Search criteria
45 vulnerabilities found for nexus_7000 by cisco
FKIE_CVE-2014-3261
Vulnerability from fkie_nvd - Published: 2014-05-26 00:25 - Updated: 2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "908F8E5E-9BC4-4682-8C25-C07DB032A18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6584DF3-E466-49BE-B4D8-3E249B7816F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cg-os:cg4:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8BB917-C330-4439-825A-3E05B69DDFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cg-os:cg4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788D020C-DFD1-43E5-A4FF-48E6003FEC0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cgr_1120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1119E8B9-53A3-4724-9EEB-F4A35F9F59E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:cgr_1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4089B3FB-EC0D-408D-A75E-942E23BECB72",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F8C124BA-D5FC-422A-B3F4-AC1A41B7EEE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F358E8D0-624B-412A-8726-B8AF96156317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "17A4CE07-64FF-4C5C-81FF-A2388818CF7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFDC9595-39D4-4BF8-AF18-D27A500C9007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7241BFDB-6386-4CBE-ACFB-4599EDE9CB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AF7CE90-9433-4E1D-A2AD-0B8854521CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F8C124BA-D5FC-422A-B3F4-AC1A41B7EEE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F358E8D0-624B-412A-8726-B8AF96156317",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "17A4CE07-64FF-4C5C-81FF-A2388818CF7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFDC9595-39D4-4BF8-AF18-D27A500C9007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7241BFDB-6386-4CBE-ACFB-4599EDE9CB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AF7CE90-9433-4E1D-A2AD-0B8854521CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "171160E9-F6B8-4C8A-B086-431E3E2A27BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9CAFAE6E-8B64-4A1F-A7E4-2D4BDFB7D5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91C35886-CB9B-4477-9AB3-9F1C9E45E757",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F393BE8-8CC4-4302-829F-2C4F97BAC14B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE855B3E-B2B8-4EBA-8303-55F6A5A77E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "641D651A-B85B-4E9E-BE92-35AFAE8A63A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7810F6FD-F58F-4121-9D30-8C5E3E163EFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09C38DCD-2A5F-4095-ABA4-02E95D93C358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103A4C19-0E91-45FC-9AA2-F40215FCF63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F61C03B-D7AB-468A-B092-158730FB3E0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F883AA8-CC44-4440-AB30-D7AC29C242F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7390B4D2-2121-4311-A798-337E8B777A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "924C6663-9EA0-4124-ACC6-0AFC649AEA6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3C559C83-FB34-4B1A-A6B3-1834D6CD022C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F422D53-4FF4-43FB-8F62-D53393A8C038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7CFFFE88-17EA-4515-BF71-C0AB82957B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5010p_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD1E96B-1927-42DC-A47B-5632CED2D40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5020p_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0737BA36-75AB-478D-9001-3DA3E49C6F00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en la implementaci\u00f3n Smart Call Home en Cisco NX-OS on Fabric Interconnects en Cisco Unified Computing System 1.4 anterior a 1.4(1i), NX-OS 5.0 anterior a 5.0(3)U2(2) en dispositivos Nexus 3000, NX-OS 4.1 anterior a 4.1(2)E1(1l) en dispositivos Nexus 4000, NX-OS 5.x anterior a 5.1(3)N1(1) en dispositivos Nexus 5000, NX-OS 5.2 anterior a 5.2(3a) en dispositivos Nexus 7000 y CG-OS CG4 anterior a CG4(2) en Connected 1000 Connected Grid Routers permite a servidores SMTP remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una respuesta manipulada, tambi\u00e9n conocido como Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405 y CSCuf61322."
}
],
"id": "CVE-2014-3261",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-26T00:25:32.220",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1191
Vulnerability from fkie_nvd - Published: 2014-05-26 00:25 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 6.1 | |
| cisco | nx-os | 6.1\(1\) | |
| cisco | nx-os | 6.1\(2\) | |
| cisco | nx-os | 6.1\(3\) | |
| cisco | nx-os | 6.1\(4\) | |
| cisco | nx-os | 6.1\(4a\) | |
| cisco | nexus_7000 | - | |
| cisco | nexus_7000_10-slot | - | |
| cisco | nexus_7000_18-slot | - | |
| cisco | nexus_7000_9-slot | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6F882AB-C25D-477F-96BF-7001BB77B955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "35E48EE6-C498-4E13-AC5E-28F6B4391725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3B41075-01D1-4832-A025-07A378F2A5E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "858E4134-643C-422C-8441-5372F4BC25D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A12BFDB0-4B90-4EB6-9CBE-A7A33C57EA9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400."
},
{
"lang": "es",
"value": "Cisco NX-OS 6.1 anterior a 6.1(5) en dispositivos Nexus 7000, cuando autenticaci\u00f3n local y m\u00faltiples VDCs est\u00e1n habilitadas, permite a usuarios remotos autenticados ganar privilegios dentro de una VDC no intencionada a trav\u00e9s de datos de claves SSH manipulados en una sesi\u00f3n hacia una interfaz de gesti\u00f3n, tambi\u00e9n conocido como Bug ID CSCud88400."
}
],
"id": "CVE-2013-1191",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-26T00:25:31.673",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2201
Vulnerability from fkie_nvd - Published: 2014-05-26 00:25 - Updated: 2025-04-12 10:46
Severity ?
Summary
The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05DDEA84-A3C8-47C0-BA73-48CA7707A73D",
"versionEndIncluding": "6.2\\(5a\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD54E122-6102-451E-92BF-AF71D98AEBE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(1n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1F0244F2-D8AA-469F-8AFD-655CA4F5F650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C857C0F-B023-4CF7-9916-6735C40425F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(3n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD503699-A02E-4A62-827F-0906C94448EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4C558C0-ECA4-408D-A5DF-2A175E48EAE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915."
},
{
"lang": "es",
"value": "Message Transfer Service (MTS) en Cisco NX-OS anterior a 6.2(7) en dispositivos MDS 9000 y 6.0 anterior a 6.0(2) en dispositivos Nexus 7000 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y kernel panic) a trav\u00e9s de un volumen grande de trafico manipulado, tambi\u00e9n conocido como Bug ID CSCtw98915."
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"",
"id": "CVE-2014-2201",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-26T00:25:31.767",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-0684
Vulnerability from fkie_nvd - Published: 2014-05-07 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 6.2\(2\) | |
| cisco | nexus_7000 | - | |
| cisco | nexus_7000_10-slot | - | |
| cisco | nexus_7000_18-slot | - | |
| cisco | nexus_7000_9-slot | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FDE8EF9-47CF-451D-9570-3D369D74D44F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136."
},
{
"lang": "es",
"value": "Cisco NX-OS 6.2(2) en switches Nexus 7000 permite a usuarios locales causar una denegaci\u00f3n de servicio a trav\u00e9s de entradas sed manipuladas, tambi\u00e9n conocido como Bug ID CSCui56136."
}
],
"id": "CVE-2014-0684",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-07T10:55:04.603",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-4090
Vulnerability from fkie_nvd - Published: 2013-10-05 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | - | |
| cisco | nexus_7000 | - | |
| cisco | nexus_7000_10-slot | - | |
| cisco | nexus_7000_18-slot | - | |
| cisco | nexus_7000_9-slot | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089."
},
{
"lang": "es",
"value": "La interfaz de gesti\u00f3n en Cisco NX-OS en dispositivos Nexus 7000 permite a usuarios remotos autenticados obtener informaci\u00f3n de configuraci\u00f3n de archivos sensible mediante el aprovechamiento del rol network-operator, tambi\u00e9n conocido como Bug ID CSCti09089."
}
],
"id": "CVE-2012-4090",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-05T10:55:03.307",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/98123"
},
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/55206"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/62841"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029158"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/98123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/55206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/62841"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1226
Vulnerability from fkie_nvd - Published: 2013-04-29 12:20 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | - | |
| cisco | nexus_7000 | - | |
| cisco | nexus_7000_10-slot | - | |
| cisco | nexus_7000_18-slot | - | |
| cisco | nexus_7000_9-slot | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098."
},
{
"lang": "es",
"value": "La implementaci\u00f3n Ethernet frame-forwarding en Cisco NX-OS para dispositivos Nexus 7000 permite a usuarios remotos causar una denegaci\u00f3n de servicios (bucle forwarding y corte de servicio) a trav\u00e9s de un frame modificado, tambi\u00e9n conocido Bug ID CSCug47098."
}
],
"id": "CVE-2013-1226",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-29T12:20:36.267",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1180
Vulnerability from fkie_nvd - Published: 2013-04-25 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 4.0 | |
| cisco | nx-os | 4.0\(0\)n1\(1a\) | |
| cisco | nx-os | 4.0\(0\)n1\(2\) | |
| cisco | nx-os | 4.0\(0\)n1\(2a\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1a\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.1\(3\)n1\(1\) | |
| cisco | nx-os | 4.1\(3\)n1\(1a\) | |
| cisco | nx-os | 4.1\(3\)n2\(1\) | |
| cisco | nx-os | 4.1\(3\)n2\(1a\) | |
| cisco | nx-os | 4.1.\(2\) | |
| cisco | nx-os | 4.1.\(3\) | |
| cisco | nx-os | 4.1.\(4\) | |
| cisco | nx-os | 4.1.\(5\) | |
| cisco | nx-os | 4.2 | |
| cisco | nx-os | 4.2\(1\) | |
| cisco | nx-os | 4.2\(1\)n1\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(2\) | |
| cisco | nx-os | 4.2\(3\) | |
| cisco | nx-os | 4.2\(4\) | |
| cisco | nx-os | 4.2\(6\) | |
| cisco | nx-os | 4.2\(8\) | |
| cisco | nx-os | 4.2.\(2a\) | |
| cisco | nx-os | 5.0 | |
| cisco | nx-os | 5.0\(2\) | |
| cisco | nx-os | 5.0\(2\)n1\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1a\) | |
| cisco | nx-os | 5.0\(2a\) | |
| cisco | nx-os | 5.0\(3\) | |
| cisco | nx-os | 5.0\(3\)n1\(1\) | |
| cisco | nx-os | 5.0\(3\)n1\(1a\) | |
| cisco | nx-os | 5.0\(3\)n1\(1b\) | |
| cisco | nx-os | 5.0\(3\)n1\(1c\) | |
| cisco | nx-os | 5.0\(3\)n2\(1\) | |
| cisco | nx-os | 5.0\(3\)n2\(2\) | |
| cisco | nx-os | 5.0\(3\)n2\(2a\) | |
| cisco | nx-os | 5.0\(3\)n2\(2b\) | |
| cisco | nx-os | 5.0\(5\) | |
| cisco | nx-os | 5.1 | |
| cisco | nx-os | 5.1\(1\) | |
| cisco | nx-os | 5.1\(1a\) | |
| cisco | nx-os | 5.1\(2\) | |
| cisco | nx-os | 5.1\(3\) | |
| cisco | nx-os | 5.1\(3\)n1\(1\) | |
| cisco | nx-os | 5.1\(3\)n1\(1a\) | |
| cisco | nx-os | 5.1\(4\) | |
| cisco | nx-os | 5.1\(5\) | |
| cisco | nx-os | 5.1\(6\) | |
| cisco | nx-os | 5.2 | |
| cisco | nx-os | 5.2\(1\) | |
| cisco | nx-os | 5.2\(3\) | |
| cisco | nx-os | 5.2\(3a\) | |
| cisco | nx-os | 5.2\(4\) | |
| cisco | nx-os | 6.0\(1\) | |
| cisco | nx-os | 6.0\(2\) | |
| cisco | nx-os | 6.1 | |
| cisco | nexus_7000 | - | |
| cisco | nexus_7000_10-slot | - | |
| cisco | nexus_7000_18-slot | - | |
| cisco | nexus_7000_9-slot | - | |
| cisco | nx-os | 4.0 | |
| cisco | nx-os | 4.0\(0\)n1\(1a\) | |
| cisco | nx-os | 4.0\(0\)n1\(2\) | |
| cisco | nx-os | 4.0\(0\)n1\(2a\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1a\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.1\(3\)n1\(1\) | |
| cisco | nx-os | 4.1\(3\)n1\(1a\) | |
| cisco | nx-os | 4.1\(3\)n2\(1\) | |
| cisco | nx-os | 4.1\(3\)n2\(1a\) | |
| cisco | nx-os | 4.1.\(2\) | |
| cisco | nx-os | 4.1.\(3\) | |
| cisco | nx-os | 4.1.\(4\) | |
| cisco | nx-os | 4.1.\(5\) | |
| cisco | nx-os | 4.2 | |
| cisco | nx-os | 4.2\(1\) | |
| cisco | nx-os | 4.2\(1\)n1\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(2\) | |
| cisco | nx-os | 4.2\(3\) | |
| cisco | nx-os | 4.2\(4\) | |
| cisco | nx-os | 4.2\(6\) | |
| cisco | nx-os | 4.2\(8\) | |
| cisco | nx-os | 4.2.\(2a\) | |
| cisco | nx-os | 5.0 | |
| cisco | nx-os | 5.0\(2\) | |
| cisco | nx-os | 5.0\(2\)n1\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1a\) | |
| cisco | nx-os | 5.0\(2a\) | |
| cisco | nx-os | 5.0\(3\) | |
| cisco | nx-os | 5.0\(3\)n1\(1\) | |
| cisco | nx-os | 5.0\(3\)n1\(1a\) | |
| cisco | nx-os | 5.0\(3\)n1\(1b\) | |
| cisco | nx-os | 5.0\(3\)n1\(1c\) | |
| cisco | nx-os | 5.0\(3\)n2\(1\) | |
| cisco | nx-os | 5.0\(3\)n2\(2\) | |
| cisco | nx-os | 5.0\(3\)n2\(2a\) | |
| cisco | nx-os | 5.0\(3\)n2\(2b\) | |
| cisco | nx-os | 5.0\(5\) | |
| cisco | nx-os | 5.1 | |
| cisco | nx-os | 5.1\(1\) | |
| cisco | nx-os | 5.1\(1a\) | |
| cisco | nx-os | 5.1\(2\) | |
| cisco | nx-os | 5.1\(3\) | |
| cisco | nx-os | 5.1\(3\)n1\(1\) | |
| cisco | nx-os | 5.1\(3\)n1\(1a\) | |
| cisco | nx-os | 5.1\(4\) | |
| cisco | nx-os | 5.1\(5\) | |
| cisco | nx-os | 5.1\(6\) | |
| cisco | nx-os | 5.2 | |
| cisco | nx-os | 5.2\(1\) | |
| cisco | nx-os | 5.2\(3\) | |
| cisco | nx-os | 5.2\(3a\) | |
| cisco | nx-os | 5.2\(4\) | |
| cisco | mds_9000 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "356B4143-5184-491B-9D10-19D6536366CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "161C5BDB-CD50-40C7-B972-A1B650607338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "356B4143-5184-491B-9D10-19D6536366CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la implementaci\u00f3n SNMP en Cisco NX-OS en dispositivos Nexus 7000 y v4.x v5.x antes de v5.2(5) y v6.x antes de v6.1(1) y MDS 9000 dispositivos v4.x y v5.x antes de v5.2(5) permite a los usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud SNMP elaborado, aka CSCtx54822 ID de error."
}
],
"id": "CVE-2013-1180",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-25T10:55:01.640",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1178
Vulnerability from fkie_nvd - Published: 2013-04-25 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "161C5BDB-CD50-40C7-B972-A1B650607338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76DB8386-819B-47A5-93AC-9B15C16F2799",
"versionEndIncluding": "4.1.\\(2\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61F9825B-DD64-4E38-9AE0-F87C210ADD9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DC9B19-881F-4899-A255-34D77F0561D1",
"versionEndIncluding": "2.0\\(1x\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB67F2CC-67A3-42B0-A241-3BAB8EC52AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0\\(2k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "097EBEF0-8228-4034-93CC-F50226633D64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "75680C91-A1EF-4BE1-8D26-C4763E44A091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "44E4A6EA-FFBE-41C9-9A99-135FB9C1AD3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "881A281B-F042-4662-973B-ECB9C536A0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4CEC2A3-E00F-4DD9-A9A7-436131554733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC29BA47-A40A-4666-BF60-7949406C56DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0CB4EB98-5F8D-4BC1-813C-397B7E82E891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C881B-CAAC-40AB-A9BF-93495BAFE56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "20C079CC-34E2-4C8D-ABC9-6D76F4A22D73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F2FDBA01-AE8E-4B06-9A4E-71CB16D3C592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "765CC42E-FAC8-43D6-9B40-B8CF7272C4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C0806ED-7F9C-4166-B47A-0381C215FF2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76367743-6762-4C70-AFD7-4848E2FE3F61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4857DF36-804A-4B2B-B2AA-37E8A0036F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1w\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B18FB5A-F569-413C-BA09-58C28EF9316C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1y\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41EC377E-7DAD-4E6C-AC3F-215B6EAB05D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "469AF1BD-4F2B-4830-99DD-A51EB562B559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B66B97A2-05E3-49B5-8CD7-9F85155AE911",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E23273C6-256C-4541-ACB9-54AF6C167694",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C863FFF-0BF7-40F2-B75C-FAFA7FCAF49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8AAB9E22-6D0A-4894-83F1-A61412DEEF12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9234FFB6-7A06-44F5-8A66-2DCDBB750A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3u\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F730CFA8-7D04-47FC-80D0-D9A9A96442BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3y\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8F5ECD-BEB9-450A-8588-C66DB1749191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F587446E-72F2-476E-8122-417FBBE80803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10359225-8D87-4B50-A431-4CF28A442431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B5E4EB6-2C64-4432-BEF7-125E6920F418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "963ABB73-9FBC-411A-9498-4279E0A922EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4ECB9171-BDD8-4FAD-9930-1CE03AD3DACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C126B-3C93-4CB1-8AE5-875866119A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "196AED55-BFF6-4EC3-9161-C06896E4B1C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6F4760A3-C8BE-4C7E-AC05-0ABEC8B57923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1w\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66EF9AAC-6C24-43EA-BF46-A6B36F9F830E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "908F8E5E-9BC4-4682-8C25-C07DB032A18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6584DF3-E466-49BE-B4D8-3E249B7816F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cg-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E14C91-295A-452D-B563-70F1234C9941",
"versionEndIncluding": "cg4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cg-os:cg1:*:*:*:*:*:*:*",
"matchCriteriaId": "B4AB2D19-4750-43C4-B559-967C6C1653D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cg-os:cg2:*:*:*:*:*:*:*",
"matchCriteriaId": "8962D4B2-32F8-4F16-B6E6-82B7275C0505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:cg-os:cg3:*:*:*:*:*:*:*",
"matchCriteriaId": "40AD8B81-C95A-45E1-BE3C-A47828F640E5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:connected_grid_router_1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "626B9AAE-A20E-4685-894B-8DF9D2361FC3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en la implementaci\u00f3n Cisco Discovery Protocol (CDP) de Cisco NX-OS en dispositivos Nexus 7000 y v4.x v5.x antes v5.2(4) y v6.x antes de v6.1(1), Nexus 5000 y 5500 v4.x v5.x antes de v5.1(3)N1(1), Nexus 4000 antes de v4.1(2)E1(1h), Nexus 3000 v5.x antes de v5.0(3)U3(1), Nexus 1000V v4.x antes de v4.2(1)SV1(5.1), MDS 9000 v4.x y v5.x antes v5.2(4), Unified Computing System (UCS) 6100 y 6200 antes v2.0(2m), y el Router conexi\u00f3n a la red (CGR) 1000 dispositivos antes CG4 (1) permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes CDP malformados, tambi\u00e9n conocido como Bug ID CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544 y CSCuf61275."
}
],
"id": "CVE-2013-1178",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-25T10:55:01.570",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1179
Vulnerability from fkie_nvd - Published: 2013-04-25 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 4.0 | |
| cisco | nx-os | 4.0\(0\)n1\(1a\) | |
| cisco | nx-os | 4.0\(0\)n1\(2\) | |
| cisco | nx-os | 4.0\(0\)n1\(2a\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1a\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.1\(3\)n1\(1\) | |
| cisco | nx-os | 4.1\(3\)n1\(1a\) | |
| cisco | nx-os | 4.1\(3\)n2\(1\) | |
| cisco | nx-os | 4.1\(3\)n2\(1a\) | |
| cisco | nx-os | 4.1.\(2\) | |
| cisco | nx-os | 4.1.\(3\) | |
| cisco | nx-os | 4.1.\(4\) | |
| cisco | nx-os | 4.1.\(5\) | |
| cisco | nx-os | 4.2 | |
| cisco | nx-os | 4.2\(1\) | |
| cisco | nx-os | 4.2\(1\)n1\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(2\) | |
| cisco | nx-os | 4.2\(3\) | |
| cisco | nx-os | 4.2\(4\) | |
| cisco | nx-os | 4.2\(6\) | |
| cisco | nx-os | 4.2\(8\) | |
| cisco | nx-os | 4.2.\(2a\) | |
| cisco | nx-os | 5.0 | |
| cisco | nx-os | 5.0\(2\) | |
| cisco | nx-os | 5.0\(2\)n1\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1a\) | |
| cisco | nx-os | 5.0\(2a\) | |
| cisco | nx-os | 5.0\(3\) | |
| cisco | nx-os | 5.0\(3\)n1\(1\) | |
| cisco | nx-os | 5.0\(3\)n1\(1a\) | |
| cisco | nx-os | 5.0\(3\)n1\(1b\) | |
| cisco | nx-os | 5.0\(3\)n1\(1c\) | |
| cisco | nx-os | 5.0\(3\)n2\(1\) | |
| cisco | nx-os | 5.0\(3\)n2\(2\) | |
| cisco | nx-os | 5.0\(3\)n2\(2a\) | |
| cisco | nx-os | 5.0\(3\)n2\(2b\) | |
| cisco | nx-os | 5.0\(5\) | |
| cisco | nx-os | 5.1 | |
| cisco | nx-os | 5.1\(1\) | |
| cisco | nx-os | 5.1\(1a\) | |
| cisco | nx-os | 5.1\(2\) | |
| cisco | nx-os | 5.1\(3\) | |
| cisco | nx-os | 5.1\(3\)n1\(1\) | |
| cisco | nx-os | 5.1\(3\)n1\(1a\) | |
| cisco | nx-os | 5.1\(4\) | |
| cisco | nx-os | 5.1\(5\) | |
| cisco | nx-os | 5.1\(6\) | |
| cisco | nx-os | 5.2 | |
| cisco | nx-os | 5.2\(1\) | |
| cisco | nx-os | 5.2\(3\) | |
| cisco | nx-os | 5.2\(3a\) | |
| cisco | nx-os | 5.2\(4\) | |
| cisco | nx-os | 6.0\(1\) | |
| cisco | nx-os | 6.0\(2\) | |
| cisco | nx-os | 6.1 | |
| cisco | nexus_7000 | - | |
| cisco | nexus_7000_10-slot | - | |
| cisco | nexus_7000_18-slot | - | |
| cisco | nexus_7000_9-slot | - | |
| cisco | nx-os | 4.0 | |
| cisco | nx-os | 4.0\(0\)n1\(1a\) | |
| cisco | nx-os | 4.0\(0\)n1\(2\) | |
| cisco | nx-os | 4.0\(0\)n1\(2a\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1a\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.1\(3\)n1\(1\) | |
| cisco | nx-os | 4.1\(3\)n1\(1a\) | |
| cisco | nx-os | 4.1\(3\)n2\(1\) | |
| cisco | nx-os | 4.1\(3\)n2\(1a\) | |
| cisco | nx-os | 4.1.\(2\) | |
| cisco | nx-os | 4.1.\(3\) | |
| cisco | nx-os | 4.1.\(4\) | |
| cisco | nx-os | 4.1.\(5\) | |
| cisco | nx-os | 4.2 | |
| cisco | nx-os | 4.2\(1\) | |
| cisco | nx-os | 4.2\(1\)n1\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(2\) | |
| cisco | nx-os | 4.2\(3\) | |
| cisco | nx-os | 4.2\(4\) | |
| cisco | nx-os | 4.2\(6\) | |
| cisco | nx-os | 4.2\(8\) | |
| cisco | nx-os | 4.2.\(2a\) | |
| cisco | nx-os | 5.0 | |
| cisco | nx-os | 5.0\(2\) | |
| cisco | nx-os | 5.0\(2\)n1\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1a\) | |
| cisco | nx-os | 5.0\(2a\) | |
| cisco | nx-os | 5.0\(3\) | |
| cisco | nx-os | 5.0\(3\)n1\(1\) | |
| cisco | nx-os | 5.0\(3\)n1\(1a\) | |
| cisco | nx-os | 5.0\(3\)n1\(1b\) | |
| cisco | nx-os | 5.0\(3\)n1\(1c\) | |
| cisco | nx-os | 5.0\(3\)n2\(1\) | |
| cisco | nx-os | 5.0\(3\)n2\(2\) | |
| cisco | nx-os | 5.0\(3\)n2\(2a\) | |
| cisco | nx-os | 5.0\(3\)n2\(2b\) | |
| cisco | nx-os | 5.0\(5\) | |
| cisco | nx-os | 5.1 | |
| cisco | nx-os | 5.1\(1\) | |
| cisco | nx-os | 5.1\(1a\) | |
| cisco | nx-os | 5.1\(2\) | |
| cisco | nx-os | 5.1\(3\) | |
| cisco | nx-os | 5.1\(3\)n1\(1\) | |
| cisco | nx-os | 5.1\(3\)n1\(1a\) | |
| cisco | nx-os | 5.1\(4\) | |
| cisco | nx-os | 5.1\(5\) | |
| cisco | nx-os | 5.1\(6\) | |
| cisco | nx-os | 5.2 | |
| cisco | nx-os | 5.2\(1\) | |
| cisco | nx-os | 5.2\(3\) | |
| cisco | nx-os | 5.2\(3a\) | |
| cisco | nx-os | 5.2\(4\) | |
| cisco | mds_9000 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "356B4143-5184-491B-9D10-19D6536366CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "161C5BDB-CD50-40C7-B972-A1B650607338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "356B4143-5184-491B-9D10-19D6536366CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en el (1)SNMP y (2) implementaciones del License Manager en Cisco NX-OS en dispositivos Nexus 7000 y v4.x v5.x antes de v5.2(5) y v6.x antes de v6.1(1) y MDS 9000 dispositivos v4.x y v5.x antes de v5.2(5) permiten a los usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud SNMP hecha a mano, tambi\u00e9n conocido como Bug ID CSCtx54830."
}
],
"id": "CVE-2013-1179",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-25T10:55:01.617",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1122
Vulnerability from fkie_nvd - Published: 2013-02-13 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | - | |
| cisco | nx-os | 4.0 | |
| cisco | nx-os | 4.0\(0\)n1\(1a\) | |
| cisco | nx-os | 4.0\(0\)n1\(2\) | |
| cisco | nx-os | 4.0\(0\)n1\(2a\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1a\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.1\(3\)n1\(1\) | |
| cisco | nx-os | 4.1\(3\)n1\(1a\) | |
| cisco | nx-os | 4.1\(3\)n2\(1\) | |
| cisco | nx-os | 4.1\(3\)n2\(1a\) | |
| cisco | nx-os | 4.1.\(2\) | |
| cisco | nx-os | 4.1.\(3\) | |
| cisco | nx-os | 4.1.\(4\) | |
| cisco | nx-os | 4.1.\(5\) | |
| cisco | nx-os | 4.2 | |
| cisco | nx-os | 4.2\(1\) | |
| cisco | nx-os | 4.2\(1\)n1\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(2\) | |
| cisco | nx-os | 4.2\(3\) | |
| cisco | nx-os | 4.2\(4\) | |
| cisco | nx-os | 4.2\(6\) | |
| cisco | nx-os | 4.2\(8\) | |
| cisco | nx-os | 4.2.\(2a\) | |
| cisco | nx-os | 5.0 | |
| cisco | nx-os | 5.0\(2\) | |
| cisco | nx-os | 5.0\(2\)n1\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1\) | |
| cisco | nx-os | 5.0\(2\)n2\(1a\) | |
| cisco | nx-os | 5.0\(2a\) | |
| cisco | nx-os | 5.0\(3\) | |
| cisco | nx-os | 5.0\(3\)n1\(1\) | |
| cisco | nx-os | 5.0\(3\)n1\(1a\) | |
| cisco | nx-os | 5.0\(3\)n1\(1b\) | |
| cisco | nx-os | 5.0\(3\)n1\(1c\) | |
| cisco | nx-os | 5.0\(3\)n2\(1\) | |
| cisco | nx-os | 5.0\(3\)n2\(2\) | |
| cisco | nx-os | 5.0\(3\)n2\(2a\) | |
| cisco | nx-os | 5.0\(3\)n2\(2b\) | |
| cisco | nx-os | 5.0\(5\) | |
| cisco | nx-os | 5.1 | |
| cisco | nx-os | 5.1\(1\) | |
| cisco | nx-os | 5.1\(1a\) | |
| cisco | nx-os | 5.1\(2\) | |
| cisco | nx-os | 5.1\(3\) | |
| cisco | nx-os | 5.1\(3\)n1\(1\) | |
| cisco | nx-os | 5.1\(3\)n1\(1a\) | |
| cisco | nx-os | 5.1\(4\) | |
| cisco | nx-os | 5.1\(5\) | |
| cisco | nx-os | 5.1\(6\) | |
| cisco | nx-os | 5.2 | |
| cisco | nx-os | 5.2\(1\) | |
| cisco | nx-os | 5.2\(3\) | |
| cisco | nx-os | 5.2\(3a\) | |
| cisco | nx-os | 6.0\(1\) | |
| cisco | nx-os | 6.0\(2\) | |
| cisco | nx-os | 6.1 | |
| cisco | nexus_7000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "161C5BDB-CD50-40C7-B972-A1B650607338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673."
},
{
"lang": "es",
"value": "Cisco NX-OS en el Nexus 7000, cuando un Overlay Transport Virtualizaci\u00f3n determinado (OTV) de configuraci\u00f3n se utiliza, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (M1-Series recarga m\u00f3dulo) a trav\u00e9s de paquetes hechos a mano, tambi\u00e9n conocido como Bug ID CSCud15673."
}
],
"id": "CVE-2013-1122",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-02-13T23:55:01.273",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-3261 (GCVE-0-2014-3261)
Vulnerability from cvelistv5 – Published: 2014-05-24 01:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:35:57.142Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-24T01:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3261",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-3261",
"datePublished": "2014-05-24T01:00:00",
"dateReserved": "2014-05-07T00:00:00",
"dateUpdated": "2024-08-06T10:35:57.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1191 (GCVE-0-2013-1191)
Vulnerability from cvelistv5 – Published: 2014-05-24 01:00 – Updated: 2024-08-06 14:57
VLAI?
Summary
Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:57:02.960Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-24T01:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1191",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1191",
"datePublished": "2014-05-24T01:00:00",
"dateReserved": "2013-01-11T00:00:00",
"dateUpdated": "2024-08-06T14:57:02.960Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2201 (GCVE-0-2014-2201)
Vulnerability from cvelistv5 – Published: 2014-05-24 01:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:06:00.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-24T01:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2201",
"datePublished": "2014-05-24T01:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:06:00.199Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0684 (GCVE-0-2014-0684)
Vulnerability from cvelistv5 – Published: 2014-05-07 10:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:19.136Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"name": "20140505 Cisco Nexus 7000 Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-07T06:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"name": "20140505 Cisco Nexus 7000 Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0684",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"name": "20140505 Cisco Nexus 7000 Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-0684",
"datePublished": "2014-05-07T10:00:00",
"dateReserved": "2014-01-02T00:00:00",
"dateUpdated": "2024-08-06T09:27:19.136Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4090 (GCVE-0-2012-4090)
Vulnerability from cvelistv5 – Published: 2013-10-05 10:00 – Updated: 2024-08-06 20:28
VLAI?
Summary
The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:28:07.677Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-nxos-cve20124090-info-disc(87670)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"name": "62841",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/62841"
},
{
"name": "98123",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/98123"
},
{
"name": "1029158",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029158"
},
{
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"name": "55206",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55206"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-10-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-nxos-cve20124090-info-disc(87670)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"name": "62841",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/62841"
},
{
"name": "98123",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/98123"
},
{
"name": "1029158",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029158"
},
{
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"name": "55206",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55206"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-4090",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-nxos-cve20124090-info-disc(87670)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"name": "62841",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62841"
},
{
"name": "98123",
"refsource": "OSVDB",
"url": "http://osvdb.org/98123"
},
{
"name": "1029158",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029158"
},
{
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"name": "55206",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55206"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-4090",
"datePublished": "2013-10-05T10:00:00",
"dateReserved": "2012-07-31T00:00:00",
"dateUpdated": "2024-08-06T20:28:07.677Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1226 (GCVE-0-2013-1226)
Vulnerability from cvelistv5 – Published: 2013-04-29 01:00 – Updated: 2024-09-17 00:45
VLAI?
Summary
The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:57:03.876Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130425 Cisco Nexus 7000 Frame Forwarding Loop Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-29T01:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130425 Cisco Nexus 7000 Frame Forwarding Loop Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130425 Cisco Nexus 7000 Frame Forwarding Loop Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1226",
"datePublished": "2013-04-29T01:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-17T00:45:52.183Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1180 (GCVE-0-2013-1180)
Vulnerability from cvelistv5 – Published: 2013-04-25 10:00 – Updated: 2024-09-16 22:19
VLAI?
Summary
Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.937Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-25T10:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1180",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1180",
"datePublished": "2013-04-25T10:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-16T22:19:44.167Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1178 (GCVE-0-2013-1178)
Vulnerability from cvelistv5 – Published: 2013-04-25 10:00 – Updated: 2024-09-17 00:17
VLAI?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.703Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-25T10:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1178",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1178",
"datePublished": "2013-04-25T10:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-17T00:17:30.568Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1179 (GCVE-0-2013-1179)
Vulnerability from cvelistv5 – Published: 2013-04-25 10:00 – Updated: 2024-09-16 19:51
VLAI?
Summary
Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-25T10:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1179",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1179",
"datePublished": "2013-04-25T10:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-16T19:51:24.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1122 (GCVE-0-2013-1122)
Vulnerability from cvelistv5 – Published: 2013-02-13 23:00 – Updated: 2024-09-17 00:06
VLAI?
Summary
Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.663Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-13T23:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1122",
"datePublished": "2013-02-13T23:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-17T00:06:42.137Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-3261 (GCVE-0-2014-3261)
Vulnerability from nvd – Published: 2014-05-24 01:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:35:57.142Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-24T01:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3261",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-3261",
"datePublished": "2014-05-24T01:00:00",
"dateReserved": "2014-05-07T00:00:00",
"dateUpdated": "2024-08-06T10:35:57.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1191 (GCVE-0-2013-1191)
Vulnerability from nvd – Published: 2014-05-24 01:00 – Updated: 2024-08-06 14:57
VLAI?
Summary
Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:57:02.960Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-24T01:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1191",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco NX-OS 6.1 before 6.1(5) on Nexus 7000 devices, when local authentication and multiple VDCs are enabled, allows remote authenticated users to gain privileges within an unintended VDC via crafted SSH key data in an SSH session to a management interface, aka Bug ID CSCud88400."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1191",
"datePublished": "2014-05-24T01:00:00",
"dateReserved": "2013-01-11T00:00:00",
"dateUpdated": "2024-08-06T14:57:02.960Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2201 (GCVE-0-2014-2201)
Vulnerability from nvd – Published: 2014-05-24 01:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:06:00.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-24T01:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2201",
"datePublished": "2014-05-24T01:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:06:00.199Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0684 (GCVE-0-2014-0684)
Vulnerability from nvd – Published: 2014-05-07 10:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:19.136Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"name": "20140505 Cisco Nexus 7000 Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-07T06:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"name": "20140505 Cisco Nexus 7000 Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0684",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco NX-OS 6.2(2) on Nexus 7000 switches allows local users to cause a denial of service via crafted sed input, aka Bug ID CSCui56136."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34131"
},
{
"name": "20140505 Cisco Nexus 7000 Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0684"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-0684",
"datePublished": "2014-05-07T10:00:00",
"dateReserved": "2014-01-02T00:00:00",
"dateUpdated": "2024-08-06T09:27:19.136Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4090 (GCVE-0-2012-4090)
Vulnerability from nvd – Published: 2013-10-05 10:00 – Updated: 2024-08-06 20:28
VLAI?
Summary
The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:28:07.677Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-nxos-cve20124090-info-disc(87670)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"name": "62841",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/62841"
},
{
"name": "98123",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/98123"
},
{
"name": "1029158",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029158"
},
{
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"name": "55206",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55206"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-10-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-nxos-cve20124090-info-disc(87670)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"name": "62841",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/62841"
},
{
"name": "98123",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/98123"
},
{
"name": "1029158",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029158"
},
{
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"name": "55206",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55206"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-4090",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-nxos-cve20124090-info-disc(87670)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
},
{
"name": "62841",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62841"
},
{
"name": "98123",
"refsource": "OSVDB",
"url": "http://osvdb.org/98123"
},
{
"name": "1029158",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029158"
},
{
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
},
{
"name": "55206",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55206"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-4090",
"datePublished": "2013-10-05T10:00:00",
"dateReserved": "2012-07-31T00:00:00",
"dateUpdated": "2024-08-06T20:28:07.677Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1226 (GCVE-0-2013-1226)
Vulnerability from nvd – Published: 2013-04-29 01:00 – Updated: 2024-09-17 00:45
VLAI?
Summary
The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:57:03.876Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130425 Cisco Nexus 7000 Frame Forwarding Loop Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-29T01:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130425 Cisco Nexus 7000 Frame Forwarding Loop Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Ethernet frame-forwarding implementation in Cisco NX-OS on Nexus 7000 devices allows remote attackers to cause a denial of service (forwarding loop and service outage) via a crafted frame, aka Bug ID CSCug47098."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130425 Cisco Nexus 7000 Frame Forwarding Loop Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1226"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1226",
"datePublished": "2013-04-29T01:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-17T00:45:52.183Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1180 (GCVE-0-2013-1180)
Vulnerability from nvd – Published: 2013-04-25 10:00 – Updated: 2024-09-16 22:19
VLAI?
Summary
Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.937Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-25T10:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1180",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1180",
"datePublished": "2013-04-25T10:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-16T22:19:44.167Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1178 (GCVE-0-2013-1178)
Vulnerability from nvd – Published: 2013-04-25 10:00 – Updated: 2024-09-17 00:17
VLAI?
Summary
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.703Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-25T10:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1178",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1178",
"datePublished": "2013-04-25T10:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-17T00:17:30.568Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1179 (GCVE-0-2013-1179)
Vulnerability from nvd – Published: 2013-04-25 10:00 – Updated: 2024-09-16 19:51
VLAI?
Summary
Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-25T10:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1179",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the (1) SNMP and (2) License Manager implementations in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allow remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54830."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1179",
"datePublished": "2013-04-25T10:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-16T19:51:24.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-1122 (GCVE-0-2013-1122)
Vulnerability from nvd – Published: 2013-02-13 23:00 – Updated: 2024-09-17 00:06
VLAI?
Summary
Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:49:20.663Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-13T23:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2013-1122",
"datePublished": "2013-02-13T23:00:00Z",
"dateReserved": "2013-01-11T00:00:00Z",
"dateUpdated": "2024-09-17T00:06:42.137Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}