Search criteria

3 vulnerabilities found for sg200-24p_firmware by cisco

FKIE_CVE-2020-3147

Vulnerability from fkie_nvd - Published: 2020-01-30 19:15 - Updated: 2024-11-21 05:30
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18
Impacted products
Vendor Product Version
cisco sg200-50_firmware *
cisco sg200-50 -
cisco sg200-50p_firmware *
cisco sg200-50p -
cisco sg200-50fp_firmware *
cisco sg200-50fp -
cisco sg200-26_firmware *
cisco sg200-26 -
cisco sg200-26p_firmware *
cisco sg200-26p -
cisco sg200-26fp_firmware *
cisco sg200-26fp -
cisco sg200-18_firmware *
cisco sg200-18 -
cisco sg200-10fp_firmware *
cisco sg200-10fp -
cisco sg200-08_firmware *
cisco sg200-08 -
cisco sg200-08p_firmware *
cisco sg200-08p -
cisco sg200-24_firmware *
cisco sg200-24 -
cisco sg200-24p_firmware *
cisco sg200-24p -
cisco sg200-24fp_firmware *
cisco sg200-24fp -
cisco sg200-48_firmware *
cisco sg200-48 -
cisco sg200-48p_firmware *
cisco sg200-48p -
cisco sf302-08pp_firmware *
cisco sf302-08pp -
cisco sf302-08mpp_firmware *
cisco sf302-08mpp -
cisco sg300-10pp_firmware *
cisco sg300-10pp -
cisco sg300-10mpp_firmware *
cisco sg300-10mpp -
cisco sf300-24pp_firmware *
cisco sf300-24pp -
cisco sf300-48pp_firmware *
cisco sf300-48pp -
cisco sg300-28pp_firmware *
cisco sg300-28pp -
cisco sf300-08_firmware *
cisco sf300-08 -
cisco sf300-48p_firmware *
cisco sf300-48p -
cisco sg300-10mp_firmware *
cisco sg300-10mp -
cisco sg300-10p_firmware *
cisco sg300-10p -
cisco sg300-10_firmware *
cisco sg300-10 -
cisco sg300-28p_firmware *
cisco sg300-28p -
cisco sf300-24p_firmware *
cisco sf300-24p -
cisco sf302-08mp_firmware *
cisco sf302-08mp -
cisco sg300-28_firmware *
cisco sg300-28 -
cisco sf300-48_firmware *
cisco sf300-48 -
cisco sg300-20_firmware *
cisco sg300-20 -
cisco sf302-08p_firmware *
cisco sf302-08p -
cisco sg300-52_firmware *
cisco sg300-52 -
cisco sf300-24_firmware *
cisco sf300-24 -
cisco sf302-08_firmware *
cisco sf302-08 -
cisco sf300-24mp_firmware *
cisco sf300-24mp -
cisco sg300-10sfp_firmware *
cisco sg300-10sfp -
cisco sg300-28mp_firmware *
cisco sg300-28mp -
cisco sg300-52p_firmware *
cisco sg300-52p -
cisco sg300-52mp_firmware *
cisco sg300-52mp -
cisco sg500-28mpp_firmware *
cisco sg500-28mpp -
cisco sg500-52mp_firmware *
cisco sg500-52mp -
cisco sg500xg-8f8t_firmware *
cisco sg500xg-8f8t -
cisco sf500-24_firmware *
cisco sf500-24 -
cisco sf500-24p_firmware *
cisco sf500-24p -
cisco sf500-48_firmware *
cisco sf500-48 -
cisco sf500-48p_firmware *
cisco sf500-48p -
cisco sg500-28_firmware *
cisco sg500-28 -
cisco sg500-28p_firmware *
cisco sg500-28p -
cisco sg500-52_firmware *
cisco sg500-52 -
cisco sg500-52p_firmware *
cisco sg500-52p -
cisco sg500x-24_firmware *
cisco sg500x-24 -
cisco sg500x-24p_firmware *
cisco sg500x-24p -
cisco sg500x-48_firmware *
cisco sg500x-48 -
cisco sg500x-48p_firmware *
cisco sg500x-48p -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "913C13B4-1DBE-4989-B0BB-DF98897FCB0C",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DBA59E-454F-4047-8229-4163548C40E9",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB09E0C-26AD-4344-B511-33166FCA2654",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4143302F-BC6A-43F5-ABF2-4C34A9926DA5",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3542CF67-9EC1-465E-A027-E528D57F3E6D",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2118EEF3-6050-428E-A683-19C3CFBB5957",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79050CF-2334-4E74-BF39-159EF2EAA2C9",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A2FFC2D-5F7D-415A-AD19-F888F411CDE9",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0C4BA6-C783-4479-83E6-E733F10B4CEC",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5253E3FB-4EDC-4566-A53A-D23243F1A618",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD2064E-67B8-41B5-9E7F-2853881D5B91",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "746232C8-1731-4383-9B7F-AE306B0D8ED2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6711BB2-0E02-4F29-B82F-31DC3C5B6472",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A92ED0C-1C29-464C-9AB9-650C27DC1D1C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-24fp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9B67FE2-45E5-41BD-9954-9EE7AC1A48C5",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-24fp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE97AF68-E2A3-43B4-A54E-B6F5C530C06E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A62D02-19EA-4AFE-949A-7B776EE8B359",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FBDDCC-42CB-4B0A-BC65-005BC1677359",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg200-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8EDB69-BBF2-48C5-9EFF-FDB9B58F9065",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg200-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA41DFC5-2407-49B5-BC90-B7A626AA4985",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "122506C3-E848-4826-B46E-05789782D28B",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9AACB-C646-4EDB-B3D3-CF96CDEE3B5D",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D955B2B5-F80D-45C3-A0F8-35D783E7BF61",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A332420-EB7F-4B20-B2B9-8147F24C1517",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15C0EB2-5C3E-4279-87BB-5CDD8B91ACA5",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F3986C-A315-40CB-85B4-248BFB0436A4",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0969FBF-7DAA-418F-98D2-31328FF90EA9",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB02739B-4E0B-4869-A83A-A6F98262450A",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D295B6B-CE09-4A82-83E2-09CD72FCA5DF",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F15B764-20D9-4FD6-9C1C-1BE5686DCE64",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FFBAD78-2EA5-4761-88CF-F4B3CE706CC5",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D75EF89-F11E-4BA9-A1EB-93C453705346",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "418669F3-11B6-413E-8EA3-1ABA483DCDDB",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "396B9D23-7000-4091-A002-4B10491EACE2",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772BF05-2A4A-4C23-A462-E65F9843380B",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B0F309-FE7E-4C94-B393-F65CC14A4F8E",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2F47A9-F003-49C1-BEAF-2FC7D2DC6444",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7076F29-3D54-4E14-A6F3-951E0ACA6626",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C501D0-81E9-467C-AC0B-7744CF633EE3",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABBADD7C-F31E-4A52-B29E-9F5E2A94997C",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA4F8E34-8689-4A8B-8D02-61553E97BF9C",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F31ED06-28DA-4F7A-BFDE-109891031718",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E98492C-F2F8-4693-8A36-8BC0F164181F",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "589B2598-467D-4150-A66D-8CF755AA733B",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EB8581-AB06-4726-833A-2B6E190AA1FF",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5198A2BD-A507-40AF-B809-A81F3C207C78",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E495F60D-807C-4E2E-8984-C66EAB0CFA35",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7344FA-BB28-4B8D-9371-6B2DEA2D11EE",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29D63B37-1DF9-4CCC-9CDE-C1060C51CEDA",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BD5D3-E576-472D-9DD5-E7DC2077A771",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16890902-4067-44F2-962D-4904DDF0A66A",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FF510FB-CE1C-48B6-AB9E-F411F294F007",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "113B94DD-9BD7-467D-8D18-18C18AD12178",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C17E695-C644-460C-BB5A-02CD88F4E23D",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC861B5-8192-48BB-9ACA-9F397A63192D",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B309A935-C909-42EF-9FE4-B797F5E03C87",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACE4061-57E2-45BD-A4B5-448EFC339EB7",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F2C46A-C53C-4A6D-A6B6-483BDF85D58D",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09201E8-6ABC-4E0D-806F-3261EC8F855A",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF580D79-4A1A-4E57-B415-A72EE993FB1B",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DAB9C2-9F4A-4755-854D-85B76844DA25",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8488796-F37B-4ACE-9F0A-90DBBD635F5A",
              "versionEndExcluding": "1.3.7.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18"
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la Interfaz de Usuario Web de Cisco Small Business Switches, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n inapropiada de las peticiones enviadas hacia la interfaz web. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n maliciosa hacia la interfaz web de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una recarga inesperada del dispositivo, resultando en una condici\u00f3n DoS. Esta vulnerabilidad afecta a las versiones de firmware anteriores a 1.3.7.18."
    }
  ],
  "id": "CVE-2020-3147",
  "lastModified": "2024-11-21T05:30:25.373",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-30T19:15:11.790",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2020-3147 (GCVE-0-2020-3147)

Vulnerability from cvelistv5 – Published: 2020-01-29 22:10 – Updated: 2024-11-15 17:43
VLAI?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Small Business 300 Series Managed Switches Affected: unspecified , < 1.3.7.18 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:24:00.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:22:31.020821Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:43:27.811Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 Series Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.3.7.18",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-01-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18"
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "[CVE-2020-3147_ex]"
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-29T22:10:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
        }
      ],
      "source": {
        "advisory": "cisco-sa-smlbus-switch-dos-R6VquS2u",
        "defect": [
          [
            "CSCvs79718",
            "CSCvs80055",
            "CSCvs80085"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Switches Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-01-29T16:00:00-0800",
          "ID": "CVE-2020-3147",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Switches Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.3.7.18"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18"
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "[CVE-2020-3147_ex]"
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.6",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-smlbus-switch-dos-R6VquS2u",
          "defect": [
            [
              "CSCvs79718",
              "CSCvs80055",
              "CSCvs80085"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3147",
    "datePublished": "2020-01-29T22:10:12.473801Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-15T17:43:27.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3147 (GCVE-0-2020-3147)

Vulnerability from nvd – Published: 2020-01-29 22:10 – Updated: 2024-11-15 17:43
VLAI?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Small Business 300 Series Managed Switches Affected: unspecified , < 1.3.7.18 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:24:00.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:22:31.020821Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:43:27.811Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 Series Managed Switches",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "1.3.7.18",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2020-01-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18"
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "[CVE-2020-3147_ex]"
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-29T22:10:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
        }
      ],
      "source": {
        "advisory": "cisco-sa-smlbus-switch-dos-R6VquS2u",
        "defect": [
          [
            "CSCvs79718",
            "CSCvs80055",
            "CSCvs80085"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Small Business Switches Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-01-29T16:00:00-0800",
          "ID": "CVE-2020-3147",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Small Business Switches Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "1.3.7.18"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than 1.3.7.18"
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "[CVE-2020-3147_ex]"
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.6",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200129 Cisco Small Business Switches Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smlbus-switch-dos-R6VquS2u"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-smlbus-switch-dos-R6VquS2u",
          "defect": [
            [
              "CSCvs79718",
              "CSCvs80055",
              "CSCvs80085"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3147",
    "datePublished": "2020-01-29T22:10:12.473801Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-15T17:43:27.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}