All the vulnerabilites related to cisco - skinny_client_control_protocol_software
cve-2011-1603
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:28
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
References
http://www.securitytracker.com/id?1025588vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/44814/third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/48079vdb-entry, x_refsource_BID
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtmlvendor-advisory, x_refsource_CISCO
http://osvdb.org/72718vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025588",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025588"
          },
          {
            "name": "44814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44814/"
          },
          {
            "name": "48079",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48079"
          },
          {
            "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
          },
          {
            "name": "72718",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/72718"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-07T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025588",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025588"
        },
        {
          "name": "44814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44814/"
        },
        {
          "name": "48079",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48079"
        },
        {
          "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
        },
        {
          "name": "72718",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/72718"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-1603",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025588",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025588"
            },
            {
              "name": "44814",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44814/"
            },
            {
              "name": "48079",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48079"
            },
            {
              "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
            },
            {
              "name": "72718",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/72718"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-1603",
    "datePublished": "2011-06-02T20:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.829Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0881
Vulnerability from cvelistv5
Published
2002-08-31 04:00
Modified
2024-08-08 03:03
Severity ?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:49.268Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/273673"
          },
          {
            "name": "cisco-ipphone-configuration-access(9144)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9144.php"
          },
          {
            "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
          },
          {
            "name": "4799",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4799"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-05-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-09-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/273673"
        },
        {
          "name": "cisco-ipphone-configuration-access(9144)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9144.php"
        },
        {
          "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
        },
        {
          "name": "4799",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4799"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/273673"
            },
            {
              "name": "cisco-ipphone-configuration-access(9144)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9144.php"
            },
            {
              "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
            },
            {
              "name": "4799",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4799"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0881",
    "datePublished": "2002-08-31T04:00:00",
    "dateReserved": "2002-08-16T00:00:00",
    "dateUpdated": "2024-08-08T03:03:49.268Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-15434
Vulnerability from cvelistv5
Published
2018-10-05 14:00
Modified
2024-11-26 14:26
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T09:54:03.598Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
          },
          {
            "name": "1041791",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1041791"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-15434",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-25T18:47:43.085252Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T14:26:44.161Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified IP Phone 7900 Series",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-10-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-07T09:57:02",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
        },
        {
          "name": "1041791",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1041791"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20181003-uipp-7900-xss",
        "defect": [
          [
            "CSCvj73657"
          ]
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2018-10-03T16:00:00-0500",
          "ID": "CVE-2018-15434",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified IP Phone 7900 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": "6.1",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
            },
            {
              "name": "1041791",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1041791"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20181003-uipp-7900-xss",
          "defect": [
            [
              "CSCvj73657"
            ]
          ],
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2018-15434",
    "datePublished": "2018-10-05T14:00:00Z",
    "dateReserved": "2018-08-17T00:00:00",
    "dateUpdated": "2024-11-26T14:26:44.161Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1602
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:28
Severity ?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
References
http://www.securitytracker.com/id?1025588vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/48074vdb-entry, x_refsource_BID
http://secunia.com/advisories/44814/third-party-advisory, x_refsource_SECUNIA
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtmlvendor-advisory, x_refsource_CISCO
http://osvdb.org/72717vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:42.032Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025588",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025588"
          },
          {
            "name": "48074",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48074"
          },
          {
            "name": "44814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44814/"
          },
          {
            "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
          },
          {
            "name": "72717",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/72717"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-07T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025588",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025588"
        },
        {
          "name": "48074",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48074"
        },
        {
          "name": "44814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44814/"
        },
        {
          "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
        },
        {
          "name": "72717",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/72717"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-1602",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025588",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025588"
            },
            {
              "name": "48074",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48074"
            },
            {
              "name": "44814",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44814/"
            },
            {
              "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
            },
            {
              "name": "72717",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/72717"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-1602",
    "datePublished": "2011-06-02T20:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:42.032Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1637
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:37
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
References
http://www.securitytracker.com/id?1025588vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/44814/third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/48075vdb-entry, x_refsource_BID
http://osvdb.org/72719vdb-entry, x_refsource_OSVDB
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtmlvendor-advisory, x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/67743vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:24.683Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025588",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025588"
          },
          {
            "name": "44814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44814/"
          },
          {
            "name": "48075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48075"
          },
          {
            "name": "72719",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/72719"
          },
          {
            "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
          },
          {
            "name": "cisco-uipp-sign-security-bypass(67743)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025588",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025588"
        },
        {
          "name": "44814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44814/"
        },
        {
          "name": "48075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48075"
        },
        {
          "name": "72719",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/72719"
        },
        {
          "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
        },
        {
          "name": "cisco-uipp-sign-security-bypass(67743)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-1637",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025588",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025588"
            },
            {
              "name": "44814",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44814/"
            },
            {
              "name": "48075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48075"
            },
            {
              "name": "72719",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/72719"
            },
            {
              "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
            },
            {
              "name": "cisco-uipp-sign-security-bypass(67743)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-1637",
    "datePublished": "2011-06-02T20:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:37:24.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0880
Vulnerability from cvelistv5
Published
2002-08-31 04:00
Modified
2024-08-08 03:03
Severity ?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2."
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:48.915Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-05-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-09-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0880",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0880",
    "datePublished": "2002-08-31T04:00:00",
    "dateReserved": "2002-08-16T00:00:00",
    "dateUpdated": "2024-08-08T03:03:48.915Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0882
Vulnerability from cvelistv5
Published
2002-08-31 04:00
Modified
2024-08-08 03:03
Severity ?
Summary
The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:49.262Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/273673"
          },
          {
            "name": "4794",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4794"
          },
          {
            "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
          },
          {
            "name": "4798",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4798"
          },
          {
            "name": "cisco-ipphone-streamingstatistics-dos(9142)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9142.php"
          },
          {
            "name": "cisco-ipphone-portinformation(9143)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9143.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-05-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-09-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/273673"
        },
        {
          "name": "4794",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4794"
        },
        {
          "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
        },
        {
          "name": "4798",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4798"
        },
        {
          "name": "cisco-ipphone-streamingstatistics-dos(9142)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9142.php"
        },
        {
          "name": "cisco-ipphone-portinformation(9143)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9143.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0882",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/273673"
            },
            {
              "name": "4794",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4794"
            },
            {
              "name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
            },
            {
              "name": "4798",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4798"
            },
            {
              "name": "cisco-ipphone-streamingstatistics-dos(9142)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9142.php"
            },
            {
              "name": "cisco-ipphone-portinformation(9143)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9143.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0882",
    "datePublished": "2002-08-31T04:00:00",
    "dateReserved": "2002-08-16T00:00:00",
    "dateUpdated": "2024-08-08T03:03:49.262Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-5445
Vulnerability from cvelistv5
Published
2012-12-28 11:00
Modified
2024-08-06 21:05
Severity ?
Summary
The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:05:47.223Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-5445",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
            },
            {
              "name": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html",
              "refsource": "MISC",
              "url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-5445",
    "datePublished": "2012-12-28T11:00:00",
    "dateReserved": "2012-10-17T00:00:00",
    "dateUpdated": "2024-08-06T21:05:47.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2."



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C349C1AC-7186-404B-85DA-9B743F7550F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FC552E-B05B-4DD0-9125-3FC9F348745D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A58EFB-252D-46C6-80AD-0E40E0235858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
    }
  ],
  "id": "CVE-2002-0880",
  "lastModified": "2024-11-20T23:40:05.823",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:26
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
Impacted products
Vendor Product Version
cisco unified_ip_phone_7906 *
cisco unified_ip_phone_7911g *
cisco unified_ip_phone_7931g *
cisco unified_ip_phone_7941g *
cisco unified_ip_phone_7941g-ge *
cisco unified_ip_phone_7942g *
cisco unified_ip_phone_7945g *
cisco unified_ip_phone_7961g *
cisco unified_ip_phone_7961g-ge *
cisco unified_ip_phone_7962g *
cisco unified_ip_phone_7965g *
cisco unified_ip_phone_7970g *
cisco unified_ip_phone_7971g-ge *
cisco unified_ip_phone_7975g *
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(3\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
              "matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
              "versionEndIncluding": "9.1\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 permiten a usuarios locales conseguir privilegios a trav\u00e9s de vectores no especificados. Error tambi\u00e9n conocido Bug ID CSCtn65815."
    }
  ],
  "id": "CVE-2011-1603",
  "lastModified": "2024-11-21T01:26:41.277",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-02T20:55:03.403",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/72718"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/48079"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/72718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025588"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:26
Severity ?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
Impacted products
Vendor Product Version
cisco unified_ip_phone_7906 *
cisco unified_ip_phone_7911g *
cisco unified_ip_phone_7931g *
cisco unified_ip_phone_7941g *
cisco unified_ip_phone_7941g-ge *
cisco unified_ip_phone_7942g *
cisco unified_ip_phone_7945g *
cisco unified_ip_phone_7961g *
cisco unified_ip_phone_7961g-ge *
cisco unified_ip_phone_7962g *
cisco unified_ip_phone_7965g *
cisco unified_ip_phone_7970g *
cisco unified_ip_phone_7971g-ge *
cisco unified_ip_phone_7975g *
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr2:*:*:*:*:*:*",
              "matchCriteriaId": "A9856E40-A873-4012-841C-F2D568FF93A0",
              "versionEndIncluding": "9.0\\(2\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
    },
    {
      "lang": "es",
      "value": "La utilidad \u0027su\u0027 en los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con el software anterior a la v9.0.3 permite a usuarios locales conseguir privilegios a trav\u00e9s de vectores no especificados. Error tambi\u00e9n conocido Bug ID CSCtf07426."
    }
  ],
  "id": "CVE-2011-1602",
  "lastModified": "2024-11-21T01:26:41.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-02T20:55:03.373",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/72717"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/48074"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/72717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025588"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:26
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
Impacted products
Vendor Product Version
cisco unified_ip_phone_7906 *
cisco unified_ip_phone_7911g *
cisco unified_ip_phone_7931g *
cisco unified_ip_phone_7941g *
cisco unified_ip_phone_7941g-ge *
cisco unified_ip_phone_7942g *
cisco unified_ip_phone_7945g *
cisco unified_ip_phone_7961g *
cisco unified_ip_phone_7961g-ge *
cisco unified_ip_phone_7962g *
cisco unified_ip_phone_7965g *
cisco unified_ip_phone_7970g *
cisco unified_ip_phone_7971g-ge *
cisco unified_ip_phone_7975g *
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(3\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
              "matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
              "versionEndIncluding": "9.1\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocido como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 no verifican adecuadamente las firmas de im\u00e1genes de software, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de una imagen hecha a mano. Error tambi\u00e9n conocido como Bug ID CSCtn65962."
    }
  ],
  "id": "CVE-2011-1637",
  "lastModified": "2024-11-21T01:26:42.487",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 1.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-02T20:55:03.480",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/72719"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/48075"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/72719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C349C1AC-7186-404B-85DA-9B743F7550F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FC552E-B05B-4DD0-9125-3FC9F348745D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A58EFB-252D-46C6-80AD-0E40E0235858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
    }
  ],
  "id": "CVE-2002-0881",
  "lastModified": "2024-11-20T23:40:05.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/archive/1/273673"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9144.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4799"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/archive/1/273673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9144.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4799"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C349C1AC-7186-404B-85DA-9B743F7550F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FC552E-B05B-4DD0-9125-3FC9F348745D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A58EFB-252D-46C6-80AD-0E40E0235858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
    }
  ],
  "id": "CVE-2002-0882",
  "lastModified": "2024-11-20T23:40:06.100",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/archive/1/273673"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/9142.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/9143.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4794"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/4798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/archive/1/273673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/9142.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/9143.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/4798"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-12-28 11:48
Modified
2024-11-21 01:44
Severity ?
Summary
The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary.
Impacted products
Vendor Product Version
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(3\)
cisco skinny_client_control_protocol_software 9.0\(3b\)
cisco skinny_client_control_protocol_software 9.1\(1\)
cisco skinny_client_control_protocol_software 9.1\(1\)
cisco skinny_client_control_protocol_software 9.1\(1\)
cisco skinny_client_control_protocol_software 9.2\(1\)
cisco skinny_client_control_protocol_software 9.2\(2\)
cisco unified_ip_phone 7906g
cisco unified_ip_phone 7911g
cisco unified_ip_phone 7935
cisco unified_ip_phone 7936
cisco unified_ip_phone 7940
cisco unified_ip_phone 7940g
cisco unified_ip_phone 7941g
cisco unified_ip_phone 7960
cisco unified_ip_phone 7960g
cisco unified_ip_phone 7961g
cisco unified_ip_phone 7970g
cisco unified_ip_phone 7971g
cisco unified_ip_phone_7906g 7911g
cisco unified_ip_phone_7906g 7941g
cisco unified_ip_phone_7906g 7961g
cisco unified_ip_phone_7906g 7970g
cisco unified_ip_phone_7906g 7971g



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF064230-C02E-4F62-97BE-CD9882DBD479",
              "versionEndIncluding": "9.2\\(4\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "039B99A7-FB9E-4967-AC20-0F1A1E518F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4AB40D-589E-42F6-B296-81D7B565A8DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.1\\(1\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "F5D7BB9A-58EB-4B11-ACF2-08AF8EE62CA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.1\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "E83556CA-1759-4343-853D-3AFE997D1066",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA376752-8664-404F-84F6-3423EDCAADDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A0848A60-767A-4F35-BED3-6A3F3580C994",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A9A468-CAC3-4DC6-B839-557DBE8246D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*",
              "matchCriteriaId": "26830222-1503-4748-A104-334265D8F06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*",
              "matchCriteriaId": "19712324-A41D-49F1-AA74-3B30A731FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F9E1FE-4BD5-40B9-B239-B2185821A551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*",
              "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*",
              "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE61DF2-3D61-400F-BA70-B506412C9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*",
              "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B76F56-31D4-4576-AC95-00AED498F25A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*",
              "matchCriteriaId": "2747DB12-83B9-40E4-9671-382E241C98EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7911g:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6424DE-B6C1-4270-B564-E189A0C88A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7941g:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A26A7F1-BB88-4B98-9A4A-DE6EC15F9602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7961g:*:*:*:*:*:*:*",
              "matchCriteriaId": "7809EBA7-36DC-45B6-9CAD-15C24753F6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7970g:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3873130-9724-4799-8EF1-F963FEB725FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7971g:*:*:*:*:*:*:*",
              "matchCriteriaId": "7047951B-CA4D-4F2E-98C5-4CE5E7BD4FF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
    },
    {
      "lang": "es",
      "value": "El kernel en Cisco Native Unix (CNU) en los dispositivos Cisco Unified IP Phone 7900 series (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con software antes de v9.3.1-ES10 no valida correctamente algunas llamadas no especificados sistema, lo que permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (sobrescritura de memoria) a trav\u00e9s de un binario dise\u00f1ado para tal fin.\r\n"
    }
  ],
  "id": "CVE-2012-5445",
  "lastModified": "2024-11-21T01:44:41.100",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-12-28T11:48:44.673",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-05 14:29
Modified
2024-11-21 03:50
Summary
A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "289198C0-853A-46A4-B753-CB3944511364",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7906g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7961B727-26C5-417D-AF65-2A4344277FEA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "772EB250-0863-4857-A387-7F7BE7D40656",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7912g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "099A36DF-5E83-431A-AF6C-53F03A14B358",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7920_multi-charger:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "550A069C-AA6F-4D85-BDAE-120E5DA6FC7F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7921g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E204F37-D7CF-4138-86F4-63569C1E4012",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7925g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B26761-635E-46A4-8807-4EC956B9F295",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7925g-ex:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7582269D-6927-422D-89D2-BF7574201FA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7926g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4A1750-1760-4EFA-80D3-47EC39AFE3BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E6E8D9-7D63-4656-BF5D-FFC81B291B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7940g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5BDE33-C449-4880-9E28-304E1BC0A6A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D445B497-7B54-417A-B971-05BB4CCF765F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4174556C-D859-422C-A1F3-C371D129BCB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C670F730-4430-4831-953E-04CA7B1BE30E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7960g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B997BF-50AE-4905-82ED-8DDAE3E6F824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B388C5-2A4E-474D-8549-B5BEEA15E5BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CCC080-4BF0-4838-9FC9-41C6C32F0686",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C58ED58-F044-4A9D-BBD6-BFA57473F3C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77BB66F1-CAE4-4098-B486-79D9423E4FF2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_conference_station_7936:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AA88C7-F162-4686-80A9-B954996B15FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_conference_station_7937g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC0AAD19-9F30-4970-9933-843A15F2246E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_expansion_module_7915:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EA852D-4582-4A7D-ACE2-4E5210F2DDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phones_expansion_module_7916:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8CA87F0-183A-4B19-A83C-E9B4278DF22B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de gesti\u00f3n web de Cisco Unified IP Phone 7900 Series podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque Cross-Site Scripting (XSS) contra un usuario de dicha interfaz en un dispositivo afectado. La vulnerabilidad se debe a la validaci\u00f3n insuficiente de entradas de parte del usuario en la interfaz de gesti\u00f3n web. Un atacante podr\u00eda explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace malicioso. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz afectada o que pueda acceder a informaci\u00f3n sensible del navegador."
    }
  ],
  "id": "CVE-2018-15434",
  "lastModified": "2024-11-21T03:50:47.400",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-05T14:29:12.233",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1041791"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1041791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "ykramarz@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}