco nexus_1000v 4.2\(1\)_sv1\(4\)
cisco nexus_1000v 4.2\(1\)_sv1\(4a\)
cisco nexus_1000v 4.2\(1\)_sv1\(4b\)
cisco nexus_1000v 4.2\(1\)sv1\(5.1\)
cisco nexus_1000v 4.2\(1\)sv1\(5.1a\)
cisco nexus_1000v 4.2\(1\)sv1\(5.2\)

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)vsg1\\(1\\):-:*:*:*:nexus_1000v:*:*",
              "matchCriteriaId": "AA97328A-5DF2-4C01-99C4-1D24077A9A1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:5.2\\(1\\)sm1\\(5.1\\):-:*:*:*:microsoft_hyper-v:*:*",
              "matchCriteriaId": "C6B1D4A5-9F33-487C-A798-096CA1F1B9D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:*:-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "73EFA484-4033-4868-A733-F65B02B7B752",
              "versionEndIncluding": "4.2\\(1\\)sv1\\(5.2b\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)_sv1\\(4\\):-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "64AD054B-953C-46F1-99A3-AB3DE35FE695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)_sv1\\(4a\\):-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "9C9675A0-9933-4EA9-991D-D3B6F775F88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)_sv1\\(4b\\):-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "75BF9F0F-980B-4BD0-B48B-A8191B660889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)sv1\\(5.1\\):-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "719A5726-4049-4BDD-8BF9-41E2D8E8FF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)sv1\\(5.1a\\):-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "5A87AEED-3CC1-4D78-9F31-9CF9702351D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:4.2\\(1\\)sv1\\(5.2\\):-:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "B59A502A-467B-464B-9B81-46D08B75ED84",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted \"install all iso\" arguments, aka Bug ID CSCui21340."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo license-installation en el switch Cisco Nexus 1000V 4.2(1)SV1(5.2b) y anteriores para VMware vSphere, switch Cisco Nexus 1000V 5.2(1)SM1(5.1) para Microsoft Hyper-V, y Cisco Virtual Security Gateway 4.2(1)VSG1(1) para switches Nexus 1000V permite a usuarios locales obtener privilegios y ejecutar comandos arbitrarios a trav\u00e9s de argumentos \"install all iso\" manipulados, tambi\u00e9n conocido como Bug ID CSCui21340."
    }
  ],
  "id": "CVE-2013-5556",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-18T03:55:06.040",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-3400

Vulnerability from fkie_nvd - Published: 2013-07-10 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted "install license" arguments, aka Bug ID CSCuh30824.
Impacted products
Vendor Product Version
cisco nx-os -
cisco nexus_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted \"install license\" arguments, aka Bug ID CSCuh30824."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo license-installation en Cisco NX-OS en dispositivos Nexus 1000V, permite a usuarios locales ejecutar comandos arbitrarioa trav\u00e9s de argumentos manipulados en la instalaci\u00f3n de la licencia. Aka Bug ID CSCuh30824."
    }
  ],
  "id": "CVE-2013-3400",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-10T20:55:02.090",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id/1028763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1028763"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-1212

Vulnerability from fkie_nvd - Published: 2013-05-29 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837.
Impacted products
Vendor Product Version
cisco nx-os -
cisco nexus_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837."
    },
    {
      "lang": "es",
      "value": "La funcionalidad SSL Cisco NX-OS en Nexus 1000V no verifica adecuadamente los certificados X.509, lo que permite a atacantes MiTM suplantar a los servidores, e interceptar o modificar el modulo Virtual Supervisor Module (VSM) de comunicaci\u00f3n de VMware vCenter, a trav\u00e9s de un certificado manipulado, tambi\u00e9n conocido como Bug ID CSCud14837."
    }
  ],
  "id": "CVE-2013-1212",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-29T19:55:01.087",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-1213

Vulnerability from fkie_nvd - Published: 2013-05-29 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840.
Impacted products
Vendor Product Version
cisco nx-os -
cisco nexus_1000v -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840."
    },
    {
      "lang": "es",
      "value": "Cisco NX-OS  sobre the Nexus 1000V no asignan la prioridad adecuada a los mensajes \"heartbeat\" desde un m\u00f3dulo (VSM), lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (informe falso de indisponibilidad de VEM) a trav\u00e9s de una inundaci\u00f3n de paquetes UDP. Aka Bug ID CSCud14840."
    }
  ],
  "id": "CVE-2013-1213",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-29T19:55:01.110",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-1178

Vulnerability from fkie_nvd - Published: 2013-04-25 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Impacted products
Vendor Product Version
cisco nx-os 4.0
cisco nx-os 4.0\(0\)n1\(1a\)
cisco nx-os 4.0\(0\)n1\(2\)
cisco nx-os 4.0\(0\)n1\(2a\)
cisco nx-os 4.0\(1a\)n1\(1\)
cisco nx-os 4.0\(1a\)n1\(1a\)
cisco nx-os 4.0\(1a\)n2\(1\)
cisco nx-os 4.0\(1a\)n2\(1a\)
cisco nx-os 4.0\(4\)sv1\(1\)
cisco nx-os 4.0\(4\)sv1\(2\)
cisco nx-os 4.0\(4\)sv1\(3\)
cisco nx-os 4.0\(4\)sv1\(3a\)
cisco nx-os 4.0\(4\)sv1\(3b\)
cisco nx-os 4.0\(4\)sv1\(3c\)
cisco nx-os 4.0\(4\)sv1\(3d\)
cisco nx-os 4.1\(3\)n1\(1\)
cisco nx-os 4.1\(3\)n1\(1a\)
cisco nx-os 4.1\(3\)n2\(1\)
cisco nx-os 4.1\(3\)n2\(1a\)
cisco nx-os 4.1.\(2\)
cisco nx-os 4.1.\(3\)
cisco nx-os 4.1.\(4\)
cisco nx-os 4.1.\(5\)
cisco nx-os 4.2
cisco nx-os 4.2\(1\)
cisco nx-os 4.2\(1\)n1\(1\)
cisco nx-os 4.2\(1\)n2\(1\)
cisco nx-os 4.2\(1\)n2\(1a\)
cisco nx-os 4.2\(1\)sv1\(4\)
cisco nx-os 4.2\(1\)sv1\(4a\)
cisco nx-os 4.2\(1\)sv1\(5.1\)
cisco nx-os 4.2\(2\)
cisco nx-os 4.2\(3\)
cisco nx-os 4.2\(4\)
cisco nx-os 4.2\(6\)
cisco nx-os 4.2\(8\)
cisco nx-os 4.2.\(2a\)
cisco nx-os 5.0
cisco nx-os 5.0\(2\)
cisco nx-os 5.0\(2\)n1\(1\)
cisco nx-os 5.0\(2\)n2\(1\)
cisco nx-os 5.0\(2\)n2\(1a\)
cisco nx-os 5.0\(2a\)
cisco nx-os 5.0\(3\)
cisco nx-os 5.0\(3\)n1\(1\)
cisco nx-os 5.0\(3\)n1\(1a\)
cisco nx-os 5.0\(3\)n1\(1b\)
cisco nx-os 5.0\(3\)n1\(1c\)
cisco nx-os 5.0\(3\)n2\(1\)
cisco nx-os 5.0\(3\)n2\(2\)
cisco nx-os 5.0\(3\)n2\(2a\)
cisco nx-os 5.0\(3\)n2\(2b\)
cisco nx-os 5.0\(5\)
cisco nx-os 5.1
cisco nx-os 5.1\(1\)
cisco nx-os 5.1\(1a\)
cisco nx-os 5.1\(2\)
cisco nx-os 5.1\(3\)
cisco nx-os 5.1\(3\)n1\(1\)
cisco nx-os 5.1\(3\)n1\(1a\)
cisco nx-os 5.1\(4\)
cisco nx-os 5.1\(5\)
cisco nx-os 5.1\(6\)
cisco nx-os 5.2
cisco nx-os 5.2\(1\)
cisco nx-os 5.2\(3\)
cisco nx-os 5.2\(3a\)
cisco nx-os 6.0\(1\)
cisco nx-os 6.0\(2\)
cisco nx-os 6.1
cisco nexus_7000 -
cisco nexus_7000_10-slot -
cisco nexus_7000_18-slot -
cisco nexus_7000_9-slot -
cisco nx-os 4.0
cisco nx-os 4.0\(0\)n1\(1a\)
cisco nx-os 4.0\(0\)n1\(2\)
cisco nx-os 4.0\(0\)n1\(2a\)
cisco nx-os 4.0\(1a\)n1\(1\)
cisco nx-os 4.0\(1a\)n1\(1a\)
cisco nx-os 4.0\(1a\)n2\(1\)
cisco nx-os 4.0\(1a\)n2\(1a\)
cisco nx-os 4.0\(4\)sv1\(1\)
cisco nx-os 4.0\(4\)sv1\(2\)
cisco nx-os 4.0\(4\)sv1\(3\)
cisco nx-os 4.0\(4\)sv1\(3a\)
cisco nx-os 4.0\(4\)sv1\(3b\)
cisco nx-os 4.0\(4\)sv1\(3c\)
cisco nx-os 4.0\(4\)sv1\(3d\)
cisco nx-os 4.1\(3\)n1\(1\)
cisco nx-os 4.1\(3\)n1\(1a\)
cisco nx-os 4.1\(3\)n2\(1\)
cisco nx-os 4.1\(3\)n2\(1a\)
cisco nx-os 4.1.\(2\)
cisco nx-os 4.1.\(3\)
cisco nx-os 4.1.\(4\)
cisco nx-os 4.1.\(5\)
cisco nx-os 4.2
cisco nx-os 4.2\(1\)
cisco nx-os 4.2\(1\)n1\(1\)
cisco nx-os 4.2\(1\)n2\(1\)
cisco nx-os 4.2\(1\)n2\(1a\)
cisco nx-os 4.2\(1\)sv1\(4\)
cisco nx-os 4.2\(1\)sv1\(4a\)
cisco nx-os 4.2\(1\)sv1\(5.1\)
cisco nx-os 4.2\(2\)
cisco nx-os 4.2\(3\)
cisco nx-os 4.2\(4\)
cisco nx-os 4.2\(6\)
cisco nx-os 4.2\(8\)
cisco nx-os 4.2.\(2a\)
cisco nx-os 5.0
cisco nx-os 5.0\(2\)
cisco nx-os 5.0\(2\)n1\(1\)
cisco nx-os 5.0\(2\)n2\(1\)
cisco nx-os 5.0\(2\)n2\(1a\)
cisco nx-os 5.0\(2a\)
cisco nx-os 5.0\(3\)
cisco nx-os 5.0\(3\)n1\(1\)
cisco nx-os 5.0\(3\)n1\(1a\)
cisco nx-os 5.0\(3\)n1\(1b\)
cisco nx-os 5.0\(3\)n1\(1c\)
cisco nx-os 5.0\(3\)n2\(1\)
cisco nx-os 5.0\(3\)n2\(2\)
cisco nx-os 5.0\(3\)n2\(2a\)
cisco nx-os 5.0\(3\)n2\(2b\)
cisco nx-os 5.0\(5\)
cisco nx-os 5.1
cisco nx-os 5.1\(1\)
cisco nx-os 5.1\(1a\)
cisco nx-os 5.1\(2\)
cisco nx-os 5.1\(3\)
cisco nx-os 5.1\(3\)n1\(1\)
cisco nx-os 5.1\(3\)n1\(1a\)
cisco nx-os 5.1\(4\)
cisco nx-os 5.1\(5\)
cisco nx-os 5.1\(6\)
cisco nx-os 5.2
cisco nx-os 5.2\(1\)
cisco nx-os 5.2\(3\)
cisco nx-os 5.2\(3a\)
cisco mds_9000 *
cisco nx-os 4.0
cisco nx-os 4.0\(0\)n1\(1a\)
cisco nx-os 4.0\(0\)n1\(2\)
cisco nx-os 4.0\(0\)n1\(2a\)
cisco nx-os 4.0\(1a\)n1\(1\)
cisco nx-os 4.0\(1a\)n1\(1a\)
cisco nx-os 4.0\(1a\)n2\(1\)
cisco nx-os 4.0\(1a\)n2\(1a\)
cisco nx-os 4.0\(4\)sv1\(1\)
cisco nx-os 4.0\(4\)sv1\(2\)
cisco nx-os 4.0\(4\)sv1\(3\)
cisco nx-os 4.0\(4\)sv1\(3a\)
cisco nx-os 4.0\(4\)sv1\(3b\)
cisco nx-os 4.0\(4\)sv1\(3c\)
cisco nx-os 4.0\(4\)sv1\(3d\)
cisco nx-os 4.1\(3\)n1\(1\)
cisco nx-os 4.1\(3\)n1\(1a\)
cisco nx-os 4.1\(3\)n2\(1\)
cisco nx-os 4.1\(3\)n2\(1a\)
cisco nx-os 4.1.\(2\)
cisco nx-os 4.1.\(3\)
cisco nx-os 4.1.\(4\)
cisco nx-os 4.1.\(5\)
cisco nx-os 4.2
cisco nx-os 4.2\(1\)
cisco nx-os 4.2\(1\)n1\(1\)
cisco nx-os 4.2\(1\)n2\(1\)
cisco nx-os 4.2\(1\)n2\(1a\)
cisco nx-os 4.2\(1\)sv1\(4\)
cisco nx-os 4.2\(1\)sv1\(4a\)
cisco nx-os 4.2\(1\)sv1\(5.1\)
cisco nx-os 4.2\(2\)
cisco nx-os 4.2\(3\)
cisco nx-os 4.2\(4\)
cisco nx-os 4.2\(6\)
cisco nx-os 4.2\(8\)
cisco nx-os 4.2.\(2a\)
cisco nx-os 5.0
cisco nx-os 5.0\(2\)
cisco nx-os 5.0\(2\)n1\(1\)
cisco nx-os 5.0\(2\)n2\(1\)
cisco nx-os 5.0\(2\)n2\(1a\)
cisco nx-os 5.0\(2a\)
cisco nx-os 5.0\(3\)
cisco nx-os 5.0\(3\)n1\(1\)
cisco nx-os 5.0\(3\)n1\(1a\)
cisco nx-os 5.0\(3\)n1\(1b\)
cisco nx-os 5.0\(3\)n1\(1c\)
cisco nx-os 5.0\(3\)n2\(1\)
cisco nx-os 5.0\(3\)n2\(2\)
cisco nx-os 5.0\(3\)n2\(2a\)
cisco nx-os 5.0\(3\)n2\(2b\)
cisco nx-os 5.0\(5\)
cisco nx-os 5.1
cisco nx-os 5.1\(1\)
cisco nx-os 5.1\(1a\)
cisco nx-os 5.1\(2\)
cisco nexus_5000 -
cisco nexus_5010 -
cisco nexus_5020 -
cisco nexus_5548p -
cisco nexus_5548up -
cisco nexus_5596up -
cisco nx-os *
cisco nx-os 4.0
cisco nx-os 4.0\(0\)n1\(1a\)
cisco nx-os 4.0\(0\)n1\(2\)
cisco nx-os 4.0\(0\)n1\(2a\)
cisco nx-os 4.0\(1a\)n1\(1\)
cisco nx-os 4.0\(1a\)n1\(1a\)
cisco nx-os 4.0\(1a\)n2\(1\)
cisco nx-os 4.0\(1a\)n2\(1a\)
cisco nx-os 4.0\(4\)sv1\(1\)
cisco nx-os 4.0\(4\)sv1\(2\)
cisco nx-os 4.0\(4\)sv1\(3\)
cisco nx-os 4.0\(4\)sv1\(3a\)
cisco nx-os 4.0\(4\)sv1\(3b\)
cisco nx-os 4.0\(4\)sv1\(3c\)
cisco nx-os 4.0\(4\)sv1\(3d\)
cisco nexus_4001i -
cisco nx-os 5.0
cisco nx-os 5.0\(2\)
cisco nx-os 5.0\(2\)n1\(1\)
cisco nx-os 5.0\(2\)n2\(1\)
cisco nx-os 5.0\(2\)n2\(1a\)
cisco nx-os 5.0\(2a\)
cisco nx-os 5.0\(3\)
cisco nx-os 5.0\(3\)n1\(1\)
cisco nx-os 5.0\(3\)n1\(1a\)
cisco nx-os 5.0\(3\)n1\(1b\)
cisco nx-os 5.0\(3\)n1\(1c\)
cisco nx-os 5.0\(3\)n2\(1\)
cisco nx-os 5.0\(3\)n2\(2\)
cisco nx-os 5.0\(3\)n2\(2a\)
cisco nx-os 5.0\(3\)n2\(2b\)
cisco nexus_3000 *
cisco nexus_3016q -
cisco nexus_3048 -
cisco nexus_3064t -
cisco nexus_3064x -
cisco nexus_3548 -
cisco nx-os 4.0
cisco nx-os 4.0\(0\)n1\(1a\)
cisco nx-os 4.0\(0\)n1\(2\)
cisco nx-os 4.0\(0\)n1\(2a\)
cisco nx-os 4.0\(1a\)n1\(1\)
cisco nx-os 4.0\(1a\)n1\(1a\)
cisco nx-os 4.0\(1a\)n2\(1\)
cisco nx-os 4.0\(1a\)n2\(1a\)
cisco nx-os 4.0\(4\)sv1\(1\)
cisco nx-os 4.0\(4\)sv1\(2\)
cisco nx-os 4.0\(4\)sv1\(3\)
cisco nx-os 4.0\(4\)sv1\(3a\)
cisco nx-os 4.0\(4\)sv1\(3b\)
cisco nx-os 4.0\(4\)sv1\(3c\)
cisco nx-os 4.0\(4\)sv1\(3d\)
cisco nx-os 4.1\(3\)n1\(1\)
cisco nx-os 4.1\(3\)n1\(1a\)
cisco nx-os 4.1\(3\)n2\(1\)
cisco nx-os 4.1\(3\)n2\(1a\)
cisco nx-os 4.1.\(2\)
cisco nx-os 4.1.\(3\)
cisco nx-os 4.1.\(4\)
cisco nx-os 4.1.\(5\)
cisco nx-os 4.2
cisco nx-os 4.2\(1\)
cisco nx-os 4.2\(1\)n1\(1\)
cisco nx-os 4.2\(1\)n2\(1\)
cisco nx-os 4.2\(1\)n2\(1a\)
cisco nx-os 4.2\(1\)sv1\(4\)
cisco nx-os 4.2\(1\)sv1\(4a\)
cisco nexus_1000v -
cisco unified_computing_system_infrastructure_and_unified_computing_system_software *
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.0
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.0\(2k\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.1
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.1\(1m\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.2
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.2\(1\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.2\(1a\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.2\(1d\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1c\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1m\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1n\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1o\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1p\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1q\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1t\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1w\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.3\(1y\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(1j\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(1m\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3i\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3l\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3m\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3q\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3s\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3u\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(3y\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(4f\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(4g\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(4i\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(4j\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 1.4\(4k\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 2.0\(1q\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 2.0\(1s\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 2.0\(1t\)
cisco unified_computing_system_infrastructure_and_unified_computing_system_software 2.0\(1w\)
cisco unified_computing_system_6120xp_fabric_interconnect -
cisco unified_computing_system_6140xp_fabric_interconnect -
cisco unified_computing_system_6248up_fabric_interconnect -
cisco unified_computing_system_6296up_fabric_interconnect -
cisco cg-os *
cisco cg-os cg1
cisco cg-os cg2
cisco cg-os cg3
cisco connected_grid_router_1000 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "161C5BDB-CD50-40C7-B972-A1B650607338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76DB8386-819B-47A5-93AC-9B15C16F2799",
              "versionEndIncluding": "4.1.\\(2\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F9825B-DD64-4E38-9AE0-F87C210ADD9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6DC9B19-881F-4899-A255-34D77F0561D1",
              "versionEndIncluding": "2.0\\(1x\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB67F2CC-67A3-42B0-A241-3BAB8EC52AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0\\(2k\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "097EBEF0-8228-4034-93CC-F50226633D64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75680C91-A1EF-4BE1-8D26-C4763E44A091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1\\(1m\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "44E4A6EA-FFBE-41C9-9A99-135FB9C1AD3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "881A281B-F042-4662-973B-ECB9C536A0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4CEC2A3-E00F-4DD9-A9A7-436131554733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AC29BA47-A40A-4666-BF60-7949406C56DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB4EB98-5F8D-4BC1-813C-397B7E82E891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C881B-CAAC-40AB-A9BF-93495BAFE56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1m\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20C079CC-34E2-4C8D-ABC9-6D76F4A22D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1n\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2FDBA01-AE8E-4B06-9A4E-71CB16D3C592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1o\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "765CC42E-FAC8-43D6-9B40-B8CF7272C4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1p\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C0806ED-7F9C-4166-B47A-0381C215FF2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1q\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76367743-6762-4C70-AFD7-4848E2FE3F61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1t\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4857DF36-804A-4B2B-B2AA-37E8A0036F65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1w\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B18FB5A-F569-413C-BA09-58C28EF9316C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1y\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "41EC377E-7DAD-4E6C-AC3F-215B6EAB05D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1m\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "469AF1BD-4F2B-4830-99DD-A51EB562B559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3i\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B66B97A2-05E3-49B5-8CD7-9F85155AE911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3l\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E23273C6-256C-4541-ACB9-54AF6C167694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3m\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C863FFF-0BF7-40F2-B75C-FAFA7FCAF49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3q\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8AAB9E22-6D0A-4894-83F1-A61412DEEF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3s\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9234FFB6-7A06-44F5-8A66-2DCDBB750A85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3u\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F730CFA8-7D04-47FC-80D0-D9A9A96442BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3y\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F5ECD-BEB9-450A-8588-C66DB1749191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4f\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F587446E-72F2-476E-8122-417FBBE80803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4g\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10359225-8D87-4B50-A431-4CF28A442431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4i\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B5E4EB6-2C64-4432-BEF7-125E6920F418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4j\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "963ABB73-9FBC-411A-9498-4279E0A922EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4k\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECB9171-BDD8-4FAD-9930-1CE03AD3DACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1q\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3C126B-3C93-4CB1-8AE5-875866119A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1s\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "196AED55-BFF6-4EC3-9161-C06896E4B1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1t\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4760A3-C8BE-4C7E-AC05-0ABEC8B57923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1w\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66EF9AAC-6C24-43EA-BF46-A6B36F9F830E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908F8E5E-9BC4-4682-8C25-C07DB032A18B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6584DF3-E466-49BE-B4D8-3E249B7816F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cg-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E14C91-295A-452D-B563-70F1234C9941",
              "versionEndIncluding": "cg4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cg-os:cg1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4AB2D19-4750-43C4-B559-967C6C1653D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cg-os:cg2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962D4B2-32F8-4F16-B6E6-82B7275C0505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cg-os:cg3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40AD8B81-C95A-45E1-BE3C-A47828F640E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:connected_grid_router_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "626B9AAE-A20E-4685-894B-8DF9D2361FC3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en la implementaci\u00f3n Cisco Discovery Protocol (CDP) de Cisco NX-OS en dispositivos Nexus 7000 y v4.x v5.x antes v5.2(4) y v6.x antes de v6.1(1), Nexus 5000 y 5500 v4.x v5.x antes de v5.1(3)N1(1), Nexus 4000 antes de v4.1(2)E1(1h), Nexus 3000 v5.x antes de v5.0(3)U3(1), Nexus 1000V v4.x antes de v4.2(1)SV1(5.1), MDS 9000 v4.x y v5.x antes v5.2(4), Unified Computing System (UCS) 6100 y 6200 antes v2.0(2m), y el Router conexi\u00f3n a la red (CGR) 1000 dispositivos antes CG4 (1) permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes CDP malformados, tambi\u00e9n conocido como Bug ID CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544 y CSCuf61275."
    }
  ],
  "id": "CVE-2013-1178",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-04-25T10:55:01.570",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-0352

Vulnerability from fkie_nvd - Published: 2012-02-16 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991.
Impacted products
Vendor Product Version
cisco nx-os 4.0\(0\)n1\(1a\)
cisco nx-os 4.0\(0\)n1\(2\)
cisco nx-os 4.0\(0\)n1\(2a\)
cisco nx-os 4.0\(1a\)n1\(1\)
cisco nx-os 4.0\(1a\)n1\(1a\)
cisco nx-os 4.0\(1a\)n2\(1\)
cisco nx-os 4.0\(1a\)n2\(1a\)
cisco nx-os 4.0\(4\)sv1\(1\)
cisco nx-os 4.0\(4\)sv1\(2\)
cisco nx-os 4.0\(4\)sv1\(3\)
cisco nx-os 4.0\(4\)sv1\(3a\)
cisco nx-os 4.0\(4\)sv1\(3b\)
cisco nx-os 4.0\(4\)sv1\(3c\)
cisco nx-os 4.0\(4\)sv1\(3d\)
cisco nx-os 4.1\(3\)n1\(1\)
cisco nx-os 4.1\(3\)n1\(1a\)
cisco nx-os 4.1\(3\)n2\(1\)
cisco nx-os 4.1\(3\)n2\(1a\)
cisco nx-os 4.2\(1\)n1\(1\)
cisco nx-os 4.2\(1\)n2\(1\)
cisco nx-os 4.2\(1\)n2\(1a\)
cisco nx-os 4.2\(1\)sv1\(4\)
cisco nx-os 4.2\(1\)sv1\(4a\)
cisco nexus_1000v -
cisco nx-os 5.0\(2\)n2\(1\)
cisco nx-os 5.0\(2\)n2\(1a\)
cisco nx-os 5.0\(3\)n1\(1\)
cisco nx-os 5.0\(3\)n1\(1a\)
cisco nx-os 5.0\(3\)n1\(1b\)
cisco nx-os 5.0\(3\)n1\(1c\)
cisco nx-os 5.0\(3\)n2\(1\)
cisco nx-os 5.0\(3\)n2\(2\)
cisco nx-os 5.0\(3\)n2\(2a\)
cisco nx-os 5.0\(3\)n2\(2b\)
cisco nx-os 5.1\(3\)n1\(1\)
cisco nx-os 5.1\(3\)n1\(1a\)
cisco nexus_5000 -
cisco nexus_5010 -
cisco nexus_5020 -
cisco nexus_5548p -
cisco nexus_5548up -
cisco nexus_5596up -
cisco nx-os 4.1.\(2\)
cisco nx-os 4.1.\(3\)
cisco nx-os 4.1.\(4\)
cisco nx-os 4.1.\(5\)
cisco nx-os 4.2\(1\)
cisco nx-os 4.2\(2\)
cisco nx-os 4.2\(3\)
cisco nx-os 4.2\(4\)
cisco nx-os 4.2\(6\)
cisco nx-os 4.2.\(2a\)
cisco nx-os 5.0\(2\)
cisco nx-os 5.0\(2a\)
cisco nx-os 5.0\(3\)
cisco nx-os 5.0\(3\)n1\(1\)
cisco nx-os 5.1\(1a\)
cisco nx-os 5.1\(2\)
cisco nx-os 5.1\(3\)
cisco nx-os 5.1\(4\)
cisco nx-os 5.1\(5\)
cisco nx-os 5.1\(6\)
cisco nexus_7000 -
cisco nexus_7000_10-slot -
cisco nexus_7000_18-slot -
cisco nexus_7000_9-slot -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991."
    },
    {
      "lang": "es",
      "value": "Cisco NX-OS v4.2.x antes de v4.2(1)SV1(5.1) en los switches de la serie Nexus 1000v, v4.x y v5.0.x antes de v5.0(2)N1(1) en switches de la serie Nexus 5000, y v4.2.x antes de v4.2.8, v5.0.x antes de v5.0.5 y v5.1.x antes de v5.1.1 en switches de la serie Nexus 7000 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del proceso netstack y reinicio del dispositivo) a trav\u00e9s de un paquete IP con un formato incorrecto. Se trata de unos problemas con ID CSCti23447, CSCti49507 y CSCtj01991."
    }
  ],
  "id": "CVE-2012-0352",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-02-16T21:55:00.943",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2015-0775 (GCVE-0-2015-0775)

Vulnerability from cvelistv5 – Published: 2015-06-12 14:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1032561 vdb-entryx_refsource_SECTRACK
http://www.securitytracker.com/id/1032562 vdb-entryx_refsource_SECTRACK
http://tools.cisco.com/security/center/viewAlert.… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:26:09.842Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032561",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032561"
          },
          {
            "name": "1032562",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032562"
          },
          {
            "name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1032561",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032561"
        },
        {
          "name": "1032562",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032562"
        },
        {
          "name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-0775",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032561",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032561"
            },
            {
              "name": "1032562",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032562"
            },
            {
              "name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-0775",
    "datePublished": "2015-06-12T14:00:00",
    "dateReserved": "2015-01-07T00:00:00",
    "dateUpdated": "2024-08-06T04:26:09.842Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-5556 (GCVE-0-2013-5556)

Vulnerability from cvelistv5 – Published: 2013-11-16 02:00 – Updated: 2024-09-17 01:36
VLAI?
Summary
The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted "install all iso" arguments, aka Bug ID CSCui21340.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:15:21.378Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20131114 Cisco Nexus 1000V Arbitrary Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted \"install all iso\" arguments, aka Bug ID CSCui21340."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-11-16T02:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20131114 Cisco Nexus 1000V Arbitrary Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-5556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted \"install all iso\" arguments, aka Bug ID CSCui21340."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20131114 Cisco Nexus 1000V Arbitrary Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
            },
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-5556",
    "datePublished": "2013-11-16T02:00:00Z",
    "dateReserved": "2013-08-22T00:00:00Z",
    "dateUpdated": "2024-09-17T01:36:02.087Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3400 (GCVE-0-2013-3400)

Vulnerability from cvelistv5 – Published: 2013-07-10 20:00 – Updated: 2024-08-06 16:07
VLAI?
Summary
The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted "install license" arguments, aka Bug ID CSCuh30824.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1028763 vdb-entryx_refsource_SECTRACK
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.933Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1028763",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1028763"
          },
          {
            "name": "20130709 Cisco Nexus 1000V License Installation Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted \"install license\" arguments, aka Bug ID CSCuh30824."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-20T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1028763",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1028763"
        },
        {
          "name": "20130709 Cisco Nexus 1000V License Installation Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3400",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted \"install license\" arguments, aka Bug ID CSCuh30824."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1028763",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1028763"
            },
            {
              "name": "20130709 Cisco Nexus 1000V License Installation Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3400",
    "datePublished": "2013-07-10T20:00:00",
    "dateReserved": "2013-05-06T00:00:00",
    "dateUpdated": "2024-08-06T16:07:37.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1212 (GCVE-0-2013-1212)

Vulnerability from cvelistv5 – Published: 2013-05-29 19:00 – Updated: 2024-09-16 20:57
VLAI?
Summary
The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:57:03.800Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-05-29T19:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1212",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1212",
    "datePublished": "2013-05-29T19:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-16T20:57:55.715Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1213 (GCVE-0-2013-1213)

Vulnerability from cvelistv5 – Published: 2013-05-29 19:00 – Updated: 2024-09-16 22:35
VLAI?
Summary
Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:57:03.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130528 Cisco Nexus 1000V VSM/VEM Heartbeat Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-05-29T19:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130528 Cisco Nexus 1000V VSM/VEM Heartbeat Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1213",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130528 Cisco Nexus 1000V VSM/VEM Heartbeat Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1213",
    "datePublished": "2013-05-29T19:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-16T22:35:14.243Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1178 (GCVE-0-2013-1178)

Vulnerability from cvelistv5 – Published: 2013-04-25 10:00 – Updated: 2024-09-17 00:17
VLAI?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.703Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-25T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1178",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1178",
    "datePublished": "2013-04-25T10:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-17T00:17:30.568Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0352 (GCVE-0-2012-0352)

Vulnerability from cvelistv5 – Published: 2012-02-16 21:00 – Updated: 2024-09-16 20:27
VLAI?
Summary
Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.628Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-16T21:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-0352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-0352",
    "datePublished": "2012-02-16T21:00:00Z",
    "dateReserved": "2012-01-04T00:00:00Z",
    "dateUpdated": "2024-09-16T20:27:44.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-0775 (GCVE-0-2015-0775)

Vulnerability from nvd – Published: 2015-06-12 14:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1032561 vdb-entryx_refsource_SECTRACK
http://www.securitytracker.com/id/1032562 vdb-entryx_refsource_SECTRACK
http://tools.cisco.com/security/center/viewAlert.… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:26:09.842Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032561",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032561"
          },
          {
            "name": "1032562",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032562"
          },
          {
            "name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1032561",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032561"
        },
        {
          "name": "1032562",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032562"
        },
        {
          "name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-0775",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032561",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032561"
            },
            {
              "name": "1032562",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032562"
            },
            {
              "name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-0775",
    "datePublished": "2015-06-12T14:00:00",
    "dateReserved": "2015-01-07T00:00:00",
    "dateUpdated": "2024-08-06T04:26:09.842Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-5556 (GCVE-0-2013-5556)

Vulnerability from nvd – Published: 2013-11-16 02:00 – Updated: 2024-09-17 01:36
VLAI?
Summary
The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted "install all iso" arguments, aka Bug ID CSCui21340.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:15:21.378Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20131114 Cisco Nexus 1000V Arbitrary Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted \"install all iso\" arguments, aka Bug ID CSCui21340."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-11-16T02:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20131114 Cisco Nexus 1000V Arbitrary Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-5556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and earlier for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to gain privileges and execute arbitrary commands via crafted \"install all iso\" arguments, aka Bug ID CSCui21340."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20131114 Cisco Nexus 1000V Arbitrary Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5556"
            },
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31774"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-5556",
    "datePublished": "2013-11-16T02:00:00Z",
    "dateReserved": "2013-08-22T00:00:00Z",
    "dateUpdated": "2024-09-17T01:36:02.087Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3400 (GCVE-0-2013-3400)

Vulnerability from nvd – Published: 2013-07-10 20:00 – Updated: 2024-08-06 16:07
VLAI?
Summary
The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted "install license" arguments, aka Bug ID CSCuh30824.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1028763 vdb-entryx_refsource_SECTRACK
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.933Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1028763",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1028763"
          },
          {
            "name": "20130709 Cisco Nexus 1000V License Installation Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted \"install license\" arguments, aka Bug ID CSCuh30824."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-20T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1028763",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1028763"
        },
        {
          "name": "20130709 Cisco Nexus 1000V License Installation Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3400",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted \"install license\" arguments, aka Bug ID CSCuh30824."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1028763",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1028763"
            },
            {
              "name": "20130709 Cisco Nexus 1000V License Installation Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3400",
    "datePublished": "2013-07-10T20:00:00",
    "dateReserved": "2013-05-06T00:00:00",
    "dateUpdated": "2024-08-06T16:07:37.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1212 (GCVE-0-2013-1212)

Vulnerability from nvd – Published: 2013-05-29 19:00 – Updated: 2024-09-16 20:57
VLAI?
Summary
The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:57:03.800Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-05-29T19:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1212",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1212",
    "datePublished": "2013-05-29T19:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-16T20:57:55.715Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1213 (GCVE-0-2013-1213)

Vulnerability from nvd – Published: 2013-05-29 19:00 – Updated: 2024-09-16 22:35
VLAI?
Summary
Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:57:03.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130528 Cisco Nexus 1000V VSM/VEM Heartbeat Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-05-29T19:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130528 Cisco Nexus 1000V VSM/VEM Heartbeat Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1213",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco NX-OS on the Nexus 1000V does not assign the proper priority to heartbeat messages from a Virtual Ethernet Module (VEM) to a Virtual Supervisor Module (VSM), which allows remote attackers to cause a denial of service (false VEM unavailability report) via a flood of UDP packets, aka Bug ID CSCud14840."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130528 Cisco Nexus 1000V VSM/VEM Heartbeat Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1213"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1213",
    "datePublished": "2013-05-29T19:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-16T22:35:14.243Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1178 (GCVE-0-2013-1178)

Vulnerability from nvd – Published: 2013-04-25 10:00 – Updated: 2024-09-17 00:17
VLAI?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.703Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-25T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1178",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1178",
    "datePublished": "2013-04-25T10:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-17T00:17:30.568Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0352 (GCVE-0-2012-0352)

Vulnerability from nvd – Published: 2012-02-16 21:00 – Updated: 2024-09-16 20:27
VLAI?
Summary
Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.628Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-16T21:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-0352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco NX-OS 4.2.x before 4.2(1)SV1(5.1) on Nexus 1000v series switches; 4.x and 5.0.x before 5.0(2)N1(1) on Nexus 5000 series switches; and 4.2.x before 4.2.8, 5.0.x before 5.0.5, and 5.1.x before 5.1.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (netstack process crash and device reload) via a malformed IP packet, aka Bug IDs CSCti23447, CSCti49507, and CSCtj01991."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120215 Cisco NX-OS Malformed IP Packet Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120215-nxos"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-0352",
    "datePublished": "2012-02-16T21:00:00Z",
    "dateReserved": "2012-01-04T00:00:00Z",
    "dateUpdated": "2024-09-16T20:27:44.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}