Search criteria
39 vulnerabilities found for sx550x-12f_firmware by cisco
FKIE_CVE-2021-34739
Vulnerability from fkie_nvd - Published: 2021-11-04 16:15 - Updated: 2024-11-21 06:11
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "596286D0-AFBA-4F1E-83D8-17B588BB2811",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7567AB0-4FE4-402F-8C8C-70D032FE6860",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2447F0-9CE0-40A9-AF44-46D7C9BA8D7E",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F81EEF7-B9CD-41F9-BC56-BF70EB7367F5",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "851EFBA8-3D46-4F9C-9F1F-8F56897CF7AD",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3208F54F-21C5-49EC-8FBF-03BAD10742EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC48CD0-89B4-4D5B-A8F4-F70EB72844E3",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "864E9DE0-4825-41DB-9C3E-63A5C54FBD17",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60EF4E-A3A3-4E33-9561-BC8259062C2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1627EB2D-1C3D-493C-9888-84D2915E4131",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98523586-0F3A-4B62-A972-8E9BA4F0DC4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF628BD-B574-471C-8F84-E1361F513731",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CD3BA54-85D9-4688-8B90-612F96D452A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45674B9A-59EC-49FC-A6F8-662A41FEE1F3",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4D538A-2E11-49A3-9591-1826D496123E",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B23C961-4B85-4DCC-A144-654B9B51ADBA",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFAE9706-8B37-4231-B4D4-CA6F527446E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B25B48B3-2840-49FC-941C-2DABE5A05D13",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFEB361-1986-4522-BC23-06140F8D2625",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A7D0F8-6A59-48AB-843E-90B470DCF208",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BDC341E-FA7D-4B90-A5AB-E41822E16385",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41801033-2A75-4B63-8F72-3F328AEB78E8",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C835D1DE-A639-4CB0-947B-988C89ABED5D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE521320-04D4-4246-B183-F09E34A39812",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5D8296-7B6E-4880-8C5F-D7293118CE5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C554DFB-9DE2-4DE1-B27E-87BDA9F16F83",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F6551D-9188-44C6-8101-306D8077C0BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A13F25D-2A7B-4057-866F-2C24164F589B",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27D4259-24AA-4F4F-AC82-53D8BFAA303A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D294C12-5D11-457F-9927-712F6FBB0A0F",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AFF713-460E-4473-B3AD-7E60810170B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55998FC0-29BF-47A3-8E15-76D7352089B6",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8D38AC3-6868-45F0-BCEB-ED27496B57B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D61CB3A5-E5F7-492C-86C2-2EE02BE7CC74",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27E11EB8-0F0B-4F13-82FF-5CC0687DAB93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "479CB74C-9849-4C18-9F29-A2CCEC13F76E",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AC43002-020B-4B56-AD72-E5244DC617DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1390A51-B6D6-4C82-A3AF-6ACC5D227AE7",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-8mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2269BC4-848A-4919-AC8E-4598FF56FCE2",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-8mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED48771-0D53-45B0-BBC2-53CCD36799FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96D830E6-9393-4470-89E7-8FF9A309B306",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf352-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6657640-B1C5-4269-931F-10BBD3828237",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf352-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F35180C-09F4-4819-B86B-F0D47BF19C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf352-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54E36B87-80D8-4605-B44C-865F6C8C2CFA",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf352-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0609DA-22DD-4427-8CFD-B6B92194F948",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf352-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C34FCD5B-186F-41C8-9526-891654E09AE7",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf352-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "454941C5-6D05-4A8E-8FA3-5677382A5A4A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-8pd_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F184214-69DB-4A12-8B8C-E952F9D36100",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-8pd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65DB4BB4-FC16-4624-BE24-C8044FD109E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36D4D29-74AA-464A-B356-D000269A8299",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9713CB27-EC12-4AF4-88C5-5859EA1A82FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA2DC60-7D54-4741-BA0B-765EEC302C6A",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE1BFE0-6B3C-4F57-85A4-86E58F2EBBA8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61B94B82-3864-4D9E-9FCB-B55CB0F51952",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF440F87-57D0-43F1-B5C0-7D944B5093D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "909B2F3E-C476-4E0F-8386-7AE3AD0451F1",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE95C121-A77E-4440-9051-C178927EC671",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B58C94-2D1C-4C25-9B94-50FF7633D976",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80D91695-7548-4498-8100-B7793CD8DB25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "001982FC-9BB5-42F7-BA7F-23D23BF88C0F",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4853BDD7-CBC7-48CB-9AAA-63323832B715",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC8D42E-7971-4DE2-87C1-4C6A1EF20DCD",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88804D67-943D-4563-9225-F45092053DEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "654EDBEB-904D-4C44-87B5-46D06DFFB167",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "367BBC95-D9F9-4E12-8F73-83019FD728E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-28sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "557FED4C-060F-45A5-83BF-DB627E685822",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-28sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9369467-F70F-41DE-B231-5B0CECD44E9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB81269-094B-4350-A5ED-816A2EB9B9D0",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F021AC-9B57-48CE-AC46-6B542FAC0A9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACEB47C-EB6D-4698-8BE1-A22E7F2504EF",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACEFF0F7-E3FE-4752-B936-BC353CB3EA23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D45340-A737-46B1-9FF0-9BE1E586BB7F",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F321BAE0-1207-4D7D-9F14-5DBFCE0EEA44",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38F133EA-2150-44FC-A827-589FDF5A920D",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E131125-0F14-49D4-ACF3-D6E33E969422",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-8pmd_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A78A6530-BDDB-4C13-8C23-1630A5A16B1F",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-8pmd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF7C1FF-A6DA-489B-8C34-13EE28D154AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-12pmv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DFBA8CB-7380-4ED3-806C-9DEAFC673B1E",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-12pmv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA28B28-325F-42C9-AD1F-D6D8606DBA76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB3F95E-36D4-4E8B-A08A-79A6A81335EC",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E8C2F1-6075-482D-915E-E39156585638",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "546D6ABD-7344-425E-8271-F09288F7EBFD",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24pd_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84A5151F-2E08-4BD7-A52F-3E557BD71722",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24pd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2C7F9A-72C9-4B3B-A6DB-712D8D9A52AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24pv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91E66A1C-0AE7-459D-ADDE-749C63B652F5",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24pv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAF0D4F-5E2C-44FA-A01C-C1E79836D315",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F07E3B6B-AFD6-4AA3-97CA-032093E62A48",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB99488-B94D-47EC-B4B5-AAC1EAAC8E68",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB88198A-E2F7-4153-8F08-728446B3624D",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48pv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3FF7C0-44EC-4A66-A64D-4D39F79121E0",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48pv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C7B87F-644A-4C3C-9310-9E23F9DC0C16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC27DCE-0F09-4669-972F-595519F9C2CB",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9167C4D-B1DF-48EB-8241-1F0470E1E789",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79624863-203C-4B56-A2EF-8C008C6527CB",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D8243D-E465-4ADF-BC06-E1FC12E24533",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx350x-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "686A33D3-C9E1-446E-9D23-CFDDA1710466",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx350x-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05A43F14-4D2D-4332-BFA3-E9CB9805415C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx350x-12_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F64FF9DA-0B91-427A-A2DA-33E7BDE90D6B",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx350x-12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "283995C0-94E0-41D9-8E0D-BCE3B619EB55",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx350x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "288DE710-8B6E-49F5-BEDE-E8B5A0DFE6B0",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx350x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12971B4-B9EF-42C0-A111-D782677186EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx350x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8867BFE6-11FD-468F-A9C9-3FA07DAA7EDB",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D73924-5725-490D-8A50-027CD78A375C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx350x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "377A866F-5DDE-440A-8EB2-ADE214D08AC0",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx350x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D1B908-932E-4CEA-A4D4-E4B06D2B5462",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84BFFEA3-8F68-40B4-95FF-1C32D0AAF4CF",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E5B6BF7-650E-4446-BFFB-F3C1E7A0A9C9",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B470FB-5E0C-47B4-AE32-38C36AFB720F",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB23AA2-AFB7-41BE-85C4-3888FE89AC40",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B0E5C6F-2479-4BFA-B174-57FA2BEDAA1E",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86576E5-F836-4B0F-897D-A6A1278ADF9C",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63E3B0E1-417B-4C8A-8CFE-E837EB952101",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2749EAF-5C2C-4BD2-B8D4-EBA35A1C3055",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CDA8C4-2050-432D-87FD-72B3E2DE71E5",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA40D117-8C33-489F-B0E5-68B59255A1D4",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E976BBA-EF7D-4A43-A2A6-11E84B73B658",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBA0A65-828A-4848-8D47-8299F0DD1BE5",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF1C442-4C97-41D7-B5A2-95261B64DDBA",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE20DD2-E0DC-4C43-9908-5100A3011D65",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "768205F9-D999-4A61-BF35-C1018B9F4148",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550xg-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE43A56-F660-4242-971F-643D999E9D1D",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5282B1-BC6C-4816-98EA-D8C6A1F1028D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550xg-24t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1263576B-CE8D-4363-85DC-C79147F0BB3B",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D45D462A-CD9B-4AF6-8B5F-95A7629B7A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550xg-48t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DE39EF9-46B6-4B45-829A-D69F9D8AFD0F",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE7ABB5-A65A-401B-AD83-16B351CB2637",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12B62A88-5824-4F1C-94DD-46609A2358B6",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C617D36E-A974-471F-A80E-705417D46AAD",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB98D51C-2B16-40D4-B6E3-8A2323A9CF36",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F62EFA9-C281-44D7-8F4D-846F1F3923BE",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C92FD284-3709-44E1-85B4-66225DD5AABE",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7A708B-23CA-4C5F-BEF5-5E8B5814AA65",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-8t-d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C638775-0000-4548-9C21-C9879BF3B645",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-8t-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "787FE6D6-FB71-4EE7-BAA3-B257E0EB0607",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-8pp-d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03647232-5BEA-43FF-9056-DC0A262C4177",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-8pp-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "467DA378-DC53-41A3-82E3-5F523288E975",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-8t-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F641CB3-7A52-4D71-B5E3-E087B5464D45",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-8t-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "078F6384-2A21-478E-B76C-D9AE2D4C06A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-8pp-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D5DFB-A96F-419C-AB64-A5DF5C7F025A",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-8pp-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29E83FE7-D299-4F10-9E33-4EB4B0567E86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-8p-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "818F8B3D-AEEC-4E00-8742-4FE69135EB27",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-8p-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5CAD52-9DDF-4E74-9C74-24DD02BB62E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-8fp-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29B24061-EA8E-49FF-BBBA-A8F5A62DA78D",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-8fp-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCF2792C-01F4-46E4-9A5E-2A04E591B43C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-16t-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B142F388-4C17-4BCD-9C97-E62F0AA5C586",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-16t-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62FB071D-C328-42D0-8E35-E8DA3069752B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-16p-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98D1A3A8-91B8-4B27-A347-3AFD94CCB874",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-16p-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD72FB3C-0811-4430-B41A-6BBBA7B4CCA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24t-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B7E283-7659-4A53-975E-ECF2FFB2BA9A",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24t-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9238C5D0-3669-43B2-B607-438DF91D59AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24pp-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE7DB7A-42C6-4650-9CB7-86E65BA83451",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24pp-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10104319-849F-4222-89B0-EB156501BD78",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24p-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A255A07D-1591-4BDF-A66A-19542C8E6D59",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24p-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F23B36-32EA-4098-900F-2D301E74B347",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24fp-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED4F19C-A383-4E43-87B4-9EFBEB4CE480",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24fp-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFDD736-5FD6-4F3D-863F-65E702341047",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-48t-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96568DB3-CA75-490D-9813-78DE3A5FF633",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-48t-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1AF4C4-8D03-49B6-96D3-18B00BD7ED8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-48pp-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "675F72D1-B6C2-46A7-B49D-2EF603027A0E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-48pp-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCC8EEA-5EC5-4681-9204-89E5EDA8EA40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-48p-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61F1C7DB-F87A-4482-B993-5BDF9AB13D0E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-48p-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "928CD92D-90D3-4829-BB6D-DF303ABE1DAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24t-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0885DA-4757-4F28-B644-CB385C131CC8",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24t-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "773700CE-6952-437E-AA77-AA0E32EB1F62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24p-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9EDF24-2DD1-4F70-9BC9-90654ADBFA82",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24p-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AEF792-BC15-4799-8496-0FE9220A25A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-24fp-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76977BFC-8C2F-4C36-800D-58038F63683B",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-24fp-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E20CD1AA-E7EF-403A-AC6E-C5B750019D5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-48t-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02ADBB3A-D02E-4B20-B4BB-7E3A3719B230",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-48t-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8077ED8C-BD4B-468F-A3C6-BC300E1C9646",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs250-48p-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "294B0CA0-57F0-4365-A663-8E59C8C89785",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs250-48p-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABC4E71-4943-4B6F-BAC6-603F91E41674",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8t-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "766AD2AA-4421-4FFE-BC0E-C813F061186E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8t-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42D91C60-E72B-4C86-A19E-443184EDBE8E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8p-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A396D47C-99B2-4869-BEB0-B44F0DBB3250",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8p-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A429AEC-5692-428D-8DC7-47EC9081825C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8p-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67FB6217-2366-48D3-A153-C76B9B261D48",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8p-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7ACDE44-E156-4B20-82C0-8AA86EAF9947",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8fp-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89FC3769-C3DD-4E77-A990-EE755F0D2F53",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8fp-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E473B29F-001A-4697-B22C-16B1C519B117",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8fp-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C34E7DE7-257A-4929-AE1D-06BD809D2F3C",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8fp-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "061925BB-B740-4CDD-97D9-52A24B5E7F77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8s-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3568C754-F1AE-49AC-99FC-A6DD32F4D6ED",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8s-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAF2A0B8-CF29-4033-B365-DC3802630A0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-16t-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C89CF7ED-840A-4275-8709-02FAE7407920",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-16t-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD62CB7E-A9D1-435C-AC1F-5878346A2474",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-16t-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F5F0186-1E43-4A46-AEBB-556BCEA654FE",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-16t-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27C4F998-F84A-43AC-BD8A-E9370DA959B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-16p-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5757173C-DF26-454A-85B7-7602E58A17AC",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-16p-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F796947E-079C-4CA9-821A-D8E3139CF064",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-16p-e-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F756E81F-3456-41E1-86AE-BA850CE2F90A",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-16p-e-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D517CD55-7100-4BBC-A361-61C7118D2F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-16fp-2g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65CD2451-3C7A-4E5D-9C12-11B163A858D7",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-16fp-2g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "570B5694-B948-4689-BB37-E4428F396E2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24t-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E39628-7228-4379-8B11-48387D0F8FB6",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24t-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D3F59C-1F94-466C-A901-E4EF3E1D51BB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24p-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56EC212E-6AFA-4B05-ACFD-FB3A127FF2C3",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24p-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB9E0B8-BD07-499C-8E39-1E21666CAE4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24fp-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABC239C-757D-47D7-9CDA-5D4B603CB7F6",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24fp-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1A0BBD-D02D-49BA-99CA-BE2F92C6BBA8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24s-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91687565-3F63-4552-9FFD-1C4929442E9E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24s-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7EDFA3F-5AE1-4602-AC1C-26AB78256A9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48t-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B782C781-7ACF-4148-887F-46EA9186DFCE",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48t-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE5689D5-2EE2-41A6-97C2-D1D684C19DCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48p-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1612BCC-4409-4C09-A36E-8C27BFCCA16C",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48p-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A248F084-EF8E-4703-914C-D62CECF64C83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48fp-4g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FB426A-23A0-462F-88BF-94E224D9F41E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48fp-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9780CC5B-8357-4983-BA77-6DA3A10BE17E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24t-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C9D2D8E-F1FB-45E9-84DD-B9C901E628D1",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24t-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92907A6F-6ECF-427F-A1C5-F8FD161E4925",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24p-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5512091D-61F7-401E-AC94-AD6308AFCB66",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24p-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B5771C-ED94-40DD-BEDF-EC64782644D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24fp-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13FCA8DB-AF6D-4E6E-AC56-9DACFF48A06E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24fp-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32F6219A-7241-47A5-8933-FA9E57EEA3DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48t-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "159E609E-79DC-4910-A887-DFF5AFCEB542",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48t-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E69FF5C-991F-4EBD-B291-3E9A8D00B290",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48p-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB77FEB8-F821-43E7-B456-E8727554F350",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48p-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AA9C3F-EC1B-476D-9342-E71E6F893D0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48fp-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E70C5EF0-A10D-4517-872A-201D44DB0A7E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48fp-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E252BF3-445A-4BCD-A48E-C7196C401074",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8mgp-2x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9799B4-26D2-4CD5-A013-661EAA543D12",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8mgp-2x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "432D6474-3F30-4DD1-8762-8B9968105BBD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8mp-2x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13096AD6-F713-4165-9046-0AE42356EBB8",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8mp-2x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50C1887E-EA16-4FC0-A8F7-602DCA8E4928",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24mgp-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "233A1E16-712B-4CEB-BA4A-A1690234E2C6",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24mgp-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A32C9F0-4138-4C28-B817-5F7507ED0811",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-12np-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9461EC19-0178-44DB-8B03-D4D8D6357740",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-12np-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8233545-9562-4ABC-BBE3-01B48DCBAC6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24ngp-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "909CFF5F-4A79-4A7F-8F49-FEFF579E94DB",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24ngp-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C99BEA9-45C9-4E69-A3E4-24E0D9109C1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48ngp-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "694A0D3B-60DE-4B69-9FEA-46F39405CF05",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48ngp-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C08767A1-BE20-4522-9290-427C0E132013",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-8xt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7BB12CF-538B-454E-8EAA-19CD2984DFA7",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-8xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D8689B-2E1B-4AF4-8540-60615D28F846",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-12xs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4569CA0-2C1D-4A25-86B6-741E94716837",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-12xs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AAFA53-D006-4F3F-A8EB-7EF371851666",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-12xt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "715D43B5-512B-429F-8507-F6E5B1A0765E",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-12xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6100B6A-C4A3-4AC2-B256-650A8A68FEAF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-16xts_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5934B537-6445-4899-B9CD-1D5F4066B942",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-16xts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C6E96F5-6E46-4CDC-8AC6-2293054ECA52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24xs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43D7B1B3-0432-4187-8259-2617CB9DC347",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24xs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7C7939-E2DB-4213-8805-0DC32B3A414D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24xt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96D8895D-77C0-4E56-8BDC-B493FC1322A3",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12A0F6E-506C-4DA8-8036-F3E0807D70E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-24xts_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3311A6DF-C3B5-4472-81AD-30ADF3DD5C96",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-24xts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E94BC84-0054-4E8D-BC36-0567F29A8FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:cbs350-48xt-4x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E357D88-8CD5-41CF-83C1-C23A9A528A64",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbs350-48xt-4x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2EF516-F859-4B9F-8CC7-4FE6CBB4906F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5ADD809-78C3-4EB8-ACCA-A0F8322C1B78",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6812853E-C083-4841-A467-91130ED194BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E25E4182-11C0-4491-9970-80058F7C019E",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26A7AB18-C75F-4C63-9132-140EFC46E3C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF09DB6B-53AB-4DED-84FA-D1C2696342FD",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9B70093-E9FE-410A-973E-CE847F08F43A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75B9DE31-19FA-40CD-B4CD-14DEB25CD2E8",
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3503F68-CF84-468E-9A40-9F98875DD1C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B324D-F948-4373-A9FB-F07F56473774",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB83A46-C1E5-4CF9-9615-41F3C315FC02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "AD5D6C94-CF45-4252-9F26-C41E5030F001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "5C95827B-4219-4EB8-B54C-21C9E852F234",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "735E92BB-E4D9-46B5-B9A3-A685934F456F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "17426691-ADB9-429C-8B37-A479C630B95A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "EC313EB0-C812-4B77-B6EB-6E5D106CA1DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "EB1E7DA8-4181-47C8-B86E-72DEA912DD15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E942E2D0-C4AF-47C4-A9E6-3F26D66F9D1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "61C7AA57-56B9-4C39-98FC-A9C72F9B2C60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E9F50236-E49B-4BE1-BC96-E3EB3997541B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DEC94589-59F0-451D-AE0B-1A2610EC9F8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "A6451DB3-575F-4E48-9839-083F00C35B61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "531206F5-A601-4A31-A3F3-0CBF4AF3B329",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1CFE7D-4EA1-4673-95A2-B5F98E375508",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D34720E3-5EE5-4C3F-98C1-B288CAF4C114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "11F581CD-52CF-495B-A1B9-346D47C7F7D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "58F68741-2F9B-4438-8B6E-2E76E42032F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "11835FD0-2107-4FBE-8027-FBA60817E624",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "AF68BBFD-A14A-48DB-89F3-50F90D308D97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "A100F872-E7F4-4188-AB44-594F9612F478",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAB4ACB-70C8-4BD2-9E1A-D5DCE06B3FBA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "261CC970-0D09-4E85-A063-A68CE026B593",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "BE30BE52-B04C-467D-9A5E-8F71B4C2F3CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "797B03EC-8CE9-41C9-B77A-975A7664CC9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0F2E5D-7A5A-4205-8F88-1DC6F593E713",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "ADEFD297-FDDC-4677-B52E-7FACA67FA71D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:1.4.11.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EDC0B7-F004-4841-B848-E653E4FF044B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AFF9A0C-8E6C-4358-BA5C-0F80004F62B3",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB39F2DB-33CA-480B-B02D-B1919B5AA8C5",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2A0E1E-1DE1-49E5-A472-3ED6AF13758C",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F428461-20FC-4C3B-B3AB-B359D22F7CEB",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4015A166-22E2-4195-936C-B854FA783883",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D748BC0-B398-4C13-93E8-4332DBBFC82E",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8415CD72-6DBC-4277-920F-B62CD1D56047",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D017CC1-848C-4871-9473-A929CAAE426F",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ABB894-A71C-4117-BF7F-B558B1061726",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1E687D-3354-47AD-8FDC-10E307BAB08C",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B482FD23-8859-4A55-BD34-669C4644BEC1",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "519B33AA-5932-45AE-A014-09EFF434B14B",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76AC78F0-C511-4B88-8A93-5052C94AAFE7",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DEC17A4-A48D-487B-AEAB-4A09C979C47C",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F46BA126-9008-41B3-9486-E9DFF572C1B6",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1280ABD-C15B-42BF-AF72-B54C3BCBAF83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C10AA033-AFA8-40D0-8342-1EF4E8487CB7",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB53579E-E646-45D6-8702-993AF666247B",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82507F67-3516-40D1-9922-9BEE33FAC321",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE8EE09-5C40-4B15-A412-9744C65A7982",
"versionEndExcluding": "2.5.8.12",
"versionStartIncluding": "2.5.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de varios switches Cisco Small Business Series podr\u00eda permitir a un atacante remoto no autenticado reproducir credenciales de sesi\u00f3n de usuario v\u00e1lidas y conseguir acceso no autorizado a la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Esta vulnerabilidad es debido a una caducidad insuficiente de las credenciales de sesi\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad llevando a cabo un ataque de tipo man-in-the-middle contra un dispositivo afectado para interceptar las credenciales de sesi\u00f3n v\u00e1lidas y luego reproducir las credenciales interceptadas hacia el mismo dispositivo en un momento posterior. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante acceder a la interfaz de administraci\u00f3n basada en la web con privilegios de administrador"
}
],
"id": "CVE-2021-34739",
"lastModified": "2024-11-21T06:11:05.400",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-11-04T16:15:08.577",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-613"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-613"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-15993
Vulnerability from fkie_nvd - Published: 2020-09-23 01:15 - Updated: 2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FFFD881A-0D7E-401A-A69C-397E476E5DAD",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE0F973-8476-42C9-B05B-48BE34717CAC",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54584C84-2CE8-4E73-B58D-AFB3C8D7659E",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E94525F-05C6-4425-8C8B-8671F1EDA9A7",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05645288-92E8-4F21-80CB-39A5A31954F2",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8799EC0E-350D-43A6-AE31-68629A637308",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C73BA34-BDF4-4242-AEB5-D867BC5EF599",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F55B1A59-BF4A-4E96-82D6-2B604681E027",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6282A87C-6F2B-41F8-A53F-44DDDC437995",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE55BC7-8F28-47BB-8296-101B13E78C9A",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B22E45C4-B481-41AF-9D8F-DE705481DEF5",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE3A235-E171-4682-AE90-F6D8FEAD96E8",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0E9ED8-92E6-4492-9FE0-CD2A851970DA",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBAFD98F-6F06-4C95-9A32-FC9EEC894059",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D11848C-C027-41A4-8A6C-4E0E36AC2278",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCB2E7D-E353-4F68-90B9-D0FE415E5E29",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1080FE18-DD22-4E9B-A518-47026A848345",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6B9FEA-A8DC-42FF-A435-A953AC185E3D",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25E8F696-D786-42CD-95C5-DE1E340A93B3",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FB78FF-A40D-45AD-8BF3-6277ED7A369F",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92CFC5EA-BCB0-435E-960C-70C9171A54F3",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB84F179-6915-4FBE-ABBE-D4F346A332E1",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE16A79-8601-46A7-B0B1-B9E7FE70CEAF",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "288A47B7-0EC5-4484-A0E4-F1B8AEC2CCC4",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67F78985-6305-4EB7-BD66-40EAB975F141",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95756431-612D-422D-9DBC-61AF92F75432",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63DE059C-D45B-4B1D-9DEC-908028E6099F",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8340CD09-7FB0-425B-8262-C812D7B720DF",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "387B7C97-5AFE-4C32-93D4-B7236A0B70ED",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63159E4B-585F-40E9-981D-E2D569701DAE",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F983A1DC-807D-428E-A1E0-AB19BC2B46D1",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78D19883-F410-45F5-A04E-06A011D7666B",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9470B5BE-AB7B-4A33-8A22-D5C86E842FC7",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA285AC8-75E0-44FC-984C-DF8996F69817",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8ADDA4-FD34-4AA4-8D92-0EFF279B669E",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2340CE-7F99-460A-AFD9-4AEEDDE5D789",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1CDA64-2C97-4CC8-87A2-5FC6F23FC4DE",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE76CBB-9934-467F-B918-4C3D6C1C33E3",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1623541C-0521-432F-B7A0-0983C781255E",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "026C8FB0-AF69-4F7A-8068-8E92D1BCB73E",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86A7B907-DC97-4D58-9F72-063D8A526994",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97DB2F1A-B496-4CB6-B632-7B4A2C3CB14D",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B288B192-45F7-4475-8DC6-A9E3D01E2028",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E62AA8CE-38C4-4079-97E9-A8FF23D236E6",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6A5155-624E-4848-835F-FBCBE22E8F31",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59300A75-74B3-4411-8380-FDA62C8E826A",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E77ADA37-65DA-49CC-85FE-03D242AC2878",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9EF02C4-A24D-4A91-AD41-9F7D3C3CA2BC",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C621580-9656-4F3A-BF2D-6E97E9C1C943",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F79C2721-B554-4C77-A423-0EC44A07C2BB",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "222A1120-8920-4445-AC3A-3A2752141D61",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F28F657-840F-4EF3-BB3C-6BE2EFA33FB0",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00E8213A-63DB-4649-948A-478D094641BC",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF65FD90-F675-4056-8BA7-F20876B89E99",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12D4A95A-9758-4EFC-B690-E6A5D4CF260E",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD243F82-C133-48B5-A55C-448C9B6C2012",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52237767-13BF-4B22-8322-4FA4DD9D56B3",
"versionEndExcluding": "2.5.0.92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86CB6AD6-2606-4A19-844D-5CAA971E83C2",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9816F54-BA63-473B-BB4B-711722302517",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8557B1-BF19-4BD7-BB2B-4EE1A55E09CE",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E68B7353-2034-4D3E-BBD0-CC8FFF55FA55",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B053CCA-DF85-4885-915F-5724D961514A",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7ADAE2-5201-476C-9B9E-3EA0AADEB047",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "425EF609-83E3-44D5-88B2-81C873BB1C96",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7DDB5A-7D50-4C4B-950A-9DC77B342109",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6257E14D-BFE3-44E8-AB83-1B2096BDD87F",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F47DF59-773A-4BED-A548-BAD4E1612039",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C177B6-2FA8-486E-BDC9-8B69CE2C71A0",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD56251F-EE7A-4605-A9A0-180D0B68D67D",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54629245-E4CC-42D6-9AE5-6682EB673C91",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E9BF06-F9F3-47F1-9ACF-1C9875D34A2D",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCA2440-DD3B-4C6F-BC21-1C65A53948E7",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86CB6AD6-2606-4A19-844D-5CAA971E83C2",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9816F54-BA63-473B-BB4B-711722302517",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8557B1-BF19-4BD7-BB2B-4EE1A55E09CE",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E68B7353-2034-4D3E-BBD0-CC8FFF55FA55",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B053CCA-DF85-4885-915F-5724D961514A",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7ADAE2-5201-476C-9B9E-3EA0AADEB047",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "425EF609-83E3-44D5-88B2-81C873BB1C96",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7DDB5A-7D50-4C4B-950A-9DC77B342109",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6257E14D-BFE3-44E8-AB83-1B2096BDD87F",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F47DF59-773A-4BED-A548-BAD4E1612039",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C177B6-2FA8-486E-BDC9-8B69CE2C71A0",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD56251F-EE7A-4605-A9A0-180D0B68D67D",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54629245-E4CC-42D6-9AE5-6682EB673C91",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E9BF06-F9F3-47F1-9ACF-1C9875D34A2D",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCA2440-DD3B-4C6F-BC21-1C65A53948E7",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "770E9D23-8366-494F-93DB-2C15CEECDB03",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03FE59DE-65A4-4969-B189-9EB1FDAC17C6",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB3F54F-853D-48DA-85D7-08F7251CADEC",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33D30A71-3EC8-436E-B6EB-8F85749FBBB0",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7032AF3-FDDA-4AAB-843C-6EE000CA9BC9",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44DA72EA-B8A7-438F-8E41-FB1F667AE5A8",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD56B74-D6FA-459E-A108-6AD1275EFE8A",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13877EA7-43C4-4171-A26A-372396950EC2",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "350B373C-2C15-4763-95AD-FE7639CB0DEC",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50C8BE22-9B68-4185-934E-14931A75D182",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8E76F73-8ABB-4EB5-AEF2-74363650C84C",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30C76BE1-CD8C-483D-B4BD-BCA99CCC8B2F",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "748EC0D2-60BC-4813-9FF4-7FAD6F242053",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F32367C8-388C-4A99-9731-16AF03CDB74C",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E3B1BC2-EF01-4AD6-922A-9A4377974CA0",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA354974-6FB9-4AFD-8118-194E12AA109C",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39BE8486-4F69-42C1-B5D1-1A75B9743231",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8337FB8-A6B5-49A1-B356-BE2BB3E4F3CF",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB1E6D8C-3DDB-43F0-BB04-0990AF1D4C2C",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4209B3-FABB-47D2-9E4B-DAD439E3E91D",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8FC7CC-1D31-4328-8F0A-9D73313FB261",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05D941DA-1558-4801-AC54-3BEC8A0F188A",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EA0FFC-79DD-4050-9014-1A4EB234BB11",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1B84F1-DD45-483C-9C1B-9A0491D8B2CA",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A79CA958-9B1E-4B6D-9555-B893971CFD54",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00B7EBA0-1F05-4D4B-B2EC-F0EC6AE692BF",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF1D6CB-5064-430A-8988-56FAA6DE63C9",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2470A37-530B-456E-8FE5-4D8274304135",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3233C427-6F16-4577-976D-DE1A36A5B5C4",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDC52AE-0844-46E7-ACB4-BB32D70E1C4A",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30223810-0822-4406-A781-A5049A4B6A5D",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D33D14D5-7F36-4374-B92D-60F63DE9DA80",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B909EAA7-2B09-4AE1-8248-E32EC5CE11F8",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB386177-1DE3-4223-A217-74060E907787",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "205F2AF5-BA3C-4516-8B2C-88D9B897C6F4",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "928646A6-E198-4F88-B084-F00987B9F8E6",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75416DF8-226E-48DE-9216-0458DC6D1E55",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4B6200-3241-4FAD-8AB7-7E19856BF032",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EBED6F3-7B67-416F-A368-0519B42E7AF9",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "483A0D55-30E1-4D7A-ADE6-1F55608AD932",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "129DA779-09A6-4A3B-AB4B-25FC3C3EBC1C",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53751D31-23FE-49D6-938D-638149553758",
"versionEndExcluding": "1.4.11.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la Interfaz de Usuario web de Cisco Small Business Switches, podr\u00eda permitir a un atacante remoto no autenticado acceder a informaci\u00f3n confidencial del dispositivo.\u0026#xa0;La vulnerabilidad se presenta porque el software carece de controles de autenticaci\u00f3n apropiados para la informaci\u00f3n accesible desde la Interfaz de Usuario web.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP maliciosa hacia la interfaz de usuario web de un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial del dispositivo, que incluye archivos de configuraci\u00f3n"
}
],
"id": "CVE-2019-15993",
"lastModified": "2024-11-21T04:29:53.367",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-09-23T01:15:13.410",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-3496
Vulnerability from fkie_nvd - Published: 2020-08-26 17:15 - Updated: 2024-11-21 05:31
Severity ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2330AAA8-F175-47B5-A9A9-67238AEBDD25",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2253CBA-D5A2-40C6-8B18-674EEDB5A499",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57E3C308-E217-494A-995E-15F7C04F61D9",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B3D6F5-324A-4F4A-B395-8CBC956CA4AD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE0F8CF8-612F-4312-A4DB-43692AB39CA2",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "605D6944-BDEC-4115-8C29-5B4D48A4D0E0",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA8E1BE-92DE-4E40-8695-DAAE18B117C7",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4540AE8E-506B-4CB7-87DA-1103ECBDD1E6",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "969ED439-D472-49F5-BCC4-CFE7B64C37D8",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A53E249-5130-4E33-B752-BE9C69B324E9",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D2C0C44-D5F5-442A-82F0-855D8303AA98",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A229DC3-70E8-4934-897E-234F9678AE70",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B5BC355-D395-48FC-A237-E9F690D451BF",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6E6E94-C9A4-41AD-ADDD-022CAD8E944C",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F599B783-5D75-487D-8039-7D4514301F1A",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3579AB-575E-45D1-97CB-BC9BF72747E7",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E4A5B7-FE7C-48C5-B1B4-DCBF3ADC1610",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA0D6A9-5674-436C-84C4-8311CD527E93",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E55A74B-A9CA-41F6-8741-5D2C3F29B99C",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B149239F-0159-4F48-B06D-3004BA1394E0",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB2D042-C74B-4E6E-80D8-04E2E43425BD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FFC06CF-B049-4168-A83B-78507AD8F4DD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B632BC-458B-4701-BD2E-D6A6F3A7E6DB",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD23D531-63DF-46DD-BF9F-9009829587C4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B83EFB88-38FA-414A-B86E-FF201BA80959",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6AFF5A9-EA0B-4BDF-8535-8168D83BC664",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76A80CEA-3971-40A3-91B3-8645C5CD6B35",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A70C6D0-D4D8-44C6-B615-37F420CEE10B",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E930941-9B3B-4A41-BD67-C5CCB1C9D9BD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C94E1974-468A-4126-9EB4-A02129959DBD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0121515-56D3-46F5-AC87-642F141D15EC",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE15464-4290-4B0E-B9AE-F26F7F47895E",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CABEBFCC-F22F-4610-B869-E7293441DB60",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CDF41C9-6063-48E1-9B8B-4F1244D091EA",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9F7B7A-07B7-49C9-B8C7-A407240ED483",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2F9F856-7EA8-4822-8EA5-4B0E71EE4A38",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7D4A841-F03E-41EE-8541-3688757C60B4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "121932D3-C347-4A39-948F-AFB7255ABAC6",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7551CE16-7308-41A1-A714-CC32D66D7535",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "296414E3-E79D-40A4-AD0A-3180B3A4EAA6",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81719D0D-C016-4F40-9965-ED8B8FBE58F1",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2A7477-AB48-4751-9E86-1B4A51D7776D",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B02EB990-9D20-4FE5-8B60-8F71218387C9",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA40A1AE-2ABF-46A2-8CCA-68171FAEA616",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47AFF05E-7F13-4197-9655-2255C994F5BD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41C63AAF-B04B-4D27-8A80-97B6135107B5",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04C26AB7-762C-41A6-B646-1E3E07C1221B",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37A605BD-47EC-4E35-B6C5-915D0B7B9C7C",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "188E5C34-DE23-4B7F-902F-3382AABB7EC3",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFF4154-ECC3-40EF-B7EF-03C80652BFC2",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D454E120-20F6-49C9-B730-CC073CD3B47B",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2ECA4E1C-3384-410A-8C66-4BB0C5856601",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0459CBD9-D8D6-46A1-99C1-83F51E715267",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "078A0F4A-AC48-44B8-B112-ACF9DE807DEB",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F427B1-D62B-42C2-96B6-F2A22832583D",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE7F347-78D1-49BB-A7D1-AD3F87DC6C7A",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1110D21F-7B01-4098-A38A-9B3A54604E0D",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1B116D-89E1-452B-A3B8-EE5C6BA1A0A7",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48E91FC5-A3C9-4628-8A16-E510A7B4A95D",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34EC217A-C8B3-4E78-B654-E83382CC1426",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04158003-F7A2-49D5-A135-EFB863CC6528",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFD62997-1916-4205-806C-FFF5A4E3FD58",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "761B5A71-92DC-4051-AA4C-EB8482193698",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6D6FAD-13E4-437B-A07B-D6D535413A68",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B70C2A7A-A458-4FE6-AECC-3A3718C6646A",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B6684A-8F2D-4F19-9872-1680DD26E889",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35B5812A-DAF1-4CB2-BBA7-58E1E02D9153",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A98916-8DB1-46B6-82ED-E7B1BA1AAB2D",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "614FAF10-501E-43B3-9B85-F40ABF146C27",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E49A6CF9-907C-4388-BCD7-4FDABD9D1610",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "337B23A0-E66A-4C82-9E57-002C2C4A2265",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24C4E926-A667-4A7F-AB5F-2417D77DFAD4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E41B85CA-59B5-472E-B555-F8ACEB8DB4E5",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22960F56-F3C5-4F1D-ADCF-A6ACF53AB798",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0837BE4D-999D-4933-AD2F-875EDAD8B6BB",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7177C86A-B8C8-40CA-8973-9CF1C3F103A4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E56236B2-D919-43FF-B3A8-90CD575D39BD",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF31396-F6E3-4B32-8DB9-0EF0BDAEF745",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF861DE-B7C4-42C4-BE9C-22D5F9FA3EC4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDFC783B-20D6-4EEB-B2C6-0E7E0A27DED0",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9563D3F-B6CE-4FC5-BA9D-D6C85C21A2F8",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A596AA5F-1260-40B5-874C-BAAA7B52C7B3",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1E857D8-F10F-4261-BE4F-B7A78740082C",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA67989-A4AC-43B6-BCF5-4768F0B5D2B0",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5524FE-CA66-4CE2-8B44-A84776397FAE",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34613F65-D402-4C06-BAC0-42CAEE0CA7F4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBEFEF7-58C1-433F-84C3-63A189A93621",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EBFCDF-7D2C-42D5-AAE7-04E0FFEE1F1E",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA07BC1-3357-4EEF-93B2-7087338B6606",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A8AB96-ED85-4587-962E-966329687EED",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED6617FB-15B4-4D1C-9E0D-AFD1108E0A41",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "048DDACB-1954-4AF0-A23D-0E394DC4497C",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6135300D-7C42-4766-A924-F72A611BCB9E",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DCD77A0-4104-4DE3-9134-743BFE69D752",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43805734-4F7B-4C3C-A359-508B22BCECA6",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9A3713-5964-4A89-BB44-730E7DC9B7E0",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A717082-4B71-4FB2-BC43-113295F0008D",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "194CF955-EE25-41FD-B8F9-AE9E352C3F18",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC9EE2D-6DE7-4574-BC73-76A5A04EB6B3",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77BCF729-31BA-48A3-B6A4-8E9D65F835EC",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C09948AE-1001-4E18-BDE8-7E127ED314E4",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC5D0D6-9A6D-4BFF-AD6E-21755AC9F8C5",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1A1966-7E47-48C0-AAA2-1F8E4F687BB7",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50B20068-195A-4C1E-B14F-ECD895693918",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA068C37-E9BA-4AD4-A198-ECB800779848",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "600B3B6B-6F5B-4983-95AE-D76BEA874E79",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7449A1-9746-4000-96AD-D3F0145BAF8C",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB3F67B0-4D92-485C-B7CF-A42E68F81AC5",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44D5D35A-5B0D-4C36-9669-BD39E38A4A50",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED53CFCE-DB09-4723-8D81-63DAE92A9E25",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D74D0C6-1759-4DAC-93E0-AAE2D3101303",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED479AE-A874-47C5-80CE-9AB09D2DC8C8",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65E85B18-AB4B-4CCD-B66C-058E97352D6B",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "332789D6-834F-424F-BFA2-BC4FE3446923",
"versionEndIncluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el motor de procesamiento de paquetes IPv6 de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente del tr\u00e1fico IPv6 entrante. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete IPv6 dise\u00f1ado por medio de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que la CLI de administraci\u00f3n de switches dejara de responder, resultando en una condici\u00f3n de DoS. Esta vulnerabilidad es espec\u00edfica para el tr\u00e1fico IPv6. El tr\u00e1fico IPv4 no est\u00e1 afectado"
}
],
"id": "CVE-2020-3496",
"lastModified": "2024-11-21T05:31:11.363",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-08-26T17:15:14.210",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-3363
Vulnerability from fkie_nvd - Published: 2020-08-17 18:15 - Updated: 2024-11-21 05:30
Severity ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF693F4-E085-43E1-81CB-F4365E173FFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3521F951-DA4C-48C9-8FD0-CAD4328E61F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37654BAD-A965-4680-9496-2527CC20574F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDCF275-D322-4551-B072-CAE85047759A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB3C8A5-8918-48A9-A8FB-12F0E694247B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD64ED9-F8FD-4C26-82F9-C4D84D14681D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA145A-98C6-494C-A488-37122AC62C91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B94C85-629E-4911-B55E-53B6D86BC603",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A0D3C4-B134-4709-BA6B-1D376A7D4696",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "027E1D98-A934-47E3-A3CA-813C3E581A58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8407005-2954-482E-A2BE-64FA81DB8C82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B91858-B62B-4EB8-86F4-E16A2FE2E38E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04F3DD74-DD70-4154-854D-C125A3065735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14F3604E-EC92-48A8-A0BB-AC848AF188CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E933E3-12C4-48A7-80A7-BD3C6D99F21E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4310B268-A950-4214-806B-2E2C5C85546C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF81119-6931-4423-BC37-085C772165DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8915A14C-5C9F-443C-95CA-A3DBBEFAE8C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A655D736-2E6B-4DA0-878D-419B17DB6C9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4C8F8F-F914-48A7-B47B-2F1EFE8F7605",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F44E170A-2F71-4112-9793-BDE10341A485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EADF9B5-CE67-4148-8AF1-200CB1087A28",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD46C00E-FFF2-4881-A86C-87676DA895D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33C6CC27-465A-4B48-B910-4AE704296BE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505929A2-38FD-4DE7-A545-17304C97F5C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1AF8D7A-0138-4369-8134-369CE4F5B83C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF16C957-3898-40E8-89E8-68C4D11A7438",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9646CE32-97B0-4708-B9DC-54419898E5D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "465EF5CA-3AD1-4727-B245-3C69E28E02F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CEFE6F1-4F0F-4A61-A9D2-AF2EF6A4BCB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E6130F-046E-4F43-9B33-1E2F78DA838D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4BE80B2-F273-4336-897B-C67DCB8E2DFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82562C7C-8DC8-4D67-8FB8-DFC3CD034127",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7033CCD4-DA36-4D4F-AC61-FBDA9D14ADB4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16458FAB-82F2-4BF7-834E-EAF425A55122",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A52FA3-1EBE-4A7B-99A5-99A4162EBC02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41B604A-8C7E-4A17-9D99-19638DE0C043",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFDC3D1-2390-4D1B-B6BC-95757E56721F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E56D27-ED97-4D92-9EE9-37CFF223ACFD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E070A80E-D5DD-49BC-B1CC-54C37D89F1FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B01E0FF-0EA1-4337-B95C-59E51A54E4DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82F86D1D-95DD-456C-BE0B-DF85FAF7E8F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72FAB4B2-F4F7-43CE-B82A-5053CE65C658",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03407954-9170-46D1-BBFA-3479B51D9A87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C06422E-173D-4650-A560-137E7B00763E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3E9EF2-9588-4EF4-AE3A-CCF10A962C87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9BB1CC-974C-4739-BC55-AFAA8C27B16D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E9723D-912C-4EAC-905D-C2AA20092F6D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C25D316-9228-41E8-96CA-8CBF38855701",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D863273-1BE8-4AC0-ABFF-58EF1597D363",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B2D902-C7E7-4EF7-B633-9FC9AA473010",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C115DA7-6CEF-49EF-8E24-FA0A7DD050A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0090D8-7AB4-4BA7-A969-1C0C6B368B09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219B048E-B61B-4C50-B345-FD25696CB764",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10E69DC4-C09F-4178-8037-29406F79BFF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB77511-93E3-43D8-8D32-AABE27ADFB08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7534A5E0-742E-414D-BDC5-259D39159BB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BCF751-3356-41C4-811E-B7CF56E63A7E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AFA3D3-E364-46B6-A93F-04A75CB77558",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F13F3D35-4661-4E09-A970-F6AEC950ACC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B78DFA9D-05FD-404C-8546-86DC2A7F306C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26514DC-FD8C-416B-AA7E-F62208F5E5E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBF6EC3F-225D-48B5-82C6-9559BE0B653F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DCC3DF9-71EE-4503-92E2-74D19DD8478B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "582CD84B-C24D-43DD-8000-CA9BD41771DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "257121AF-7D08-40FC-BC75-BA0E29246B16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "731E458C-B7AA-437A-AA22-023AE746044A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE8C75E-5727-43AA-8F27-9368C60C1DD1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "375B4C7B-4A60-4CCD-8656-C674D734FA10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2537192-BED2-4B18-966C-E10F155ED1CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E280C1-B685-4813-A8B9-4A654FA3222B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D82748-7475-4E94-928B-05D45D7AD2F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B39775-5AAF-4A0B-83E7-D6102D75C404",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22A19260-8730-42E6-B7B4-DCC7BEA6274F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEA9482-67E6-4E6B-8A45-24908BB40C1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3012AD17-508E-4860-897B-4F9644BFEC03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BE2BCF-A130-449B-B50B-0D5414DDD18C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30AA113A-4967-4554-8AE6-BA51C9A5F2C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el motor de procesamiento de paquetes IPv6 de Cisco Small Business Smart and Managed Switches podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente del tr\u00e1fico IPv6 entrante. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete IPv6 dise\u00f1ado por medio de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar un reinicio inesperado del conmutador, conllevando a una condici\u00f3n de DoS. Esta vulnerabilidad es espec\u00edfica del tr\u00e1fico IPv6. El tr\u00e1fico IPv4 no est\u00e1 afectado."
}
],
"id": "CVE-2020-3363",
"lastModified": "2024-11-21T05:30:52.957",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-08-17T18:15:12.587",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-3297
Vulnerability from fkie_nvd - Published: 2020-07-02 05:15 - Updated: 2024-11-21 05:30
Severity ?
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8416CC-0A4C-4227-951B-14929E401A66",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22965552-683D-4811-A69C-4B9FB87CC21C",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C5A0ACA-1654-4A32-940C-80105E747813",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F908C393-B84F-4045-93DA-23037EA29A93",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F700C7FC-7C34-4DFA-860B-BD6BDB259BD0",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "733E125D-6914-4338-BA82-B885D31A0A32",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE74203-4041-4F19-8E39-37581C24E6CC",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "041E477D-0D38-49F1-AB5E-BB42F9AD3DCB",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C181FD66-2C64-4DEB-A8F2-3DDF66B87447",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD04A21-F225-41D8-9A56-A350169432BE",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24477345-8D97-44F4-98AA-8959059D7D76",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D313EAD-CE05-4D48-A50C-98737206DFA1",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25C1B05A-2F05-4CBD-8648-FD4BF0FBDEE3",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6176441-3DC9-44FD-9751-F2AE9FD39BF3",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B71B9C17-B708-42BD-82EA-5C19B5B93B65",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1007E9-2301-46D6-929B-1752D2704BFF",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A455130-06D1-4AA7-9F1F-4F3B09B2C9E0",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81E67A14-67D7-446A-B16F-4546C64BAACE",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC1A0BA-EA0F-4D31-B440-D15A4D5737AB",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B537A5CB-FE88-462B-85F5-7FEC51C244EF",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "433B833B-1E17-4FA2-A938-7AFE08AED85F",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67D32F03-1816-4C15-8BC1-97F51A9097A5",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C69A281-25E0-4B17-A610-19A2DC13AAE1",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44DAA587-1673-40D8-826B-BADAD2602330",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB3A7F3-91C2-46E7-8889-70720FC366AC",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53509E24-885E-4D5A-89F8-94D124EE2F9A",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0815568-7FBC-4794-9023-C5BDF6A2DA94",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03700689-2A5E-4155-AE32-62519DAF662C",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF7CF9E-510E-4F18-90F3-2244A30832E9",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE29E35-04DD-4BCD-966F-4023F2392E05",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "251A7270-0814-4EC1-8FAB-FAB58408626B",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC548F72-CD1E-4A77-BD94-71380A7CF7B3",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "409AD45A-3F8E-4AF6-80E8-4D6449AC6EEF",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDD945F-E5BE-41B7-BB2F-F5657B2DA8E3",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB233D2A-10E4-47BD-980C-E2047113F3D0",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6CB98E-0CDF-4AEE-8681-30A3DD796B3A",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8092743-980D-442F-958D-A804FF7D9F77",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42433AA1-CAE4-43C0-AE87-8CD406BB7BFD",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95BBEB9F-6574-4B6D-ACC3-EA0E1C3E6A7D",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE960080-B027-4ED8-A99D-D03A6487D1CC",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AA691F-D07D-4484-8024-C03B935A8AB6",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F99C124E-2554-413A-99A7-D2BD86F24C65",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00ABB6-25AC-41C9-BF5F-5B88CA69DB74",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D2CA1B6-6520-4658-AAD0-AB8997E61097",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C58BAD66-6CAB-4021-8466-F4C8AEE3E66B",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21BA4FB4-965E-448F-8049-74C9E0F5E13C",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD221AC-9D30-4B8E-9D15-DBE4DCB5AF72",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A38B9E3-B6D4-4218-BA85-993853A2943B",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F861ED41-C075-4908-8862-C80410F26D17",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCABDD82-A432-4E28-AB6C-9150102F89BD",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29D14CC5-370E-4822-92ED-B5E0D43E326D",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC4F63DF-1762-45D5-B157-44812D65F8BE",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99157B79-030F-4C22-BC2C-658CB6F7E929",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FF0B49-0054-4FB1-A882-7ACEFF08FFFE",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52FBF38D-F5CD-4966-BE01-F91DEFA72E70",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F94A2C0E-D26A-44CA-8B90-05A9C281F16B",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23F9A26A-4226-4050-BEB4-0D716B1F676B",
"versionEndExcluding": "2.5.5.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5351275-B6BB-4C0B-B6BE-04AD6B87DC89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22A38A8A-081E-4471-8A13-0AF6AB7339C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C879A7D2-34FC-4BF0-8845-CA358BED3B88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B28A1C-B891-4D1B-A91C-7DC88846F726",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C31245AB-ECAD-431D-90C5-C33D3F78B09B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BCF751-3356-41C4-811E-B7CF56E63A7E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AFA3D3-E364-46B6-A93F-04A75CB77558",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F13F3D35-4661-4E09-A970-F6AEC950ACC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B78DFA9D-05FD-404C-8546-86DC2A7F306C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26514DC-FD8C-416B-AA7E-F62208F5E5E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBF6EC3F-225D-48B5-82C6-9559BE0B653F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DCC3DF9-71EE-4503-92E2-74D19DD8478B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "582CD84B-C24D-43DD-8000-CA9BD41771DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "257121AF-7D08-40FC-BC75-BA0E29246B16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "731E458C-B7AA-437A-AA22-023AE746044A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE8C75E-5727-43AA-8F27-9368C60C1DD1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "375B4C7B-4A60-4CCD-8656-C674D734FA10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2537192-BED2-4B18-966C-E10F155ED1CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E280C1-B685-4813-A8B9-4A654FA3222B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D82748-7475-4E94-928B-05D45D7AD2F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B39775-5AAF-4A0B-83E7-D6102D75C404",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22A19260-8730-42E6-B7B4-DCC7BEA6274F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEA9482-67E6-4E6B-8A45-24908BB40C1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3012AD17-508E-4860-897B-4F9644BFEC03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BE2BCF-A130-449B-B50B-0D5414DDD18C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30AA113A-4967-4554-8AE6-BA51C9A5F2C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la administraci\u00f3n de la sesi\u00f3n para la interfaz basada en web de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado vencer las protecciones de autenticaci\u00f3n y conseguir acceso no autorizado a la interfaz de administraci\u00f3n. El atacante podr\u00eda obtener los privilegios de la cuenta de sesi\u00f3n secuestrada, que podr\u00eda incluir privilegios de administrador en el dispositivo. La vulnerabilidad es debido al uso de una generaci\u00f3n de entrop\u00eda d\u00e9bil para los valores del identificador de sesi\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad para determinar un identificador de sesi\u00f3n actual mediante un ataque de fuerza bruta y reutilizar ese identificador de sesi\u00f3n para asumir una sesi\u00f3n en curso. De esta manera, un atacante podr\u00eda tomar acciones dentro de la interfaz de administraci\u00f3n con privilegios hasta el nivel del usuario administrativo"
}
],
"id": "CVE-2020-3297",
"lastModified": "2024-11-21T05:30:45.430",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-07-02T05:15:11.260",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-12718
Vulnerability from fkie_nvd - Published: 2019-10-16 19:15 - Updated: 2024-11-21 04:23
Severity ?
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FFD9F9B-22C3-4F52-8474-0DD7543CADF1",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29DE29FE-8FF3-4A08-80B6-3FB03DF5F305",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19A5CBC1-BB3F-4751-81B4-B40A682D7EEA",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3436DB0-18FA-486D-BAF7-92F1D87AFD28",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D30728E0-E8B8-45DB-9421-B5ACD50B1A97",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3208F54F-21C5-49EC-8FBF-03BAD10742EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67809B1C-8B06-4473-84B4-DBCD99AC1779",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E53BBA48-B11C-4E85-9257-61ECE5389CDE",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60EF4E-A3A3-4E33-9561-BC8259062C2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDBA6F78-8754-4D1B-9A60-1C19568093BE",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98523586-0F3A-4B62-A972-8E9BA4F0DC4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7B6BDC-2BCA-428B-82E8-E083F3661358",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CD3BA54-85D9-4688-8B90-612F96D452A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08287D78-F7B0-4CB1-B719-86DB482C3CDA",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95AD5321-1F1E-4699-8FBE-E9B04505092F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23B51027-95E5-443F-91F5-93D7B3B3320F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFAE9706-8B37-4231-B4D4-CA6F527446E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "603D9E60-CBDF-4ADE-AB2C-903B412DE294",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFEB361-1986-4522-BC23-06140F8D2625",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33FBBFDA-5279-4429-BFD5-27669148DB8C",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BDC341E-FA7D-4B90-A5AB-E41822E16385",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2B9BC01-193F-402B-8A18-ED5C897C23B6",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C835D1DE-A639-4CB0-947B-988C89ABED5D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "824D4FDE-7D99-48B9-8F50-9C8DF4E5AD2A",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5D8296-7B6E-4880-8C5F-D7293118CE5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04E7ACB2-3D3B-4435-865A-3A1DB5AD055D",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F6551D-9188-44C6-8101-306D8077C0BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "410EAAFA-771D-4151-9583-D65AF0D97A17",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27D4259-24AA-4F4F-AC82-53D8BFAA303A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFC9FA4-0DD2-4134-B9E7-D30B2AE45C8A",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "393E2CBA-BF91-4AA7-B014-AE9808EEDD3E",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412F1F7B-6348-40A0-8C04-D4C6B46B3E5C",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7869C8D8-D110-4B91-87B7-D17BF4147A49",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59B4F469-A2D7-4B86-BC0A-121A4E4DB193",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4634D2E-51B6-4C08-8309-CAD95CD54973",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "690B0EE1-C461-4A13-98D8-37CF5932E170",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8009A0BB-491B-417E-97F8-7AAA1B06DECD",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA56C16-C780-44B8-8C0C-63737C1C06F3",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9345DCEC-A026-40C8-A353-3A0469DC5DAA",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFF357BD-04F6-46FA-BB4D-8A7595449B74",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "603591D4-5826-42E6-A8B9-E6C3BAE781A2",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1546E74-1020-4F6F-B9CD-63BE041C73E7",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A48CA589-1D31-4F39-9F5D-9F28EB0D600F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65778A40-A33C-4035-8DE3-997D9FF5EE6C",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C01641-19E6-45FC-A359-93C9643ED565",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE57A25-5323-4D1B-BCD9-B68302068F12",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "070D7935-38B0-4568-8DA9-A8E28786A803",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F21AC1A-62EC-4575-9655-F215C283B276",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D355124B-6687-4D10-9277-7E39A3737E74",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F259F652-2F84-4868-A68F-DF331F6B02FF",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CEAE751-6B97-4A64-A8CE-DD109E40E9C5",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28B7FD96-9F84-467F-A3F3-9AF0190CA63F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76A090DD-8C6A-4233-9E9C-6FB4A3B33FA0",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3279C13-02F8-4961-8D2D-A63B6B4FE12D",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A87FF9-BD82-454D-AE01-DCE5317DE0FF",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A015D614-E5C0-4E29-8293-776BB1A94D10",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E65353E8-9949-4C4B-932C-667279130E33",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D484F828-5CFB-4A61-BF53-B9F28ACCF6EE",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "162B0262-CE2C-4984-A6B1-B901E811B0CC",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D22DF022-C31A-495C-85A7-A2F8A16DC2EF",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "763299A3-D24A-4504-B2A4-E803407C8362",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "176FE80D-5199-4510-A7F1-01D3256450C7",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D142F8B0-8B67-4B97-B96A-52BFCEC3CE58",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "520D3C41-1125-4745-A513-A4612046DD40",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D993645B-4DB2-45BA-B7EF-C988A49CDC8A",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "819EBA57-903A-4F08-ABD0-3CB9ECB4A065",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE0A7B1C-66F8-41C5-B3E6-8255D22407B7",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DC6B24-4789-44BB-B34B-904F5652C2E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC073DFE-4D85-4B43-8BD2-C4EC7F0EA36E",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD6C368-705C-4AA5-BFCE-63A6A411A800",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5ACB-B4DC-4E10-BD6F-0BEACD024941",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B5EE74F-A8E1-4A75-8FD2-21230293809C",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D101025-42C2-46B1-BCE7-DAD2B6DE8141",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E08B48-138B-441C-951D-44578A31F1ED",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8943AD9A-BA0C-4AD5-A35C-7FD82484719D",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E8EFD2C-E5BC-424E-9F00-4653C01981DA",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72AF1C2C-C190-4FBC-A468-0863CD5851FC",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08A36AED-FFD3-446C-AB12-B3DDD6BBE243",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "538851E7-2DEB-43F9-B5ED-C696F925F00C",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B08BA07-5F4F-44F7-BD1E-3E8455430FDC",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8695118-0A83-4A7F-BDCD-18EB4C906545",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77D42182-0D2B-43C0-8BE2-EA6255A166CC",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53DAEEBD-7155-412F-A63D-0779217C3E33",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F51D0CC0-23A0-46D6-BDEB-BC15C3D8253D",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BBA1B-6C54-47D0-A4C3-F2AD2C580674",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E0258DD-37D0-4607-B29D-095700ADE63C",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7444A63-6739-4B01-A503-88E6B8AEACF8",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "143CE2F5-9BCD-4AEF-A04A-E645C67E8240",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA315213-2376-4C38-838A-5A9CFD6F5378",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3579E5-7CF6-41F3-B6B1-3D820ACA7619",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68D7186B-319F-4F2F-B839-FE8466CBCA48",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54E0657A-6E4E-4B24-8D6B-ADFD67F864AE",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF43FBA-9B58-4A89-A345-E2B7BD0A0432",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C169C472-6BF7-45FF-A032-43AFD467EE18",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56924835-C5CE-4770-A5AD-62B421A0AF2E",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52D2E5EC-C66D-4FDE-A0BD-FD86CCA7B478",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D7EE83B8-8275-4677-A531-7E02B1D7ADD2",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB35899-A2B7-4C61-A6F1-B602DD250010",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CFAF51-B5E7-4553-BA3C-A348602FFB54",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E8F53E9-E466-4DEB-828F-57521E93831E",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C897D930-A028-4B61-8B13-B10412B5C4E5",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEF95CAA-EA21-487F-B519-9C171FB76DB1",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61ECF32F-D3ED-431D-B5AD-DB41F48DE6D5",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E90397B5-E99A-46CC-B477-2E467AC3133C",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EC0AB5-2605-4B1A-AA8C-C1E16A9BB441",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65238A4D-3CFE-4CB5-BC92-BE79C2F1CCC0",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53CD4704-9DF7-4C82-9D91-2CA2A217B760",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03D002DA-1AC3-4648-8F70-899985A661DB",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C3361C8-6A46-42FB-92B9-434E30C434DF",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1611DAC1-42B9-4844-B382-28175E92F17B",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0860456F-4527-45FD-BC45-1AA2D77ED782",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A06E69FB-69F8-48EB-96A5-BB8CCCCA7738",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA390EBD-EA03-41CF-8DC5-0E48B504F46C",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5D2C109-1F37-4F56-A75C-B6FC48DCF590",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38724B36-783F-4BCB-B134-F32C941D5A50",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8305353E-DC47-4438-80E7-051625BAD735",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF317B7-DA9F-464A-968C-336D41254367",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A78E85E-62CE-4789-A75C-9144F7DCDDE8",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB46396-3A4D-4A47-90EA-225BE1676568",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81CF7414-A410-42FF-A40A-040A390C760D",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz basada en web de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz basada en web. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por el usuario mediante la interfaz basada en web del dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un enlace malicioso y luego acceda a una p\u00e1gina de interfaz web espec\u00edfica. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en navegador."
}
],
"id": "CVE-2019-12718",
"lastModified": "2024-11-21T04:23:25.923",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-10-16T19:15:11.973",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-12636
Vulnerability from fkie_nvd - Published: 2019-10-16 19:15 - Updated: 2024-11-21 04:23
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FFD9F9B-22C3-4F52-8474-0DD7543CADF1",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29DE29FE-8FF3-4A08-80B6-3FB03DF5F305",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19A5CBC1-BB3F-4751-81B4-B40A682D7EEA",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3436DB0-18FA-486D-BAF7-92F1D87AFD28",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D30728E0-E8B8-45DB-9421-B5ACD50B1A97",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3208F54F-21C5-49EC-8FBF-03BAD10742EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67809B1C-8B06-4473-84B4-DBCD99AC1779",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E53BBA48-B11C-4E85-9257-61ECE5389CDE",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60EF4E-A3A3-4E33-9561-BC8259062C2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDBA6F78-8754-4D1B-9A60-1C19568093BE",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98523586-0F3A-4B62-A972-8E9BA4F0DC4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E7B6BDC-2BCA-428B-82E8-E083F3661358",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CD3BA54-85D9-4688-8B90-612F96D452A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08287D78-F7B0-4CB1-B719-86DB482C3CDA",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95AD5321-1F1E-4699-8FBE-E9B04505092F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23B51027-95E5-443F-91F5-93D7B3B3320F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFAE9706-8B37-4231-B4D4-CA6F527446E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "603D9E60-CBDF-4ADE-AB2C-903B412DE294",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFEB361-1986-4522-BC23-06140F8D2625",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33FBBFDA-5279-4429-BFD5-27669148DB8C",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BDC341E-FA7D-4B90-A5AB-E41822E16385",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2B9BC01-193F-402B-8A18-ED5C897C23B6",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C835D1DE-A639-4CB0-947B-988C89ABED5D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "824D4FDE-7D99-48B9-8F50-9C8DF4E5AD2A",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5D8296-7B6E-4880-8C5F-D7293118CE5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04E7ACB2-3D3B-4435-865A-3A1DB5AD055D",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F6551D-9188-44C6-8101-306D8077C0BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "410EAAFA-771D-4151-9583-D65AF0D97A17",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27D4259-24AA-4F4F-AC82-53D8BFAA303A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFC9FA4-0DD2-4134-B9E7-D30B2AE45C8A",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "393E2CBA-BF91-4AA7-B014-AE9808EEDD3E",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412F1F7B-6348-40A0-8C04-D4C6B46B3E5C",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7869C8D8-D110-4B91-87B7-D17BF4147A49",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59B4F469-A2D7-4B86-BC0A-121A4E4DB193",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4634D2E-51B6-4C08-8309-CAD95CD54973",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "690B0EE1-C461-4A13-98D8-37CF5932E170",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8009A0BB-491B-417E-97F8-7AAA1B06DECD",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA56C16-C780-44B8-8C0C-63737C1C06F3",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9345DCEC-A026-40C8-A353-3A0469DC5DAA",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFF357BD-04F6-46FA-BB4D-8A7595449B74",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "603591D4-5826-42E6-A8B9-E6C3BAE781A2",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1546E74-1020-4F6F-B9CD-63BE041C73E7",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A48CA589-1D31-4F39-9F5D-9F28EB0D600F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65778A40-A33C-4035-8DE3-997D9FF5EE6C",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C01641-19E6-45FC-A359-93C9643ED565",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE57A25-5323-4D1B-BCD9-B68302068F12",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "070D7935-38B0-4568-8DA9-A8E28786A803",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F21AC1A-62EC-4575-9655-F215C283B276",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D355124B-6687-4D10-9277-7E39A3737E74",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F259F652-2F84-4868-A68F-DF331F6B02FF",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CEAE751-6B97-4A64-A8CE-DD109E40E9C5",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28B7FD96-9F84-467F-A3F3-9AF0190CA63F",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76A090DD-8C6A-4233-9E9C-6FB4A3B33FA0",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3279C13-02F8-4961-8D2D-A63B6B4FE12D",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A87FF9-BD82-454D-AE01-DCE5317DE0FF",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A015D614-E5C0-4E29-8293-776BB1A94D10",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E65353E8-9949-4C4B-932C-667279130E33",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D484F828-5CFB-4A61-BF53-B9F28ACCF6EE",
"versionEndExcluding": "2.5.0.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "162B0262-CE2C-4984-A6B1-B901E811B0CC",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D22DF022-C31A-495C-85A7-A2F8A16DC2EF",
"versionEndExcluding": "1.4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F748CFB2-6868-46CA-B8AA-79657290651E",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69C67F85-36DE-44FB-9DF0-E644563A479D",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E9523B9-EA3D-4F5F-9F02-95588F33DF2B",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4887364C-8016-4E81-AD98-02292515530F",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF0FFE0-20C8-4EA5-97E8-995727F0EEA8",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9189A85-A983-4ECB-BB63-997CCB5B4D46",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03C5F49A-EA97-4438-AA3F-6CB6673084E0",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DC6B24-4789-44BB-B34B-904F5652C2E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "304E4317-490F-4329-BDF4-17D6F58E2B6B",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01337909-675E-4A2D-9BB1-1AAEB310B3D5",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD67B0-489E-4900-9901-A08101E7FD7B",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D07311CF-09CB-469F-AEBF-DA57393571C3",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22791CAD-97C3-4809-966B-2B668A1A0C88",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD8A210-2AAA-4D89-899D-F6D7F52CFA68",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67135368-FCE2-4E02-ACB1-B142995EE812",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB290655-DD04-43FF-AD3B-D577BAC3EB98",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C711C1F-82CC-4D14-99A5-AF15CCCB0DBE",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1570F59-105F-4EA2-9A17-9184ADFD0BC3",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83843306-40D2-4C6B-B311-AAF996DC5487",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D90FD61F-73C5-4298-A731-CCF873D8A126",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F826EE5-537E-40E4-97D6-A47EAAD45DDB",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79B78222-F16C-4AA3-906E-8F3C4FED1630",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF36971-C8DB-4928-BA6C-820FAB0415D8",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D74E7B1-E028-4026-8B7F-D6BF2B64B5BC",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE0B00F-3C72-4148-B6B3-F25AE5104A6A",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDAF6815-AE1B-4469-811C-99603BDA4B40",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B873CED-C25A-473A-81BD-61D0A3BEA517",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "282C1426-C20B-45ED-AF2F-38D9901E896A",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4B57E1-A3F4-465E-BBCA-0430B75C1508",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30DC74C0-4461-4F04-84D1-04A10D06B012",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "566302E4-F223-4ABB-A94E-2EE6C0C14264",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E10B5CE-C9DD-4D9A-91A7-461F1B063C14",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C956CE3-F737-43E2-8737-AA539B8EC543",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F4A4F95-BC73-49FA-A1BA-2AEABA1FFBFF",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7311EFCD-9CB5-40A0-AC79-2D19E09EA19D",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66EF4196-6F2B-4911-939F-334862DF1439",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E78D5D88-A668-4303-A523-3B9018CC1922",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8573615D-0184-46A5-B3AE-3EC7D4727EF5",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CD2BA73-6000-4C87-9592-928CED0660EE",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABDA8FC6-99FE-45DB-807B-34CE9438A325",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E688048-EC49-4718-A444-10ECFD21F991",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A4E845-CE5C-440C-90D0-26C09780633B",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9826258A-7473-46D5-82F1-6E6CF56091E7",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F310AAE-76BD-4EC7-8A39-B17590A5840F",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15C7F635-741F-4F78-9172-A4D16CDDCE95",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F416E8B0-1F92-437B-B957-CE0BFB70CA83",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97FE7A0F-C4E4-4061-B39D-5C97CD113444",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF14DB-59CB-4D71-A9AE-136E6681F791",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1FE2CA2-4B6C-48A5-9915-B948DB45515A",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19D28C77-3C6A-4ECE-9771-5B85735047AB",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9337A7-28EA-43FC-9CDC-E345A0D568EE",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "974278E7-129D-4624-AAC9-F4BECE9A8CEA",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52B4A2D6-D576-418C-A0CD-42D03D807688",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA5F64-87D7-4A52-AD3A-24CA521C3C89",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DC622F-17C7-4635-860D-9AED963FAF1E",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69B492B1-C84D-42CD-BBF9-07920E95D709",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A9711C6-C647-4AB4-AE9B-9F156C59077A",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0373D61C-E076-47E2-9E5D-C88AC16B6F7F",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B512E8B-146D-4E6C-A0F3-1ADBCC9F146D",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10BB8F85-6D17-4C00-B4A9-EF5D5C677FFC",
"versionEndExcluding": "1.4.11.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Small Business Smart and Managed Switches, podr\u00eda permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site request forgery (CSRF) en un sistema afectado. La vulnerabilidad es debido a las insuficientes protecciones CSRF para la interfaz de administraci\u00f3n basada en web en un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que siga un enlace malicioso. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante realizar acciones arbitrarias con el nivel de privilegio del usuario objetivo. Si el usuario cuenta con privilegios administrativos, el atacante podr\u00eda alterar la configuraci\u00f3n, ejecutar comandos o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado."
}
],
"id": "CVE-2019-12636",
"lastModified": "2024-11-21T04:23:14.233",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-10-16T19:15:10.987",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-1806
Vulnerability from fkie_nvd - Published: 2019-05-15 22:29 - Updated: 2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "158C8920-8291-45A9-9D0B-EFD336C6173B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD69957-B714-406D-9775-92A7D993BAC6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D30F5D73-F421-45BC-B0B6-314D95333ABF",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8723C660-F052-4C9B-ADD1-8484C7209701",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8BAB8D-715F-4144-B224-9EC5B71C849A",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D21DCD62-38AE-483E-A807-ABA90D6F7642",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFED2B8-060D-470B-B19F-3134E2BAF915",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCDFAA9-6F1A-40A7-8C18-729B6676496B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E410FC08-9222-48FC-8F79-2F8413B8570B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3F7191-465B-44BD-AC81-897684BC17AC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2374880-D2E6-4750-8266-B282B446021C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17FB5C8D-F3A3-4C76-B721-37157B45CAF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "842B9A79-D574-41EB-8027-9038FC0E3F64",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B12D57C7-8A54-4124-8E1E-37F03A5C985C",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53AD939F-CD46-4127-BED2-C90D9219367F",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "548424AC-7644-4FEE-88A7-24C7E7F814A1",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2203C60A-0069-4F5A-AAD7-BA99A45DC779",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF4A347-A9EC-443D-8244-9CCF18E857C3",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCE45D7A-2724-45C3-A41F-9E38D37932C5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E99E251-5F53-4968-85BC-A0EFA7891917",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F09CCE38-1E2B-4BD1-96B0-535A51BD698E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB8399A-B1AD-4201-9A85-AE332F8D46DC",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71C37F67-8132-4A19-A702-7B6C60F9897E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13DBAA04-CE95-4549-9457-4900AB3D1A8E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4490464D-BAC7-489C-A2C1-4971AC8B7F54",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF659800-49AB-4416-B6F3-FF5F8F41C72B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC0FB45-E376-4EFF-8866-2E42494296BB",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3623874C-7E67-40AF-A094-499E1857D048",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E417898B-0AE2-45AD-944A-9EE6D806CD8E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23356E45-B7B2-4A32-B821-D1C53D3FD6A5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB5362A-022F-42F8-AD49-C2557243B972",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1175B98B-DFE3-4A48-A453-80FA643EBD35",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "991DA0D7-7142-4EC1-8991-195D2F5D0B31",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC93E7A-6055-49E6-AEC7-F819113D902E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "645781BB-E440-42F9-9369-495366447B30",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB911D6-F531-42DC-9537-B7DF20A09CE3",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C758954B-BCD6-4C06-844E-C0FB1626D024",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57E6CA13-6231-4722-90DD-4495F4C10E0B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DEB673A-B39B-49DC-9CF0-D1E636068E75",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "107F975E-EEE4-4F40-BDCF-9E5F86528982",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91AF6345-7D52-4467-9864-C63F888613AF",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94B2FC17-14E6-41C9-B3B2-D8791EB1379C",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28EC4789-E1D6-47A4-A92B-0F6196688159",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4A9255C-6562-4DBC-A42C-D5D74FA948C5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52978A27-0D0E-4DB8-B988-D5E6F608DC1B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38531BE0-3233-44F9-9F91-74A479CA27C5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB87CFE-3151-4473-A006-258325F2E079",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el procesador de paquetes de entrada de Simple Network Management Protocol (SNMP) de Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches podr\u00eda permitir que un atacante remoto autenticado provoque la aplicaci\u00f3n SNMP de un dispositivo afectado para detener el procesamiento del tr\u00e1fico, lo que hace que la utilizaci\u00f3n de la CPU alcance el cien por ciento. Puede requerirse una intervenci\u00f3n manual antes de que un dispositivo reanude las operaciones normales. La vulnerabilidad se debe a la validaci\u00f3n inapropiada de las unidades de datos del protocolo SNMP (PDU) en los paquetes SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete SNMP malicioso a un dispositivo afectado. Un aprovechamiento exitoso podr\u00eda permitir al atacante hacer que el dispositivo deje de pasar el tr\u00e1fico, lo que podr\u00eda resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Cisco ha generado actualizaciones de firmware que abordan esta vulnerabilidad."
}
],
"id": "CVE-2019-1806",
"lastModified": "2024-11-21T04:37:25.137",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-05-15T22:29:00.247",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108335"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108335"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-1859
Vulnerability from fkie_nvd - Published: 2019-05-03 17:29 - Updated: 2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F26E3FE7-D289-4B77-B21A-F52B251570ED",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DC8656-4A5B-499C-A929-41D143010B48",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "577A47E0-77CA-4DCF-AC10-F47DD7DE8C48",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9D6D19-275C-437D-AE48-FBC8335E03C9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A44AF7A-62E4-41A7-836D-06A2736B8127",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBE35256-0B87-4C1D-915A-E34DAA6772E1",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A26421F1-8EE0-460F-A3E3-C3714F129A13",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64AED79F-7321-4A57-80AD-7B186AC1904D",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C729335-3E5C-43DB-9DB5-300A1C2DA4F3",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83310D13-587A-400F-B1B6-58D9C3220D3C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3812C044-AAE0-4947-8814-42AB027FA25C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F09091AA-3F14-4F0C-93CE-52057B592EFF",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACE36DF5-EAE8-4930-AD40-1CBCF5D7ED53",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749CB002-2803-4CD9-8E86-40D597C1FD06",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D9704-E3B8-4CF7-95ED-377401763CEC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02FFAFD4-2C33-458D-80BF-CEE6359A9B10",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7683ED86-436C-4EF4-96E0-FD9FA3DAC390",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04107C2D-731C-4F63-942B-725A478EDF2A",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "366DBF40-ECAC-4D77-A729-3393A207CA55",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5225175F-DA64-4807-955C-88136EFC1887",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B244259-7051-4205-818E-19D05CACD0B9",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F74383D9-2C00-4BFD-B0FC-DDF2EF127526",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04C2E571-AB33-4912-B62C-A58EB4DC6937",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "368AF76C-AA91-4DDB-BB72-6A975C79E59E",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "510EECC9-432D-42DC-96F2-CF965FB193BC",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4237E2-3C18-4C51-8636-8D8BAC324956",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC82A2D4-5127-4EB2-A4D1-150A63E8D031",
"versionEndExcluding": "1.4.10.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "842B9A79-D574-41EB-8027-9038FC0E3F64",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B12D57C7-8A54-4124-8E1E-37F03A5C985C",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53AD939F-CD46-4127-BED2-C90D9219367F",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "548424AC-7644-4FEE-88A7-24C7E7F814A1",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2203C60A-0069-4F5A-AAD7-BA99A45DC779",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF4A347-A9EC-443D-8244-9CCF18E857C3",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCE45D7A-2724-45C3-A41F-9E38D37932C5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E99E251-5F53-4968-85BC-A0EFA7891917",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F09CCE38-1E2B-4BD1-96B0-535A51BD698E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB8399A-B1AD-4201-9A85-AE332F8D46DC",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71C37F67-8132-4A19-A702-7B6C60F9897E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13DBAA04-CE95-4549-9457-4900AB3D1A8E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4490464D-BAC7-489C-A2C1-4971AC8B7F54",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF659800-49AB-4416-B6F3-FF5F8F41C72B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAC0FB45-E376-4EFF-8866-2E42494296BB",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3623874C-7E67-40AF-A094-499E1857D048",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E417898B-0AE2-45AD-944A-9EE6D806CD8E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23356E45-B7B2-4A32-B821-D1C53D3FD6A5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB5362A-022F-42F8-AD49-C2557243B972",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1175B98B-DFE3-4A48-A453-80FA643EBD35",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "991DA0D7-7142-4EC1-8991-195D2F5D0B31",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC93E7A-6055-49E6-AEC7-F819113D902E",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "645781BB-E440-42F9-9369-495366447B30",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEF14AB-1A92-4FAE-B8AB-CE08BD23626B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7555C1-DDEB-4E50-A19E-A76FB9E38DE9",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13ED47EC-DF8C-492D-915E-37D81B29F6AA",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F03E3B0-B272-419F-AB11-8D4D932D26B7",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51C774AC-3F98-4DB2-B022-1CA00461293D",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4FCF7D-2669-4615-A35A-8FEE133DC93C",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F48B631-F727-497F-B139-54174DA63EAA",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5D6EC8-B27C-412C-9A52-DB596BA4A4F3",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7463A23D-539F-485E-8C99-75D7F2E6A19F",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1C0736-BDCF-4028-899E-985DFBABB6D6",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB911D6-F531-42DC-9537-B7DF20A09CE3",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C758954B-BCD6-4C06-844E-C0FB1626D024",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57E6CA13-6231-4722-90DD-4495F4C10E0B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DEB673A-B39B-49DC-9CF0-D1E636068E75",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "107F975E-EEE4-4F40-BDCF-9E5F86528982",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91AF6345-7D52-4467-9864-C63F888613AF",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94B2FC17-14E6-41C9-B3B2-D8791EB1379C",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28EC4789-E1D6-47A4-A92B-0F6196688159",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4A9255C-6562-4DBC-A42C-D5D74FA948C5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52978A27-0D0E-4DB8-B988-D5E6F608DC1B",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38531BE0-3233-44F9-9F91-74A479CA27C5",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB87CFE-3151-4473-A006-258325F2E079",
"versionEndExcluding": "2.5.0.78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el proceso de identificaci\u00f3n de Secure Shell (SSH) del programa Cisco Small Business Switches podr\u00eda permitir a un atacante omitir la autorizaci\u00f3n de certificado del lado del cliente y volver a la autorizaci\u00f3n de contrase\u00f1a. La vulnerabilidad se presenta porque OpenSSH maneja de manera inapropiada el proceso de identificaci\u00f3n. Un atacante podr\u00eda atacar esta vulnerabilidad al intentar conectarse al dispositivo por medio de SSH. Una operaci\u00f3n con exito podr\u00eda permitir al atacante acceder a la configuraci\u00f3n como un usuario administrativo si no se cambian las credenciales por defecto. No existen soluciones disponibles; sin embargo, si la identificaci\u00f3n de certificado del lado del cliente est\u00e1 habilitada, desact\u00edvela y use la autorizaci\u00f3n de contrase\u00f1a segura. La autentorizaci\u00f3n del certificado del lado del cliente est\u00e1 deshabilitada por defecto."
}
],
"id": "CVE-2019-1859",
"lastModified": "2024-11-21T04:37:32.957",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-05-03T17:29:01.500",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-15439
Vulnerability from fkie_nvd - Published: 2018-11-08 17:29 - Updated: 2024-11-21 03:50
Severity ?
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/105873 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105873 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0219D69-91AE-4558-BF12-93BB82D74A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03699C15-D612-4CEC-923C-7E69CC6F6C79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82842273-F24B-4210-8E07-5F7253018FC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48A444FC-D2A5-4847-B616-F5E729F10C75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E81B93-C7DB-4CC7-9FEA-914C853411B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1196E58A-FF08-4086-8B89-42DF19A3E2B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A30A529-9796-4D10-AE55-698930E95CD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9702EE3-E077-4F70-AD90-EFD168BFCCBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0ACAD62-EA73-494C-8244-541642C3E397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE91F6B0-635D-48B3-BBB2-C9A6AC367815",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD5CDA0-F982-492B-B631-6B0958F82A7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5A806E-4E9F-45D2-936F-F9416342FBA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D173967C-5FF3-49DE-863B-26F7DF8B5F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "335CA93E-604D-4060-9D24-E4E9D7740A3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB844823-174D-487B-A211-E650D638A010",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE54B823-D772-49CF-9BA4-D8056C31A915",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "471C22F3-B110-46E4-BA52-8FDA4412EA0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A8518B-EE72-4CEA-B2A8-9F17898F4476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC963AF6-F648-4A5B-84C6-1D5823222527",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A349B-73D2-4010-90C2-B153B3245487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47341322-B516-4957-8CC0-5F34D8983937",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19F27801-DCF0-4843-90F8-2A1694BB29E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB592B62-F1DE-4BF5-A975-345483C37949",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12AEA51-CF3B-44CC-9943-E370A29EFDC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BCF751-3356-41C4-811E-B7CF56E63A7E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AFA3D3-E364-46B6-A93F-04A75CB77558",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F13F3D35-4661-4E09-A970-F6AEC950ACC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B78DFA9D-05FD-404C-8546-86DC2A7F306C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26514DC-FD8C-416B-AA7E-F62208F5E5E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBF6EC3F-225D-48B5-82C6-9559BE0B653F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DCC3DF9-71EE-4503-92E2-74D19DD8478B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "582CD84B-C24D-43DD-8000-CA9BD41771DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "257121AF-7D08-40FC-BC75-BA0E29246B16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "731E458C-B7AA-437A-AA22-023AE746044A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE8C75E-5727-43AA-8F27-9368C60C1DD1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "375B4C7B-4A60-4CCD-8656-C674D734FA10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2537192-BED2-4B18-966C-E10F155ED1CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E280C1-B685-4813-A8B9-4A654FA3222B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D82748-7475-4E94-928B-05D45D7AD2F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B39775-5AAF-4A0B-83E7-D6102D75C404",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22A19260-8730-42E6-B7B4-DCC7BEA6274F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEA9482-67E6-4E6B-8A45-24908BB40C1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3012AD17-508E-4860-897B-4F9644BFEC03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BE2BCF-A130-449B-B50B-0D5414DDD18C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30AA113A-4967-4554-8AE6-BA51C9A5F2C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E1FAC9E-45D1-4CB9-9BB2-389427199D52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6035EA-0F55-4C76-9E2F-DD4938576D1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A93E7F-A05D-4617-9BB9-6962CDB08AE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E534B2-12EA-489B-A939-4F1965B5EC66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F73C16B-814C-447E-84C2-893B9ED90693",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E4A156-2BF5-4F65-916C-E94AD6F899A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C0F8958-8059-411B-86C8-40B1073C80C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "218D6018-551C-46B8-AE27-F88E6052F37B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A1075B-47F6-4361-9FAC-4FCE932ED61D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB8DE78-E398-458B-98EF-EEEB6E219BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4EE51C-F69E-412E-BE53-00B377564D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E443C685-F000-4F89-ADEA-7084138018D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48E2C7ED-765A-442D-8FC6-5D769AD05251",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0779C5EE-C145-4C28-8F60-EE692409102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1431252-1FAE-4492-A7C4-69D47BBEB228",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40273E59-7C60-4094-B9FC-A633A2F23E61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E2FD03-6870-466F-9389-6D044BAC5DA7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14A201E5-0603-4C96-8F4B-87934B7B99D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA293370-953C-42ED-BF25-4C439A8D986A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0093FE2A-3D4C-4435-AE35-D213C9700771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B7BB55-2872-411F-8E0B-EED8746FA013",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B84D71EE-64CC-4966-98D1-C0697816120A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99C3C2-0B98-4108-8102-80132BF47A32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF693F4-E085-43E1-81CB-F4365E173FFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF0F571-4139-411C-9E9F-4974AB9ED29E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3521F951-DA4C-48C9-8FD0-CAD4328E61F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "850829DF-9613-4E1A-9D9A-A74D3AD8BA14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37654BAD-A965-4680-9496-2527CC20574F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C050FFC6-FB6E-4AEC-830A-856B9E728D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDCF275-D322-4551-B072-CAE85047759A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB3C8A5-8918-48A9-A8FB-12F0E694247B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD64ED9-F8FD-4C26-82F9-C4D84D14681D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C733117C-BFAE-459D-A9E2-5082C77A4D22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBA145A-98C6-494C-A488-37122AC62C91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B94C85-629E-4911-B55E-53B6D86BC603",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72500D80-4EC8-4B49-8C22-FA19E03491DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A0D3C4-B134-4709-BA6B-1D376A7D4696",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "027E1D98-A934-47E3-A3CA-813C3E581A58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8407005-2954-482E-A2BE-64FA81DB8C82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B91858-B62B-4EB8-86F4-E16A2FE2E38E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04F3DD74-DD70-4154-854D-C125A3065735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7885727C-5100-49A7-909F-D4DF545BF65D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14F3604E-EC92-48A8-A0BB-AC848AF188CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E933E3-12C4-48A7-80A7-BD3C6D99F21E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39ED032-60A6-4CF4-8BAD-9882168BC0D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4310B268-A950-4214-806B-2E2C5C85546C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9744BB70-191D-49D0-A03A-0B97187CACB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF81119-6931-4423-BC37-085C772165DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2D71F-2DD4-486B-8843-92CA3672B95E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8915A14C-5C9F-443C-95CA-A3DBBEFAE8C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D555470E-9E28-4F37-BD09-EC789788772E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A655D736-2E6B-4DA0-878D-419B17DB6C9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79843C24-2CE8-4040-9C04-79902D8F741D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4C8F8F-F914-48A7-B47B-2F1EFE8F7605",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD650E51-E248-4CFD-8163-72717B66D675",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F44E170A-2F71-4112-9793-BDE10341A485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B36A173-5C14-4B38-B3DD-CD83B19AF94B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EADF9B5-CE67-4148-8AF1-200CB1087A28",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4432E33-8F3C-4C51-8AE3-C53333A867E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD46C00E-FFF2-4881-A86C-87676DA895D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500F9351-FA0C-4648-A2A6-ACFF6C8FD157",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33C6CC27-465A-4B48-B910-4AE704296BE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8122322F-6104-4978-9E00-40437365FF67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505929A2-38FD-4DE7-A545-17304C97F5C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11548FB9-ADB1-4281-B89B-6D61836072DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1AF8D7A-0138-4369-8134-369CE4F5B83C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF58ED1-AECE-435C-8F8F-6053C44E01C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF16C957-3898-40E8-89E8-68C4D11A7438",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9646CE32-97B0-4708-B9DC-54419898E5D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2DE3B15-DD70-445E-936C-0C9D5C3F1450",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "465EF5CA-3AD1-4727-B245-3C69E28E02F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65522C-E250-408C-8A89-AFE4909804D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CEFE6F1-4F0F-4A61-A9D2-AF2EF6A4BCB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620FE5-567B-4B78-910D-14819E2CDE3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E6130F-046E-4F43-9B33-1E2F78DA838D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA8A38-C545-49AA-812F-8668EED9B23D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4BE80B2-F273-4336-897B-C67DCB8E2DFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F986FD6-A139-43CA-9D83-40CAA8D62B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82562C7C-8DC8-4D67-8FB8-DFC3CD034127",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB21D371-D443-40FE-8DFF-3DD4A9655471",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7033CCD4-DA36-4D4F-AC61-FBDA9D14ADB4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16458FAB-82F2-4BF7-834E-EAF425A55122",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879BE9-D4FA-4EEA-8852-B972299220E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A52FA3-1EBE-4A7B-99A5-99A4162EBC02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613300D2-A079-415A-B9F7-178B8048AA61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41B604A-8C7E-4A17-9D99-19638DE0C043",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA11905-1953-4EEB-95CE-3BDB619D0F72",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFDC3D1-2390-4D1B-B6BC-95757E56721F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D1DE6B-6E09-40CF-9507-867ECB183A30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-16ft_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E56D27-ED97-4D92-9EE9-37CFF223ACFD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9BEB5-78FE-49EB-92BE-6597E7608E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24ft_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E070A80E-D5DD-49BC-B1CC-54C37D89F1FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDE246-7DF9-486D-A5B9-5596FE0AC582",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-12f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B01E0FF-0EA1-4337-B95C-59E51A54E4DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D52D0E9C-FC04-4A45-81D5-A335B30F725E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82F86D1D-95DD-456C-BE0B-DF85FAF7E8F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAD50CE-8D02-4FD9-965A-7C14D146B52D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72FAB4B2-F4F7-43CE-B82A-5053CE65C658",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B39E214D-A4B7-460C-9402-8F94336B30A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sx550x-52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03407954-9170-46D1-BBFA-3479B51D9A87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "297A662D-BD11-4021-8F19-946CA4BCF8D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C06422E-173D-4650-A560-137E7B00763E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADB1D69-CBDC-4045-A806-087878560EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3E9EF2-9588-4EF4-AE3A-CCF10A962C87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81B88075-F579-492C-B87C-5E4291D269B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9BB1CC-974C-4739-BC55-AFAA8C27B16D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605B8DE5-56EB-4FFF-BC04-1B3A38762727",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E9723D-912C-4EAC-905D-C2AA20092F6D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C940275E-41A8-470D-AD97-AB6EC5A75CEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C25D316-9228-41E8-96CA-8CBF38855701",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D863273-1BE8-4AC0-ABFF-58EF1597D363",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "967DCE55-B7D5-4D63-9693-B42FAA9243B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B2D902-C7E7-4EF7-B633-9FC9AA473010",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6BED3-2564-4A7C-91DC-F843E301A35E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C115DA7-6CEF-49EF-8E24-FA0A7DD050A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0090D8-7AB4-4BA7-A969-1C0C6B368B09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "219B048E-B61B-4C50-B345-FD25696CB764",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10E69DC4-C09F-4178-8037-29406F79BFF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C374EB87-A4C6-43FB-B42E-DEA973375EC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB77511-93E3-43D8-8D32-AABE27ADFB08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7534A5E0-742E-414D-BDC5-259D39159BB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el software Cisco Small Business Switches podr\u00eda permitir que un atacante remoto no autenticado omita el mecanismo de autenticaci\u00f3n de usuarios de un dispositivo afectado. La vulnerabilidad existe porque, en determinadas circunstancias, el software afectado habilita una cuenta de usuario privilegiado sin notificar a los administradores del sistema. Un atacante podr\u00eda explotar esta vulnerabilidad usando esta cuenta para iniciar sesi\u00f3n en un dispositivo afectado y ejecutar comandos con derechos de administrador total. Cisco no ha publicado ninguna actualizaci\u00f3n de software que solucione esta vulnerabilidad. Este aviso se actualizar\u00e1 con informaci\u00f3n de software solucionado cuando dicho software est\u00e9 disponible. Existe una alternativa para solucionar esta vulnerabilidad."
}
],
"id": "CVE-2018-15439",
"lastModified": "2024-11-21T03:50:48.200",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-11-08T17:29:00.607",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/105873"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/105873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-34739 (GCVE-0-2021-34739)
Vulnerability from cvelistv5 – Published: 2021-11-04 15:40 – Updated: 2024-11-07 21:43
VLAI?
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
Severity ?
8.1 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business Smart and Managed Switches |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:48.160Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-34739",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:42:41.130667Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:43:18.199Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business Smart and Managed Switches",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-11-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-613",
"description": "CWE-613",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-04T15:40:23",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
],
"source": {
"advisory": "cisco-sa-smb-switches-tokens-UzwpR4e5",
"defect": [
[
"CSCvx48953",
"CSCvx48962",
"CSCvx52310"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-11-03T16:00:00",
"ID": "CVE-2021-34739",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Series Switches Session Credentials Replay Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business Smart and Managed Switches",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-613"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
]
},
"source": {
"advisory": "cisco-sa-smb-switches-tokens-UzwpR4e5",
"defect": [
[
"CSCvx48953",
"CSCvx48962",
"CSCvx52310"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-34739",
"datePublished": "2021-11-04T15:40:23.357489Z",
"dateReserved": "2021-06-15T00:00:00",
"dateUpdated": "2024-11-07T21:43:18.199Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-15993 (GCVE-0-2019-15993)
Vulnerability from cvelistv5 – Published: 2020-09-23 00:26 – Updated: 2024-11-13 18:03
VLAI?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
Severity ?
7.5 (High)
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:03:32.724Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200129 Cisco Small Business Switches Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-15993",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:12:54.328085Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:03:35.211Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-01-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-16",
"description": "CWE-16",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-04-06T00:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200129 Cisco Small Business Switches Information Disclosure Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos"
},
{
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html"
}
],
"source": {
"advisory": "cisco-sa-20200129-smlbus-switch-disclos",
"defect": [
[
"CSCvr54104",
"CSCvs68748"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Switches Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-15993",
"datePublished": "2020-09-23T00:26:59.726175Z",
"dateReserved": "2019-09-06T00:00:00",
"dateUpdated": "2024-11-13T18:03:35.211Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3496 (GCVE-0-2020-3496)
Vulnerability from cvelistv5 – Published: 2020-08-26 16:15 – Updated: 2024-11-13 18:12
VLAI?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
Severity ?
5.3 (Medium)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:37:54.337Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3496",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:13:13.563970Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:12:35.608Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-08-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-26T16:15:54",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
],
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-tsgqbffW",
"defect": [
[
"CSCvt45826"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-08-19T16:00:00",
"ID": "CVE-2020-3496",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 250 Series Smart Switches Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "5.3",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
]
},
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-tsgqbffW",
"defect": [
[
"CSCvt45826"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3496",
"datePublished": "2020-08-26T16:15:54.968033Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T18:12:35.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3363 (GCVE-0-2020-3363)
Vulnerability from cvelistv5 – Published: 2020-08-17 18:01 – Updated: 2024-11-13 18:14
VLAI?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
Severity ?
8.6 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:30:58.380Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3363",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:13:14.723571Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:14:20.628Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-08-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-17T18:01:25",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
],
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-3bLk6vA",
"defect": [
[
"CSCvt45834"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-08-05T16:00:00",
"ID": "CVE-2020-3363",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 250 Series Smart Switches Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
]
},
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-3bLk6vA",
"defect": [
[
"CSCvt45834"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3363",
"datePublished": "2020-08-17T18:01:25.633674Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T18:14:20.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3297 (GCVE-0-2020-3297)
Vulnerability from cvelistv5 – Published: 2020-07-02 04:20 – Updated: 2024-11-15 16:57
VLAI?
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
Severity ?
8.1 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 200 Series Smart Switches |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:30:57.790Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3297",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T16:23:28.822227Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T16:57:52.709Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 200 Series Smart Switches",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-07-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-02T04:20:12",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
],
"source": {
"advisory": "cisco-sa-sbswitch-session-JZAS5jnY",
"defect": [
[
"CSCvt53117"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-07-01T16:00:00",
"ID": "CVE-2020-3297",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Session Management Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 200 Series Smart Switches",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
]
},
"source": {
"advisory": "cisco-sa-sbswitch-session-JZAS5jnY",
"defect": [
[
"CSCvt53117"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3297",
"datePublished": "2020-07-02T04:20:12.834539Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-15T16:57:52.709Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-12718 (GCVE-0-2019-12718)
Vulnerability from cvelistv5 – Published: 2019-10-16 18:36 – Updated: 2024-11-21 19:08
VLAI?
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
Severity ?
6.1 (Medium)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 200 Series Smart Switches |
Affected:
unspecified , < n/a
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:32:54.202Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-12718",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:56:14.761626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:08:32.647Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 200 Series Smart Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "n/a",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-10-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-16T18:36:30",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
],
"source": {
"advisory": "cisco-sa-20191016-sbss-xss",
"defect": [
[
"CSCvo28159",
"CSCvp35688"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-10-16T16:00:00-0700",
"ID": "CVE-2019-12718",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 200 Series Smart Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "6.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
]
},
"source": {
"advisory": "cisco-sa-20191016-sbss-xss",
"defect": [
[
"CSCvo28159",
"CSCvp35688"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-12718",
"datePublished": "2019-10-16T18:36:30.481193Z",
"dateReserved": "2019-06-04T00:00:00",
"dateUpdated": "2024-11-21T19:08:32.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-12636 (GCVE-0-2019-12636)
Vulnerability from cvelistv5 – Published: 2019-10-16 18:36 – Updated: 2024-11-21 19:09
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
Severity ?
8.1 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
unspecified , < n/a
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:24:39.194Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-12636",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:56:25.832896Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:09:59.032Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"lessThan": "n/a",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-10-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-16T18:36:26",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
],
"source": {
"advisory": "cisco-sa-20191016-sbss-csrf",
"defect": [
[
"CSCvo26471"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-10-16T16:00:00-0700",
"ID": "CVE-2019-12636",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 250 Series Smart Switches Software",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
]
},
"source": {
"advisory": "cisco-sa-20191016-sbss-csrf",
"defect": [
[
"CSCvo26471"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-12636",
"datePublished": "2019-10-16T18:36:26.757740Z",
"dateReserved": "2019-06-04T00:00:00",
"dateUpdated": "2024-11-21T19:09:59.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-1806 (GCVE-0-2019-1806)
Vulnerability from cvelistv5 – Published: 2019-05-15 21:45 – Updated: 2024-11-21 19:26
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
Severity ?
7.7 (High)
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco 550X Series Stackable Managed Switches |
Affected:
unspecified , < 1.4.10.6
(custom)
Affected: unspecified , < 2.5.0.78 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:28:42.821Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"name": "108335",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/108335"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1806",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:58:33.464072Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:26:01.587Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco 550X Series Stackable Managed Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "1.4.10.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "2.5.0.78",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-05-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-16T06:06:04",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"name": "108335",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/108335"
}
],
"source": {
"advisory": "cisco-sa-20190515-sb-snmpdos",
"defect": [
[
"CSCvn49346",
"CSCvn93730"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-05-15T16:00:00-0700",
"ID": "CVE-2019-1806",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco 550X Series Stackable Managed Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "1.4.10.6"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.5.0.78"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.7",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"name": "108335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108335"
}
]
},
"source": {
"advisory": "cisco-sa-20190515-sb-snmpdos",
"defect": [
[
"CSCvn49346",
"CSCvn93730"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1806",
"datePublished": "2019-05-15T21:45:15.994826Z",
"dateReserved": "2018-12-06T00:00:00",
"dateUpdated": "2024-11-21T19:26:01.587Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-1859 (GCVE-0-2019-1859)
Vulnerability from cvelistv5 – Published: 2019-05-03 16:40 – Updated: 2024-11-20 17:23
VLAI?
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
Severity ?
7.2 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 200 Series Smart Switches |
Affected:
unspecified , < 1.4.10.6
(custom)
Affected: unspecified , < 2.5.0.78 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:28:42.953Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1859",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-20T16:55:10.283596Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-20T17:23:10.627Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 200 Series Smart Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "1.4.10.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "2.5.0.78",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-05-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-03T16:40:16",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
],
"source": {
"advisory": "cisco-sa-20190501-scbv",
"defect": [
[
"CSCvo28588",
"CSCvp35704"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-05-01T16:00:00-0700",
"ID": "CVE-2019-1859",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 200 Series Smart Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "1.4.10.6"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.5.0.78"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.2",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
]
},
"source": {
"advisory": "cisco-sa-20190501-scbv",
"defect": [
[
"CSCvo28588",
"CSCvp35704"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1859",
"datePublished": "2019-05-03T16:40:17.005739Z",
"dateReserved": "2018-12-06T00:00:00",
"dateUpdated": "2024-11-20T17:23:10.627Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-15439 (GCVE-0-2018-15439)
Vulnerability from cvelistv5 – Published: 2018-11-08 17:00 – Updated: 2024-11-26 14:22
VLAI?
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
Severity ?
9.8 (Critical)
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 300 Series Managed Switches |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:54:03.462Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "105873",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/105873"
},
{
"name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-15439",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-25T18:54:41.981449Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-26T14:22:19.014Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 300 Series Managed Switches",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-11-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-11-12T10:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "105873",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/105873"
},
{
"name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
],
"source": {
"advisory": "cisco-sa-20181107-sbsw-privacc",
"defect": [
[
"CSCvk20713",
"CSCvm11846"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Switches Privileged Access Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2018-11-07T16:00:00-0600",
"ID": "CVE-2018-15439",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Switches Privileged Access Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 300 Series Managed Switches",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "9.8",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "105873",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105873"
},
{
"name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
]
},
"source": {
"advisory": "cisco-sa-20181107-sbsw-privacc",
"defect": [
[
"CSCvk20713",
"CSCvm11846"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-15439",
"datePublished": "2018-11-08T17:00:00Z",
"dateReserved": "2018-08-17T00:00:00",
"dateUpdated": "2024-11-26T14:22:19.014Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34739 (GCVE-0-2021-34739)
Vulnerability from nvd – Published: 2021-11-04 15:40 – Updated: 2024-11-07 21:43
VLAI?
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
Severity ?
8.1 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business Smart and Managed Switches |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:48.160Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-34739",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:42:41.130667Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:43:18.199Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business Smart and Managed Switches",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-11-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-613",
"description": "CWE-613",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-04T15:40:23",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
],
"source": {
"advisory": "cisco-sa-smb-switches-tokens-UzwpR4e5",
"defect": [
[
"CSCvx48953",
"CSCvx48962",
"CSCvx52310"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-11-03T16:00:00",
"ID": "CVE-2021-34739",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Series Switches Session Credentials Replay Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business Smart and Managed Switches",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-613"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5"
}
]
},
"source": {
"advisory": "cisco-sa-smb-switches-tokens-UzwpR4e5",
"defect": [
[
"CSCvx48953",
"CSCvx48962",
"CSCvx52310"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-34739",
"datePublished": "2021-11-04T15:40:23.357489Z",
"dateReserved": "2021-06-15T00:00:00",
"dateUpdated": "2024-11-07T21:43:18.199Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-15993 (GCVE-0-2019-15993)
Vulnerability from nvd – Published: 2020-09-23 00:26 – Updated: 2024-11-13 18:03
VLAI?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
Severity ?
7.5 (High)
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:03:32.724Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200129 Cisco Small Business Switches Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-15993",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:12:54.328085Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:03:35.211Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-01-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-16",
"description": "CWE-16",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-04-06T00:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200129 Cisco Small Business Switches Information Disclosure Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos"
},
{
"url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html"
}
],
"source": {
"advisory": "cisco-sa-20200129-smlbus-switch-disclos",
"defect": [
[
"CSCvr54104",
"CSCvs68748"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Switches Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-15993",
"datePublished": "2020-09-23T00:26:59.726175Z",
"dateReserved": "2019-09-06T00:00:00",
"dateUpdated": "2024-11-13T18:03:35.211Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3496 (GCVE-0-2020-3496)
Vulnerability from nvd – Published: 2020-08-26 16:15 – Updated: 2024-11-13 18:12
VLAI?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
Severity ?
5.3 (Medium)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:37:54.337Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3496",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:13:13.563970Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:12:35.608Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-08-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-26T16:15:54",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
],
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-tsgqbffW",
"defect": [
[
"CSCvt45826"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-08-19T16:00:00",
"ID": "CVE-2020-3496",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 250 Series Smart Switches Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "5.3",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"
}
]
},
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-tsgqbffW",
"defect": [
[
"CSCvt45826"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3496",
"datePublished": "2020-08-26T16:15:54.968033Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T18:12:35.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3363 (GCVE-0-2020-3363)
Vulnerability from nvd – Published: 2020-08-17 18:01 – Updated: 2024-11-13 18:14
VLAI?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
Severity ?
8.6 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:30:58.380Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3363",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:13:14.723571Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:14:20.628Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-08-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-17T18:01:25",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
],
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-3bLk6vA",
"defect": [
[
"CSCvt45834"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-08-05T16:00:00",
"ID": "CVE-2020-3363",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 250 Series Smart Switches Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA"
}
]
},
"source": {
"advisory": "cisco-sa-sbss-ipv6-dos-3bLk6vA",
"defect": [
[
"CSCvt45834"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3363",
"datePublished": "2020-08-17T18:01:25.633674Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T18:14:20.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-3297 (GCVE-0-2020-3297)
Vulnerability from nvd – Published: 2020-07-02 04:20 – Updated: 2024-11-15 16:57
VLAI?
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
Severity ?
8.1 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 200 Series Smart Switches |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:30:57.790Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3297",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T16:23:28.822227Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T16:57:52.709Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 200 Series Smart Switches",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-07-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-02T04:20:12",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
],
"source": {
"advisory": "cisco-sa-sbswitch-session-JZAS5jnY",
"defect": [
[
"CSCvt53117"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-07-01T16:00:00",
"ID": "CVE-2020-3297",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Session Management Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 200 Series Smart Switches",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY"
}
]
},
"source": {
"advisory": "cisco-sa-sbswitch-session-JZAS5jnY",
"defect": [
[
"CSCvt53117"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3297",
"datePublished": "2020-07-02T04:20:12.834539Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-15T16:57:52.709Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-12718 (GCVE-0-2019-12718)
Vulnerability from nvd – Published: 2019-10-16 18:36 – Updated: 2024-11-21 19:08
VLAI?
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
Severity ?
6.1 (Medium)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 200 Series Smart Switches |
Affected:
unspecified , < n/a
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:32:54.202Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-12718",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:56:14.761626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:08:32.647Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 200 Series Smart Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "n/a",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-10-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-16T18:36:30",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
],
"source": {
"advisory": "cisco-sa-20191016-sbss-xss",
"defect": [
[
"CSCvo28159",
"CSCvp35688"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-10-16T16:00:00-0700",
"ID": "CVE-2019-12718",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 200 Series Smart Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "6.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss"
}
]
},
"source": {
"advisory": "cisco-sa-20191016-sbss-xss",
"defect": [
[
"CSCvo28159",
"CSCvp35688"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-12718",
"datePublished": "2019-10-16T18:36:30.481193Z",
"dateReserved": "2019-06-04T00:00:00",
"dateUpdated": "2024-11-21T19:08:32.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-12636 (GCVE-0-2019-12636)
Vulnerability from nvd – Published: 2019-10-16 18:36 – Updated: 2024-11-21 19:09
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
Severity ?
8.1 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 250 Series Smart Switches Software |
Affected:
unspecified , < n/a
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:24:39.194Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-12636",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:56:25.832896Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:09:59.032Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 250 Series Smart Switches Software",
"vendor": "Cisco",
"versions": [
{
"lessThan": "n/a",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-10-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-10-16T18:36:26",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
],
"source": {
"advisory": "cisco-sa-20191016-sbss-csrf",
"defect": [
[
"CSCvo26471"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-10-16T16:00:00-0700",
"ID": "CVE-2019-12636",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 250 Series Smart Switches Software",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf"
}
]
},
"source": {
"advisory": "cisco-sa-20191016-sbss-csrf",
"defect": [
[
"CSCvo26471"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-12636",
"datePublished": "2019-10-16T18:36:26.757740Z",
"dateReserved": "2019-06-04T00:00:00",
"dateUpdated": "2024-11-21T19:09:59.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-1806 (GCVE-0-2019-1806)
Vulnerability from nvd – Published: 2019-05-15 21:45 – Updated: 2024-11-21 19:26
VLAI?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
Severity ?
7.7 (High)
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco 550X Series Stackable Managed Switches |
Affected:
unspecified , < 1.4.10.6
(custom)
Affected: unspecified , < 2.5.0.78 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:28:42.821Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"name": "108335",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/108335"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1806",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:58:33.464072Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:26:01.587Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco 550X Series Stackable Managed Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "1.4.10.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "2.5.0.78",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-05-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-16T06:06:04",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"name": "108335",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/108335"
}
],
"source": {
"advisory": "cisco-sa-20190515-sb-snmpdos",
"defect": [
[
"CSCvn49346",
"CSCvn93730"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-05-15T16:00:00-0700",
"ID": "CVE-2019-1806",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco 550X Series Stackable Managed Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "1.4.10.6"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.5.0.78"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.7",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"name": "108335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108335"
}
]
},
"source": {
"advisory": "cisco-sa-20190515-sb-snmpdos",
"defect": [
[
"CSCvn49346",
"CSCvn93730"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1806",
"datePublished": "2019-05-15T21:45:15.994826Z",
"dateReserved": "2018-12-06T00:00:00",
"dateUpdated": "2024-11-21T19:26:01.587Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-1859 (GCVE-0-2019-1859)
Vulnerability from nvd – Published: 2019-05-03 16:40 – Updated: 2024-11-20 17:23
VLAI?
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
Severity ?
7.2 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 200 Series Smart Switches |
Affected:
unspecified , < 1.4.10.6
(custom)
Affected: unspecified , < 2.5.0.78 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:28:42.953Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1859",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-20T16:55:10.283596Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-20T17:23:10.627Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 200 Series Smart Switches",
"vendor": "Cisco",
"versions": [
{
"lessThan": "1.4.10.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "2.5.0.78",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-05-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-03T16:40:16",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
],
"source": {
"advisory": "cisco-sa-20190501-scbv",
"defect": [
[
"CSCvo28588",
"CSCvp35704"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-05-01T16:00:00-0700",
"ID": "CVE-2019-1859",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 200 Series Smart Switches",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "1.4.10.6"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "2.5.0.78"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.2",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv"
}
]
},
"source": {
"advisory": "cisco-sa-20190501-scbv",
"defect": [
[
"CSCvo28588",
"CSCvp35704"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1859",
"datePublished": "2019-05-03T16:40:17.005739Z",
"dateReserved": "2018-12-06T00:00:00",
"dateUpdated": "2024-11-20T17:23:10.627Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-15439 (GCVE-0-2018-15439)
Vulnerability from nvd – Published: 2018-11-08 17:00 – Updated: 2024-11-26 14:22
VLAI?
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
Severity ?
9.8 (Critical)
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business 300 Series Managed Switches |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:54:03.462Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "105873",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/105873"
},
{
"name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-15439",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-25T18:54:41.981449Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-26T14:22:19.014Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business 300 Series Managed Switches",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-11-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-11-12T10:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "105873",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/105873"
},
{
"name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
],
"source": {
"advisory": "cisco-sa-20181107-sbsw-privacc",
"defect": [
[
"CSCvk20713",
"CSCvm11846"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Small Business Switches Privileged Access Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2018-11-07T16:00:00-0600",
"ID": "CVE-2018-15439",
"STATE": "PUBLIC",
"TITLE": "Cisco Small Business Switches Privileged Access Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Small Business 300 Series Managed Switches",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "9.8",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "105873",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105873"
},
{
"name": "20181107 Cisco Small Business Switches Privileged Access Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc"
}
]
},
"source": {
"advisory": "cisco-sa-20181107-sbsw-privacc",
"defect": [
[
"CSCvk20713",
"CSCvm11846"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-15439",
"datePublished": "2018-11-08T17:00:00Z",
"dateReserved": "2018-08-17T00:00:00",
"dateUpdated": "2024-11-26T14:22:19.014Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}