Vulnerabilites related to cisco - sx550x-52_firmware
cve-2017-12308
Vulnerability from cvelistv5
Published
2018-01-18 06:00
Modified
2024-12-02 21:46
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Small Business 300 and 500 Series Managed Switches |
Version: Cisco Small Business 300 and 500 Series Managed Switches |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:36:55.894Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12308", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-02T18:55:48.025220Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-02T21:46:39.725Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 300 and 500 Series Managed Switches", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Small Business 300 and 500 Series Managed Switches", }, ], }, ], datePublic: "2018-01-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-113", description: "CWE-113", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-18T05:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12308", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 300 and 500 Series Managed Switches", version: { version_data: [ { version_value: "Cisco Small Business 300 and 500 Series Managed Switches", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-113", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12308", datePublished: "2018-01-18T06:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-12-02T21:46:39.725Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3496
Vulnerability from cvelistv5
Published
2020-08-26 16:15
Modified
2024-11-13 18:12
Severity ?
EPSS score ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.337Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3496", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:13:13.563970Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:12:35.608Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 250 Series Smart Switches Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-08-19T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-08-26T16:15:54", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW", }, ], source: { advisory: "cisco-sa-sbss-ipv6-dos-tsgqbffW", defect: [ [ "CSCvt45826", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-08-19T16:00:00", ID: "CVE-2020-3496", STATE: "PUBLIC", TITLE: "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 250 Series Smart Switches Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "5.3", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200819 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW", }, ], }, source: { advisory: "cisco-sa-sbss-ipv6-dos-tsgqbffW", defect: [ [ "CSCvt45826", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3496", datePublished: "2020-08-26T16:15:54.968033Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T18:12:35.608Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1806
Vulnerability from cvelistv5
Published
2019-05-15 21:45
Modified
2024-11-21 19:26
Severity ?
EPSS score ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108335 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco 550X Series Stackable Managed Switches |
Version: unspecified < 1.4.10.6 Version: unspecified < 2.5.0.78 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.821Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos", }, { name: "108335", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108335", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1806", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:58:33.464072Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:26:01.587Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco 550X Series Stackable Managed Switches", vendor: "Cisco", versions: [ { lessThan: "1.4.10.6", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "2.5.0.78", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-15T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-16T06:06:04", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos", }, { name: "108335", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108335", }, ], source: { advisory: "cisco-sa-20190515-sb-snmpdos", defect: [ [ "CSCvn49346", "CSCvn93730", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-15T16:00:00-0700", ID: "CVE-2019-1806", STATE: "PUBLIC", TITLE: "Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco 550X Series Stackable Managed Switches", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "1.4.10.6", }, { affected: "<", version_affected: "<", version_value: "2.5.0.78", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.7", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20190515 Cisco Small Business Series Switches Simple Network Management Protocol Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos", }, { name: "108335", refsource: "BID", url: "http://www.securityfocus.com/bid/108335", }, ], }, source: { advisory: "cisco-sa-20190515-sb-snmpdos", defect: [ [ "CSCvn49346", "CSCvn93730", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1806", datePublished: "2019-05-15T21:45:15.994826Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:26:01.587Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3297
Vulnerability from cvelistv5
Published
2020-07-02 04:20
Modified
2024-11-15 16:57
Severity ?
EPSS score ?
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 200 Series Smart Switches |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:57.790Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3297", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:23:28.822227Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T16:57:52.709Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 200 Series Smart Switches", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-07-01T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-02T04:20:12", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY", }, ], source: { advisory: "cisco-sa-sbswitch-session-JZAS5jnY", defect: [ [ "CSCvt53117", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Smart and Managed Switches Session Management Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-07-01T16:00:00", ID: "CVE-2020-3297", STATE: "PUBLIC", TITLE: "Cisco Small Business Smart and Managed Switches Session Management Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 200 Series Smart Switches", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-287", }, ], }, ], }, references: { reference_data: [ { name: "20200701 Cisco Small Business Smart and Managed Switches Session Management Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY", }, ], }, source: { advisory: "cisco-sa-sbswitch-session-JZAS5jnY", defect: [ [ "CSCvt53117", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3297", datePublished: "2020-07-02T04:20:12.834539Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T16:57:52.709Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3121
Vulnerability from cvelistv5
Published
2020-01-26 04:31
Modified
2024-11-15 17:45
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco 550X Series Stackable Managed Switches |
Version: unspecified < n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:24:00.540Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200122 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3121", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:29:56.727357Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:45:38.991Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco 550X Series Stackable Managed Switches", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2020-01-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-26T04:31:22", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200122 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss", }, ], source: { advisory: "cisco-sa-20200122-sbsms-xss", defect: [ [ "CSCvs09313", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-01-22T16:00:00-0800", ID: "CVE-2020-3121", STATE: "PUBLIC", TITLE: "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco 550X Series Stackable Managed Switches", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20200122 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss", }, ], }, source: { advisory: "cisco-sa-20200122-sbsms-xss", defect: [ [ "CSCvs09313", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3121", datePublished: "2020-01-26T04:31:22.955259Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:45:38.991Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12307
Vulnerability from cvelistv5
Published
2018-01-18 06:00
Modified
2024-12-02 21:46
Severity ?
EPSS score ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102718 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Small Business 300 and 500 Series Managed Switches |
Version: Cisco Small Business 300 and 500 Series Managed Switches |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:36:56.096Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", }, { name: "102718", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/102718", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12307", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-02T18:55:49.326877Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-02T21:46:55.055Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 300 and 500 Series Managed Switches", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Small Business 300 and 500 Series Managed Switches", }, ], }, ], datePublic: "2018-01-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-18T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", }, { name: "102718", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/102718", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12307", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 300 and 500 Series Managed Switches", version: { version_data: [ { version_value: "Cisco Small Business 300 and 500 Series Managed Switches", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", }, { name: "102718", refsource: "BID", url: "http://www.securityfocus.com/bid/102718", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12307", datePublished: "2018-01-18T06:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-12-02T21:46:55.055Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12636
Vulnerability from cvelistv5
Published
2019-10-16 18:36
Modified
2024-11-21 19:09
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: unspecified < n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.194Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12636", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:56:25.832896Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:09:59.032Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 250 Series Smart Switches Software", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-352", description: "CWE-352", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-16T18:36:26", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf", }, ], source: { advisory: "cisco-sa-20191016-sbss-csrf", defect: [ [ "CSCvo26471", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-16T16:00:00-0700", ID: "CVE-2019-12636", STATE: "PUBLIC", TITLE: "Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 250 Series Smart Switches Software", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-352", }, ], }, ], }, references: { reference_data: [ { name: "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf", }, ], }, source: { advisory: "cisco-sa-20191016-sbss-csrf", defect: [ [ "CSCvo26471", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12636", datePublished: "2019-10-16T18:36:26.757740Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-21T19:09:59.032Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12718
Vulnerability from cvelistv5
Published
2019-10-16 18:36
Modified
2024-11-21 19:08
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 200 Series Smart Switches |
Version: unspecified < n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:32:54.202Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12718", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:56:14.761626Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:08:32.647Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 200 Series Smart Switches", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-10-16T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-16T18:36:30", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss", }, ], source: { advisory: "cisco-sa-20191016-sbss-xss", defect: [ [ "CSCvo28159", "CSCvp35688", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-10-16T16:00:00-0700", ID: "CVE-2019-12718", STATE: "PUBLIC", TITLE: "Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 200 Series Smart Switches", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79", }, ], }, ], }, references: { reference_data: [ { name: "20191016 Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss", }, ], }, source: { advisory: "cisco-sa-20191016-sbss-xss", defect: [ [ "CSCvo28159", "CSCvp35688", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12718", datePublished: "2019-10-16T18:36:30.481193Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-21T19:08:32.647Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-34739
Vulnerability from cvelistv5
Published
2021-11-04 15:40
Modified
2024-11-07 21:43
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business Smart and Managed Switches |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T00:19:48.160Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-34739", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:42:41.130667Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:43:18.199Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business Smart and Managed Switches", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-11-03T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-613", description: "CWE-613", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-04T15:40:23", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5", }, ], source: { advisory: "cisco-sa-smb-switches-tokens-UzwpR4e5", defect: [ [ "CSCvx48953", "CSCvx48962", "CSCvx52310", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Series Switches Session Credentials Replay Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-11-03T16:00:00", ID: "CVE-2021-34739", STATE: "PUBLIC", TITLE: "Cisco Small Business Series Switches Session Credentials Replay Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business Smart and Managed Switches", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-613", }, ], }, ], }, references: { reference_data: [ { name: "20211103 Cisco Small Business Series Switches Session Credentials Replay Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5", }, ], }, source: { advisory: "cisco-sa-smb-switches-tokens-UzwpR4e5", defect: [ [ "CSCvx48953", "CSCvx48962", "CSCvx52310", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-34739", datePublished: "2021-11-04T15:40:23.357489Z", dateReserved: "2021-06-15T00:00:00", dateUpdated: "2024-11-07T21:43:18.199Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3363
Vulnerability from cvelistv5
Published
2020-08-17 18:01
Modified
2024-11-13 18:14
Severity ?
EPSS score ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.380Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3363", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:13:14.723571Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:14:20.628Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 250 Series Smart Switches Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-08-05T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-08-17T18:01:25", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA", }, ], source: { advisory: "cisco-sa-sbss-ipv6-dos-3bLk6vA", defect: [ [ "CSCvt45834", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-08-05T16:00:00", ID: "CVE-2020-3363", STATE: "PUBLIC", TITLE: "Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 250 Series Smart Switches Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.6", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200805 Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA", }, ], }, source: { advisory: "cisco-sa-sbss-ipv6-dos-3bLk6vA", defect: [ [ "CSCvt45834", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3363", datePublished: "2020-08-17T18:01:25.633674Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T18:14:20.628Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6720
Vulnerability from cvelistv5
Published
2017-09-21 05:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/100933 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco Small Business Managed Switches |
Version: Cisco Small Business Managed Switches |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:41:16.614Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "100933", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100933", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Small Business Managed Switches", vendor: "n/a", versions: [ { status: "affected", version: "Cisco Small Business Managed Switches", }, ], }, ], datePublic: "2017-09-21T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-22T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "100933", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100933", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-6720", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business Managed Switches", version: { version_data: [ { version_value: "Cisco Small Business Managed Switches", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "100933", refsource: "BID", url: "http://www.securityfocus.com/bid/100933", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-6720", datePublished: "2017-09-21T05:00:00", dateReserved: "2017-03-09T00:00:00", dateUpdated: "2024-08-05T15:41:16.614Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-15439
Vulnerability from cvelistv5
Published
2018-11-08 17:00
Modified
2024-11-26 14:22
Severity ?
EPSS score ?
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105873 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 300 Series Managed Switches |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:54:03.462Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "105873", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/105873", }, { name: "20181107 Cisco Small Business Switches Privileged Access Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-15439", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-25T18:54:41.981449Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-26T14:22:19.014Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 300 Series Managed Switches", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-11-07T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-798", description: "CWE-798", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-12T10:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "105873", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/105873", }, { name: "20181107 Cisco Small Business Switches Privileged Access Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc", }, ], source: { advisory: "cisco-sa-20181107-sbsw-privacc", defect: [ [ "CSCvk20713", "CSCvm11846", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Switches Privileged Access Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2018-11-07T16:00:00-0600", ID: "CVE-2018-15439", STATE: "PUBLIC", TITLE: "Cisco Small Business Switches Privileged Access Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 300 Series Managed Switches", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "9.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-798", }, ], }, ], }, references: { reference_data: [ { name: "105873", refsource: "BID", url: "http://www.securityfocus.com/bid/105873", }, { name: "20181107 Cisco Small Business Switches Privileged Access Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc", }, ], }, source: { advisory: "cisco-sa-20181107-sbsw-privacc", defect: [ [ "CSCvk20713", "CSCvm11846", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-15439", datePublished: "2018-11-08T17:00:00Z", dateReserved: "2018-08-17T00:00:00", dateUpdated: "2024-11-26T14:22:19.014Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1859
Vulnerability from cvelistv5
Published
2019-05-03 16:40
Modified
2024-11-20 17:23
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 200 Series Smart Switches |
Version: unspecified < 1.4.10.6 Version: unspecified < 2.5.0.78 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.953Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1859", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:55:10.283596Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:23:10.627Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 200 Series Smart Switches", vendor: "Cisco", versions: [ { lessThan: "1.4.10.6", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "2.5.0.78", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-01T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "CWE-285", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-03T16:40:16", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv", }, ], source: { advisory: "cisco-sa-20190501-scbv", defect: [ [ "CSCvo28588", "CSCvp35704", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-01T16:00:00-0700", ID: "CVE-2019-1859", STATE: "PUBLIC", TITLE: "Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business 200 Series Smart Switches", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "1.4.10.6", }, { affected: "<", version_affected: "<", version_value: "2.5.0.78", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.2", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-285", }, ], }, ], }, references: { reference_data: [ { name: "20190501 Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv", }, ], }, source: { advisory: "cisco-sa-20190501-scbv", defect: [ [ "CSCvo28588", "CSCvp35704", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1859", datePublished: "2019-05-03T16:40:17.005739Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-20T17:23:10.627Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-15993
Vulnerability from cvelistv5
Published
2020-09-23 00:26
Modified
2024-11-13 18:03
Severity ?
EPSS score ?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business 250 Series Smart Switches Software |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T01:03:32.724Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200129 Cisco Small Business Switches Information Disclosure Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-15993", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:12:54.328085Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:03:35.211Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business 250 Series Smart Switches Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-01-29T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-16", description: "CWE-16", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-06T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200129 Cisco Small Business Switches Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos", }, { url: "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html", }, ], source: { advisory: "cisco-sa-20200129-smlbus-switch-disclos", defect: [ [ "CSCvr54104", "CSCvs68748", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business Switches Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-15993", datePublished: "2020-09-23T00:26:59.726175Z", dateReserved: "2019-09-06T00:00:00", dateUpdated: "2024-11-13T18:03:35.211Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2020-08-26 17:15
Modified
2024-11-21 05:31
Severity ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2330AAA8-F175-47B5-A9A9-67238AEBDD25", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2253CBA-D5A2-40C6-8B18-674EEDB5A499", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57E3C308-E217-494A-995E-15F7C04F61D9", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4B3D6F5-324A-4F4A-B395-8CBC956CA4AD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE0F8CF8-612F-4312-A4DB-43692AB39CA2", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "605D6944-BDEC-4115-8C29-5B4D48A4D0E0", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EA8E1BE-92DE-4E40-8695-DAAE18B117C7", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4540AE8E-506B-4CB7-87DA-1103ECBDD1E6", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "969ED439-D472-49F5-BCC4-CFE7B64C37D8", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A53E249-5130-4E33-B752-BE9C69B324E9", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D2C0C44-D5F5-442A-82F0-855D8303AA98", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A229DC3-70E8-4934-897E-234F9678AE70", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B5BC355-D395-48FC-A237-E9F690D451BF", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB6E6E94-C9A4-41AD-ADDD-022CAD8E944C", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F599B783-5D75-487D-8039-7D4514301F1A", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E3579AB-575E-45D1-97CB-BC9BF72747E7", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4A5B7-FE7C-48C5-B1B4-DCBF3ADC1610", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2DA0D6A9-5674-436C-84C4-8311CD527E93", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E55A74B-A9CA-41F6-8741-5D2C3F29B99C", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B149239F-0159-4F48-B06D-3004BA1394E0", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7EB2D042-C74B-4E6E-80D8-04E2E43425BD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3FFC06CF-B049-4168-A83B-78507AD8F4DD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D2B632BC-458B-4701-BD2E-D6A6F3A7E6DB", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD23D531-63DF-46DD-BF9F-9009829587C4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B83EFB88-38FA-414A-B86E-FF201BA80959", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6AFF5A9-EA0B-4BDF-8535-8168D83BC664", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76A80CEA-3971-40A3-91B3-8645C5CD6B35", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A70C6D0-D4D8-44C6-B615-37F420CEE10B", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E930941-9B3B-4A41-BD67-C5CCB1C9D9BD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C94E1974-468A-4126-9EB4-A02129959DBD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0121515-56D3-46F5-AC87-642F141D15EC", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7BE15464-4290-4B0E-B9AE-F26F7F47895E", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CABEBFCC-F22F-4610-B869-E7293441DB60", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0CDF41C9-6063-48E1-9B8B-4F1244D091EA", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DA9F7B7A-07B7-49C9-B8C7-A407240ED483", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D2F9F856-7EA8-4822-8EA5-4B0E71EE4A38", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7D4A841-F03E-41EE-8541-3688757C60B4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "121932D3-C347-4A39-948F-AFB7255ABAC6", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7551CE16-7308-41A1-A714-CC32D66D7535", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "296414E3-E79D-40A4-AD0A-3180B3A4EAA6", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81719D0D-C016-4F40-9965-ED8B8FBE58F1", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A2A7477-AB48-4751-9E86-1B4A51D7776D", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B02EB990-9D20-4FE5-8B60-8F71218387C9", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA40A1AE-2ABF-46A2-8CCA-68171FAEA616", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "47AFF05E-7F13-4197-9655-2255C994F5BD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "41C63AAF-B04B-4D27-8A80-97B6135107B5", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04C26AB7-762C-41A6-B646-1E3E07C1221B", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37A605BD-47EC-4E35-B6C5-915D0B7B9C7C", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "188E5C34-DE23-4B7F-902F-3382AABB7EC3", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2DFF4154-ECC3-40EF-B7EF-03C80652BFC2", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D454E120-20F6-49C9-B730-CC073CD3B47B", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2ECA4E1C-3384-410A-8C66-4BB0C5856601", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0459CBD9-D8D6-46A1-99C1-83F51E715267", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "078A0F4A-AC48-44B8-B112-ACF9DE807DEB", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6F427B1-D62B-42C2-96B6-F2A22832583D", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DEE7F347-78D1-49BB-A7D1-AD3F87DC6C7A", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1110D21F-7B01-4098-A38A-9B3A54604E0D", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE1B116D-89E1-452B-A3B8-EE5C6BA1A0A7", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "48E91FC5-A3C9-4628-8A16-E510A7B4A95D", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34EC217A-C8B3-4E78-B654-E83382CC1426", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04158003-F7A2-49D5-A135-EFB863CC6528", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DFD62997-1916-4205-806C-FFF5A4E3FD58", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "761B5A71-92DC-4051-AA4C-EB8482193698", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E6D6FAD-13E4-437B-A07B-D6D535413A68", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B70C2A7A-A458-4FE6-AECC-3A3718C6646A", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7B6684A-8F2D-4F19-9872-1680DD26E889", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35B5812A-DAF1-4CB2-BBA7-58E1E02D9153", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8A98916-8DB1-46B6-82ED-E7B1BA1AAB2D", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "614FAF10-501E-43B3-9B85-F40ABF146C27", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E49A6CF9-907C-4388-BCD7-4FDABD9D1610", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "337B23A0-E66A-4C82-9E57-002C2C4A2265", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24C4E926-A667-4A7F-AB5F-2417D77DFAD4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E41B85CA-59B5-472E-B555-F8ACEB8DB4E5", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22960F56-F3C5-4F1D-ADCF-A6ACF53AB798", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0837BE4D-999D-4933-AD2F-875EDAD8B6BB", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7177C86A-B8C8-40CA-8973-9CF1C3F103A4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E56236B2-D919-43FF-B3A8-90CD575D39BD", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EBF31396-F6E3-4B32-8DB9-0EF0BDAEF745", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CF861DE-B7C4-42C4-BE9C-22D5F9FA3EC4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EDFC783B-20D6-4EEB-B2C6-0E7E0A27DED0", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9563D3F-B6CE-4FC5-BA9D-D6C85C21A2F8", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A596AA5F-1260-40B5-874C-BAAA7B52C7B3", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1E857D8-F10F-4261-BE4F-B7A78740082C", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCA67989-A4AC-43B6-BCF5-4768F0B5D2B0", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A5524FE-CA66-4CE2-8B44-A84776397FAE", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34613F65-D402-4C06-BAC0-42CAEE0CA7F4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCBEFEF7-58C1-433F-84C3-63A189A93621", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F8EBFCDF-7D2C-42D5-AAE7-04E0FFEE1F1E", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AA07BC1-3357-4EEF-93B2-7087338B6606", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "73A8AB96-ED85-4587-962E-966329687EED", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED6617FB-15B4-4D1C-9E0D-AFD1108E0A41", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "048DDACB-1954-4AF0-A23D-0E394DC4497C", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6135300D-7C42-4766-A924-F72A611BCB9E", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DCD77A0-4104-4DE3-9134-743BFE69D752", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43805734-4F7B-4C3C-A359-508B22BCECA6", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C9A3713-5964-4A89-BB44-730E7DC9B7E0", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A717082-4B71-4FB2-BC43-113295F0008D", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "194CF955-EE25-41FD-B8F9-AE9E352C3F18", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAC9EE2D-6DE7-4574-BC73-76A5A04EB6B3", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77BCF729-31BA-48A3-B6A4-8E9D65F835EC", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C09948AE-1001-4E18-BDE8-7E127ED314E4", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EC5D0D6-9A6D-4BFF-AD6E-21755AC9F8C5", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B1A1966-7E47-48C0-AAA2-1F8E4F687BB7", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50B20068-195A-4C1E-B14F-ECD895693918", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA068C37-E9BA-4AD4-A198-ECB800779848", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "600B3B6B-6F5B-4983-95AE-D76BEA874E79", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE7449A1-9746-4000-96AD-D3F0145BAF8C", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB3F67B0-4D92-485C-B7CF-A42E68F81AC5", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44D5D35A-5B0D-4C36-9669-BD39E38A4A50", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED53CFCE-DB09-4723-8D81-63DAE92A9E25", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D74D0C6-1759-4DAC-93E0-AAE2D3101303", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6ED479AE-A874-47C5-80CE-9AB09D2DC8C8", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65E85B18-AB4B-4CCD-B66C-058E97352D6B", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "332789D6-834F-424F-BFA2-BC4FE3446923", versionEndIncluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.", }, { lang: "es", value: "Una vulnerabilidad en el motor de procesamiento de paquetes IPv6 de Cisco Small Business Smart and Managed Switches, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a una comprobación insuficiente del tráfico IPv6 entrante. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete IPv6 diseñado por medio de un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar que la CLI de administración de switches dejara de responder, resultando en una condición de DoS. Esta vulnerabilidad es específica para el tráfico IPv6. El tráfico IPv4 no está afectado", }, ], id: "CVE-2020-3496", lastModified: "2024-11-21T05:31:11.363", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-08-26T17:15:14.210", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-04 16:15
Modified
2024-11-21 06:11
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "596286D0-AFBA-4F1E-83D8-17B588BB2811", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7567AB0-4FE4-402F-8C8C-70D032FE6860", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F2447F0-9CE0-40A9-AF44-46D7C9BA8D7E", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F81EEF7-B9CD-41F9-BC56-BF70EB7367F5", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "851EFBA8-3D46-4F9C-9F1F-8F56897CF7AD", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "3208F54F-21C5-49EC-8FBF-03BAD10742EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DFC48CD0-89B4-4D5B-A8F4-F70EB72844E3", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "864E9DE0-4825-41DB-9C3E-63A5C54FBD17", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A60EF4E-A3A3-4E33-9561-BC8259062C2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1627EB2D-1C3D-493C-9888-84D2915E4131", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "98523586-0F3A-4B62-A972-8E9BA4F0DC4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CEF628BD-B574-471C-8F84-E1361F513731", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "8CD3BA54-85D9-4688-8B90-612F96D452A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45674B9A-59EC-49FC-A6F8-662A41FEE1F3", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C4D538A-2E11-49A3-9591-1826D496123E", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B23C961-4B85-4DCC-A144-654B9B51ADBA", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AFAE9706-8B37-4231-B4D4-CA6F527446E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B25B48B3-2840-49FC-941C-2DABE5A05D13", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "8DFEB361-1986-4522-BC23-06140F8D2625", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5A7D0F8-6A59-48AB-843E-90B470DCF208", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "3BDC341E-FA7D-4B90-A5AB-E41822E16385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "41801033-2A75-4B63-8F72-3F328AEB78E8", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C835D1DE-A639-4CB0-947B-988C89ABED5D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE521320-04D4-4246-B183-F09E34A39812", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "7C5D8296-7B6E-4880-8C5F-D7293118CE5E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C554DFB-9DE2-4DE1-B27E-87BDA9F16F83", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F6551D-9188-44C6-8101-306D8077C0BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A13F25D-2A7B-4057-866F-2C24164F589B", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C27D4259-24AA-4F4F-AC82-53D8BFAA303A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D294C12-5D11-457F-9927-712F6FBB0A0F", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-08:-:*:*:*:*:*:*:*", matchCriteriaId: "13AFF713-460E-4473-B3AD-7E60810170B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "55998FC0-29BF-47A3-8E15-76D7352089B6", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D8D38AC3-6868-45F0-BCEB-ED27496B57B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D61CB3A5-E5F7-492C-86C2-2EE02BE7CC74", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "27E11EB8-0F0B-4F13-82FF-5CC0687DAB93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "479CB74C-9849-4C18-9F29-A2CCEC13F76E", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0AC43002-020B-4B56-AD72-E5244DC617DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1390A51-B6D6-4C82-A3AF-6ACC5D227AE7", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-8mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E2269BC4-848A-4919-AC8E-4598FF56FCE2", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-8mp:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED48771-0D53-45B0-BBC2-53CCD36799FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D830E6-9393-4470-89E7-8FF9A309B306", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf352-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6657640-B1C5-4269-931F-10BBD3828237", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf352-08:-:*:*:*:*:*:*:*", matchCriteriaId: "2F35180C-09F4-4819-B86B-F0D47BF19C0C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf352-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54E36B87-80D8-4605-B44C-865F6C8C2CFA", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf352-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0609DA-22DD-4427-8CFD-B6B92194F948", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf352-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C34FCD5B-186F-41C8-9526-891654E09AE7", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf352-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "454941C5-6D05-4A8E-8FA3-5677382A5A4A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-8pd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3F184214-69DB-4A12-8B8C-E952F9D36100", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-8pd:-:*:*:*:*:*:*:*", matchCriteriaId: "65DB4BB4-FC16-4624-BE24-C8044FD109E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B36D4D29-74AA-464A-B356-D000269A8299", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "9713CB27-EC12-4AF4-88C5-5859EA1A82FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1EA2DC60-7D54-4741-BA0B-765EEC302C6A", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "7AE1BFE0-6B3C-4F57-85A4-86E58F2EBBA8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61B94B82-3864-4D9E-9FCB-B55CB0F51952", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "CF440F87-57D0-43F1-B5C0-7D944B5093D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "909B2F3E-C476-4E0F-8386-7AE3AD0451F1", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "AE95C121-A77E-4440-9051-C178927EC671", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3B58C94-2D1C-4C25-9B94-50FF7633D976", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-20:-:*:*:*:*:*:*:*", matchCriteriaId: "80D91695-7548-4498-8100-B7793CD8DB25", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "001982FC-9BB5-42F7-BA7F-23D23BF88C0F", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "4853BDD7-CBC7-48CB-9AAA-63323832B715", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2FC8D42E-7971-4DE2-87C1-4C6A1EF20DCD", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "88804D67-943D-4563-9225-F45092053DEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "654EDBEB-904D-4C44-87B5-46D06DFFB167", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "367BBC95-D9F9-4E12-8F73-83019FD728E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-28sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "557FED4C-060F-45A5-83BF-DB627E685822", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-28sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "F9369467-F70F-41DE-B231-5B0CECD44E9E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5EB81269-094B-4350-A5ED-816A2EB9B9D0", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-52:-:*:*:*:*:*:*:*", matchCriteriaId: "F9F021AC-9B57-48CE-AC46-6B542FAC0A9A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3ACEB47C-EB6D-4698-8BE1-A22E7F2504EF", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "ACEFF0F7-E3FE-4752-B936-BC353CB3EA23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2D45340-A737-46B1-9FF0-9BE1E586BB7F", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "F321BAE0-1207-4D7D-9F14-5DBFCE0EEA44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38F133EA-2150-44FC-A827-589FDF5A920D", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "7E131125-0F14-49D4-ACF3-D6E33E969422", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-8pmd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A78A6530-BDDB-4C13-8C23-1630A5A16B1F", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-8pmd:-:*:*:*:*:*:*:*", matchCriteriaId: "0CF7C1FF-A6DA-489B-8C34-13EE28D154AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-12pmv_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DFBA8CB-7380-4ED3-806C-9DEAFC673B1E", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-12pmv:-:*:*:*:*:*:*:*", matchCriteriaId: "3BA28B28-325F-42C9-AD1F-D6D8606DBA76", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ABB3F95E-36D4-4E8B-A08A-79A6A81335EC", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4E8C2F1-6075-482D-915E-E39156585638", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "546D6ABD-7344-425E-8271-F09288F7EBFD", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24pd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84A5151F-2E08-4BD7-A52F-3E557BD71722", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24pd:-:*:*:*:*:*:*:*", matchCriteriaId: "BA2C7F9A-72C9-4B3B-A6DB-712D8D9A52AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24pv_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91E66A1C-0AE7-459D-ADDE-749C63B652F5", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24pv:-:*:*:*:*:*:*:*", matchCriteriaId: "6BAF0D4F-5E2C-44FA-A01C-C1E79836D315", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F07E3B6B-AFD6-4AA3-97CA-032093E62A48", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EEB99488-B94D-47EC-B4B5-AAC1EAAC8E68", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB88198A-E2F7-4153-8F08-728446B3624D", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48pv_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD3FF7C0-44EC-4A66-A64D-4D39F79121E0", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48pv:-:*:*:*:*:*:*:*", matchCriteriaId: "D7C7B87F-644A-4C3C-9310-9E23F9DC0C16", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DC27DCE-0F09-4669-972F-595519F9C2CB", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9167C4D-B1DF-48EB-8241-1F0470E1E789", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79624863-203C-4B56-A2EF-8C008C6527CB", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0D8243D-E465-4ADF-BC06-E1FC12E24533", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx350x-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "686A33D3-C9E1-446E-9D23-CFDDA1710466", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx350x-08:-:*:*:*:*:*:*:*", matchCriteriaId: "05A43F14-4D2D-4332-BFA3-E9CB9805415C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx350x-12_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F64FF9DA-0B91-427A-A2DA-33E7BDE90D6B", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx350x-12:-:*:*:*:*:*:*:*", matchCriteriaId: "283995C0-94E0-41D9-8E0D-BCE3B619EB55", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx350x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "288DE710-8B6E-49F5-BEDE-E8B5A0DFE6B0", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx350x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "C12971B4-B9EF-42C0-A111-D782677186EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8867BFE6-11FD-468F-A9C9-3FA07DAA7EDB", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D5D73924-5725-490D-8A50-027CD78A375C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx350x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "377A866F-5DDE-440A-8EB2-ADE214D08AC0", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx350x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "85D1B908-932E-4CEA-A4D4-E4B06D2B5462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84BFFEA3-8F68-40B4-95FF-1C32D0AAF4CF", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E5B6BF7-650E-4446-BFFB-F3C1E7A0A9C9", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9B470FB-5E0C-47B4-AE32-38C36AFB720F", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CAB23AA2-AFB7-41BE-85C4-3888FE89AC40", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B0E5C6F-2479-4BFA-B174-57FA2BEDAA1E", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C86576E5-F836-4B0F-897D-A6A1278ADF9C", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63E3B0E1-417B-4C8A-8CFE-E837EB952101", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2749EAF-5C2C-4BD2-B8D4-EBA35A1C3055", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B9CDA8C4-2050-432D-87FD-72B3E2DE71E5", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA40D117-8C33-489F-B0E5-68B59255A1D4", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E976BBA-EF7D-4A43-A2A6-11E84B73B658", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2FBA0A65-828A-4848-8D47-8299F0DD1BE5", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EF1C442-4C97-41D7-B5A2-95261B64DDBA", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BE20DD2-E0DC-4C43-9908-5100A3011D65", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "768205F9-D999-4A61-BF35-C1018B9F4148", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9FE43A56-F660-4242-971F-643D999E9D1D", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "7B5282B1-BC6C-4816-98EA-D8C6A1F1028D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1263576B-CE8D-4363-85DC-C79147F0BB3B", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "D45D462A-CD9B-4AF6-8B5F-95A7629B7A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DE39EF9-46B6-4B45-829A-D69F9D8AFD0F", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4CE7ABB5-A65A-401B-AD83-16B351CB2637", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "12B62A88-5824-4F1C-94DD-46609A2358B6", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C617D36E-A974-471F-A80E-705417D46AAD", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB98D51C-2B16-40D4-B6E3-8A2323A9CF36", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3F62EFA9-C281-44D7-8F4D-846F1F3923BE", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C92FD284-3709-44E1-85B4-66225DD5AABE", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C7A708B-23CA-4C5F-BEF5-5E8B5814AA65", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-8t-d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C638775-0000-4548-9C21-C9879BF3B645", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-8t-d:-:*:*:*:*:*:*:*", matchCriteriaId: "787FE6D6-FB71-4EE7-BAA3-B257E0EB0607", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-8pp-d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03647232-5BEA-43FF-9056-DC0A262C4177", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-8pp-d:-:*:*:*:*:*:*:*", matchCriteriaId: "467DA378-DC53-41A3-82E3-5F523288E975", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-8t-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F641CB3-7A52-4D71-B5E3-E087B5464D45", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-8t-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "078F6384-2A21-478E-B76C-D9AE2D4C06A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-8pp-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E0D5DFB-A96F-419C-AB64-A5DF5C7F025A", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-8pp-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "29E83FE7-D299-4F10-9E33-4EB4B0567E86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-8p-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "818F8B3D-AEEC-4E00-8742-4FE69135EB27", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-8p-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5CAD52-9DDF-4E74-9C74-24DD02BB62E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-8fp-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29B24061-EA8E-49FF-BBBA-A8F5A62DA78D", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-8fp-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "CCF2792C-01F4-46E4-9A5E-2A04E591B43C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-16t-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B142F388-4C17-4BCD-9C97-E62F0AA5C586", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-16t-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "62FB071D-C328-42D0-8E35-E8DA3069752B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-16p-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98D1A3A8-91B8-4B27-A347-3AFD94CCB874", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-16p-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "CD72FB3C-0811-4430-B41A-6BBBA7B4CCA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24t-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3B7E283-7659-4A53-975E-ECF2FFB2BA9A", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "9238C5D0-3669-43B2-B607-438DF91D59AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24pp-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FE7DB7A-42C6-4650-9CB7-86E65BA83451", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24pp-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "10104319-849F-4222-89B0-EB156501BD78", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24p-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A255A07D-1591-4BDF-A66A-19542C8E6D59", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "53F23B36-32EA-4098-900F-2D301E74B347", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24fp-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6ED4F19C-A383-4E43-87B4-9EFBEB4CE480", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24fp-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "DFFDD736-5FD6-4F3D-863F-65E702341047", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-48t-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96568DB3-CA75-490D-9813-78DE3A5FF633", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-48t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1AF4C4-8D03-49B6-96D3-18B00BD7ED8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-48pp-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "675F72D1-B6C2-46A7-B49D-2EF603027A0E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-48pp-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "7CCC8EEA-5EC5-4681-9204-89E5EDA8EA40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-48p-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61F1C7DB-F87A-4482-B993-5BDF9AB13D0E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "928CD92D-90D3-4829-BB6D-DF303ABE1DAD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24t-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA0885DA-4757-4F28-B644-CB385C131CC8", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "773700CE-6952-437E-AA77-AA0E32EB1F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24p-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F9EDF24-2DD1-4F70-9BC9-90654ADBFA82", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "A4AEF792-BC15-4799-8496-0FE9220A25A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-24fp-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76977BFC-8C2F-4C36-800D-58038F63683B", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-24fp-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "E20CD1AA-E7EF-403A-AC6E-C5B750019D5E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-48t-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02ADBB3A-D02E-4B20-B4BB-7E3A3719B230", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-48t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "8077ED8C-BD4B-468F-A3C6-BC300E1C9646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs250-48p-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "294B0CA0-57F0-4365-A663-8E59C8C89785", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs250-48p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "7ABC4E71-4943-4B6F-BAC6-603F91E41674", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8t-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "766AD2AA-4421-4FFE-BC0E-C813F061186E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8t-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "42D91C60-E72B-4C86-A19E-443184EDBE8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8p-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A396D47C-99B2-4869-BEB0-B44F0DBB3250", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8p-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "3A429AEC-5692-428D-8DC7-47EC9081825C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8p-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67FB6217-2366-48D3-A153-C76B9B261D48", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8p-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "A7ACDE44-E156-4B20-82C0-8AA86EAF9947", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8fp-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89FC3769-C3DD-4E77-A990-EE755F0D2F53", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8fp-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "E473B29F-001A-4697-B22C-16B1C519B117", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8fp-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C34E7DE7-257A-4929-AE1D-06BD809D2F3C", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8fp-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "061925BB-B740-4CDD-97D9-52A24B5E7F77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8s-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3568C754-F1AE-49AC-99FC-A6DD32F4D6ED", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8s-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "EAF2A0B8-CF29-4033-B365-DC3802630A0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-16t-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C89CF7ED-840A-4275-8709-02FAE7407920", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-16t-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "BD62CB7E-A9D1-435C-AC1F-5878346A2474", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-16t-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F5F0186-1E43-4A46-AEBB-556BCEA654FE", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-16t-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "27C4F998-F84A-43AC-BD8A-E9370DA959B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-16p-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5757173C-DF26-454A-85B7-7602E58A17AC", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-16p-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "F796947E-079C-4CA9-821A-D8E3139CF064", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-16p-e-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F756E81F-3456-41E1-86AE-BA850CE2F90A", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-16p-e-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "D517CD55-7100-4BBC-A361-61C7118D2F8A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-16fp-2g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65CD2451-3C7A-4E5D-9C12-11B163A858D7", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-16fp-2g:-:*:*:*:*:*:*:*", matchCriteriaId: "570B5694-B948-4689-BB37-E4428F396E2B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24t-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9E39628-7228-4379-8B11-48387D0F8FB6", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D3F59C-1F94-466C-A901-E4EF3E1D51BB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24p-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56EC212E-6AFA-4B05-ACFD-FB3A127FF2C3", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "EFB9E0B8-BD07-499C-8E39-1E21666CAE4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24fp-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0ABC239C-757D-47D7-9CDA-5D4B603CB7F6", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24fp-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "0A1A0BBD-D02D-49BA-99CA-BE2F92C6BBA8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24s-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91687565-3F63-4552-9FFD-1C4929442E9E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24s-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "B7EDFA3F-5AE1-4602-AC1C-26AB78256A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48t-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B782C781-7ACF-4148-887F-46EA9186DFCE", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "CE5689D5-2EE2-41A6-97C2-D1D684C19DCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48p-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1612BCC-4409-4C09-A36E-8C27BFCCA16C", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "A248F084-EF8E-4703-914C-D62CECF64C83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48fp-4g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B3FB426A-23A0-462F-88BF-94E224D9F41E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48fp-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "9780CC5B-8357-4983-BA77-6DA3A10BE17E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24t-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C9D2D8E-F1FB-45E9-84DD-B9C901E628D1", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "92907A6F-6ECF-427F-A1C5-F8FD161E4925", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24p-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5512091D-61F7-401E-AC94-AD6308AFCB66", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "B8B5771C-ED94-40DD-BEDF-EC64782644D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24fp-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13FCA8DB-AF6D-4E6E-AC56-9DACFF48A06E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24fp-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "32F6219A-7241-47A5-8933-FA9E57EEA3DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48t-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "159E609E-79DC-4910-A887-DFF5AFCEB542", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "0E69FF5C-991F-4EBD-B291-3E9A8D00B290", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48p-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB77FEB8-F821-43E7-B456-E8727554F350", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "C5AA9C3F-EC1B-476D-9342-E71E6F893D0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48fp-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E70C5EF0-A10D-4517-872A-201D44DB0A7E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48fp-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "2E252BF3-445A-4BCD-A48E-C7196C401074", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8mgp-2x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FC9799B4-26D2-4CD5-A013-661EAA543D12", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8mgp-2x:-:*:*:*:*:*:*:*", matchCriteriaId: "432D6474-3F30-4DD1-8762-8B9968105BBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8mp-2x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13096AD6-F713-4165-9046-0AE42356EBB8", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8mp-2x:-:*:*:*:*:*:*:*", matchCriteriaId: "50C1887E-EA16-4FC0-A8F7-602DCA8E4928", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24mgp-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "233A1E16-712B-4CEB-BA4A-A1690234E2C6", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24mgp-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "5A32C9F0-4138-4C28-B817-5F7507ED0811", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-12np-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9461EC19-0178-44DB-8B03-D4D8D6357740", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-12np-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "A8233545-9562-4ABC-BBE3-01B48DCBAC6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24ngp-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "909CFF5F-4A79-4A7F-8F49-FEFF579E94DB", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24ngp-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "3C99BEA9-45C9-4E69-A3E4-24E0D9109C1C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48ngp-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "694A0D3B-60DE-4B69-9FEA-46F39405CF05", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48ngp-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "C08767A1-BE20-4522-9290-427C0E132013", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-8xt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7BB12CF-538B-454E-8EAA-19CD2984DFA7", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-8xt:-:*:*:*:*:*:*:*", matchCriteriaId: "76D8689B-2E1B-4AF4-8540-60615D28F846", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-12xs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4569CA0-2C1D-4A25-86B6-741E94716837", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-12xs:-:*:*:*:*:*:*:*", matchCriteriaId: "A4AAFA53-D006-4F3F-A8EB-7EF371851666", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-12xt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "715D43B5-512B-429F-8507-F6E5B1A0765E", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-12xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B6100B6A-C4A3-4AC2-B256-650A8A68FEAF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-16xts_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5934B537-6445-4899-B9CD-1D5F4066B942", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-16xts:-:*:*:*:*:*:*:*", matchCriteriaId: "6C6E96F5-6E46-4CDC-8AC6-2293054ECA52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24xs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43D7B1B3-0432-4187-8259-2617CB9DC347", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "9F7C7939-E2DB-4213-8805-0DC32B3A414D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24xt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96D8895D-77C0-4E56-8BDC-B493FC1322A3", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C12A0F6E-506C-4DA8-8036-F3E0807D70E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-24xts_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3311A6DF-C3B5-4472-81AD-30ADF3DD5C96", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-24xts:-:*:*:*:*:*:*:*", matchCriteriaId: "2E94BC84-0054-4E8D-BC36-0567F29A8FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:cbs350-48xt-4x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E357D88-8CD5-41CF-83C1-C23A9A528A64", versionEndIncluding: "3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbs350-48xt-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "3A2EF516-F859-4B9F-8CC7-4FE6CBB4906F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5ADD809-78C3-4EB8-ACCA-A0F8322C1B78", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", matchCriteriaId: "6812853E-C083-4841-A467-91130ED194BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E25E4182-11C0-4491-9970-80058F7C019E", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", matchCriteriaId: "26A7AB18-C75F-4C63-9132-140EFC46E3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF09DB6B-53AB-4DED-84FA-D1C2696342FD", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "A9B70093-E9FE-410A-973E-CE847F08F43A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75B9DE31-19FA-40CD-B4CD-14DEB25CD2E8", versionEndIncluding: "2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", matchCriteriaId: "A3503F68-CF84-468E-9A40-9F98875DD1C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE54B823-D772-49CF-9BA4-D8056C31A915", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "471C22F3-B110-46E4-BA52-8FDA4412EA0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC963AF6-F648-4A5B-84C6-1D5823222527", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47341322-B516-4957-8CC0-5F34D8983937", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB592B62-F1DE-4BF5-A975-345483C37949", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5A806E-4E9F-45D2-936F-F9416342FBA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196E58A-FF08-4086-8B89-42DF19A3E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03699C15-D612-4CEC-923C-7E69CC6F6C79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48A444FC-D2A5-4847-B616-F5E729F10C75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "E21B324D-F948-4373-A9FB-F07F56473774", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "8CB83A46-C1E5-4CF9-9615-41F3C315FC02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "AD5D6C94-CF45-4252-9F26-C41E5030F001", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "5C95827B-4219-4EB8-B54C-21C9E852F234", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "735E92BB-E4D9-46B5-B9A3-A685934F456F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "17426691-ADB9-429C-8B37-A479C630B95A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "EC313EB0-C812-4B77-B6EB-6E5D106CA1DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "EB1E7DA8-4181-47C8-B86E-72DEA912DD15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "E942E2D0-C4AF-47C4-A9E6-3F26D66F9D1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "61C7AA57-56B9-4C39-98FC-A9C72F9B2C60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "E9F50236-E49B-4BE1-BC96-E3EB3997541B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "DEC94589-59F0-451D-AE0B-1A2610EC9F8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "A6451DB3-575F-4E48-9839-083F00C35B61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "531206F5-A601-4A31-A3F3-0CBF4AF3B329", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "3D1CFE7D-4EA1-4673-95A2-B5F98E375508", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "D34720E3-5EE5-4C3F-98C1-B288CAF4C114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "11F581CD-52CF-495B-A1B9-346D47C7F7D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "58F68741-2F9B-4438-8B6E-2E76E42032F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "11835FD0-2107-4FBE-8027-FBA60817E624", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "AF68BBFD-A14A-48DB-89F3-50F90D308D97", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "A100F872-E7F4-4188-AB44-594F9612F478", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "6FAB4ACB-70C8-4BD2-9E1A-D5DCE06B3FBA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "261CC970-0D09-4E85-A063-A68CE026B593", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "BE30BE52-B04C-467D-9A5E-8F71B4C2F3CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "797B03EC-8CE9-41C9-B77A-975A7664CC9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "ED0F2E5D-7A5A-4205-8F88-1DC6F593E713", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "ADEFD297-FDDC-4677-B52E-7FACA67FA71D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28sfp_firmware:1.4.11.02:*:*:*:*:*:*:*", matchCriteriaId: "E5EDC0B7-F004-4841-B848-E653E4FF044B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "FAD69957-B714-406D-9775-92A7D993BAC6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7AFF9A0C-8E6C-4358-BA5C-0F80004F62B3", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB39F2DB-33CA-480B-B02D-B1919B5AA8C5", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C2A0E1E-1DE1-49E5-A472-3ED6AF13758C", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8723C660-F052-4C9B-ADD1-8484C7209701", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3F428461-20FC-4C3B-B3AB-B359D22F7CEB", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4015A166-22E2-4195-936C-B854FA783883", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D748BC0-B398-4C13-93E8-4332DBBFC82E", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8415CD72-6DBC-4277-920F-B62CD1D56047", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D017CC1-848C-4871-9473-A929CAAE426F", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5ABB894-A71C-4117-BF7F-B558B1061726", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E1E687D-3354-47AD-8FDC-10E307BAB08C", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B482FD23-8859-4A55-BD34-669C4644BEC1", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "519B33AA-5932-45AE-A014-09EFF434B14B", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76AC78F0-C511-4B88-8A93-5052C94AAFE7", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DEC17A4-A48D-487B-AEAB-4A09C979C47C", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F46BA126-9008-41B3-9486-E9DFF572C1B6", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "F1280ABD-C15B-42BF-AF72-B54C3BCBAF83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C10AA033-AFA8-40D0-8342-1EF4E8487CB7", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB53579E-E646-45D6-8702-993AF666247B", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "82507F67-3516-40D1-9922-9BEE33FAC321", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "3EFED2B8-060D-470B-B19F-3134E2BAF915", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7EE8EE09-5C40-4B15-A412-9744C65A7982", versionEndExcluding: "2.5.8.12", versionStartIncluding: "2.5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de varios switches Cisco Small Business Series podría permitir a un atacante remoto no autenticado reproducir credenciales de sesión de usuario válidas y conseguir acceso no autorizado a la interfaz de administración basada en web de un dispositivo afectado. Esta vulnerabilidad es debido a una caducidad insuficiente de las credenciales de sesión. Un atacante podría explotar esta vulnerabilidad llevando a cabo un ataque de tipo man-in-the-middle contra un dispositivo afectado para interceptar las credenciales de sesión válidas y luego reproducir las credenciales interceptadas hacia el mismo dispositivo en un momento posterior. Una explotación con éxito podría permitir al atacante acceder a la interfaz de administración basada en la web con privilegios de administrador", }, ], id: "CVE-2021-34739", lastModified: "2024-11-21T06:11:05.400", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-04T16:15:08.577", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-613", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-613", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-01-26 05:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5D95896-7055-4A21-96E5-14443BF1EF2E", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AC305C-9F13-4EC0-BA44-F0CF0262BD78", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C245C733-9B09-44C1-93B1-5DE1FF3AE2C6", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86AA3E57-DEEE-4491-9B66-37F08FE70AD9", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14D901C7-5727-49D2-9D09-6DFDF1CA974B", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A8EAC5E-2A95-47C2-B68B-16BA15558D7E", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62E86462-EBEC-48CF-8B73-A3856B5A4412", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90023A73-5FDD-4A1D-85A9-4663CE0A611D", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "997FF987-64C6-46E3-8260-8E1C20E74FAF", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C87DDDED-8276-484F-ADCC-3CC73C2A5E89", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E18B4EE6-F495-4AF0-831B-237135961156", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17B8C32E-1ED4-46A0-B7C9-25131173DA87", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF4B2460-C9DA-43D9-BA93-8F3D382D86AB", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33D31E90-CEC3-4B9E-AFDE-2D4968B18FA2", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A450299D-B719-4648-B6A3-DDD885888A4F", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FFBEB8EA-2E71-4F63-AAE3-07322722FD76", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FD3DF16-087B-4987-AEB7-0408D5B4D8B1", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "D32C81B6-F732-4E9B-A181-C87FC90F1150", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB155F3F-7EEA-4D11-97BE-0637FFC6F9DD", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "145D2E2E-7B91-4A02-A7B1-78EC9D49E719", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72485824-B5EE-4608-8BE2-C90ECDCCDEEA", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "66FE4C7D-BBF7-4CC7-A6A3-C0D6713C4FFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B5E6167-62E9-44E4-93BD-0884B3B90777", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "60C2982C-183F-41B1-9AA3-D5707F795E6B", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "80CED547-483B-4889-8079-77861D0590CD", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB64405B-E5CD-4E77-84A1-A6C65F41B167", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "26A3CD31-4E1D-4047-8058-E8019F3A4546", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45DF22E1-24CE-4AA8-9B76-90A08E1D3FB9", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A0F2ED4-EA54-41E8-8A14-F0CB8C1776D2", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "C07B10FC-9C39-482A-9807-16D49FDAD979", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "928A3EAF-E40F-4D7C-9925-A6145A32E2B2", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A316620-A0B1-45FA-A2D3-9C7197AAB4FC", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79CA829F-E578-426D-8E3D-797449D3CACB", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B4E22B8-46CA-4539-8608-90A1B7C68B6F", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5493DB18-7F2C-4A9E-971A-491824E5BF7D", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67DF2CB4-7DFE-4B13-A9B4-7FCEEC2FD6EB", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12ft:-:*:*:*:*:*:*:*", matchCriteriaId: "FF7238B1-AF9E-450A-9A11-4B6CDC527CA6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5493DB18-7F2C-4A9E-971A-491824E5BF7D", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0D2F65F5-FC79-49AF-8122-5FF46D28EE0D", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD599A09-5793-4A5E-8D9C-8A0936322143", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "308E4391-7962-4F27-ADFC-B8BBF04D9089", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "314F2981-1A9C-4156-98CC-62C6A71AA053", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "912253A6-3180-43BB-9D56-0DB7DB42065D", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72B077BF-70D4-427A-A4D9-18D0D755480E", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B33A623-1F6C-4BC6-9E09-6590F45CEA5F", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "628B557D-2FE9-49E7-A47F-1EE150DEE74A", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51E59E26-20EA-409B-99BE-0437425BA179", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "80C6A8B5-E26B-43AD-A32C-3A7E2BA0F4CB", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32AC8E8E-4496-4DEC-94CA-AFFAEE2BC485", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D3EF6D3-A329-48AB-A92A-0F5B9C6C6F2E", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38BF0C89-07C4-43CF-85AD-01ECC8FBFE2C", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A96FF9C-4A6A-45C8-A265-0E34D506EEE4", versionEndIncluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco Small Business Smart and Managed Switches, podría permitir a un atacante remoto no autenticado llevar a cabo un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. La vulnerabilidad es debido a una comprobación insuficiente de la entrada suministrada por parte del usuario mediante la interfaz de administración basada en web del dispositivo afectado. Un atacante podría explotar esta vulnerabilidad al persuadir a un usuario de la interfaz para que haga clic en un enlace malicioso y acceda a una página específica. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en el navegador.", }, ], id: "CVE-2020-3121", lastModified: "2024-11-21T05:30:22.217", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-26T05:15:17.397", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sbsms-xss", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-21 04:23
Severity ?
Summary
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2FFD9F9B-22C3-4F52-8474-0DD7543CADF1", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29DE29FE-8FF3-4A08-80B6-3FB03DF5F305", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19A5CBC1-BB3F-4751-81B4-B40A682D7EEA", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3436DB0-18FA-486D-BAF7-92F1D87AFD28", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D30728E0-E8B8-45DB-9421-B5ACD50B1A97", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "3208F54F-21C5-49EC-8FBF-03BAD10742EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67809B1C-8B06-4473-84B4-DBCD99AC1779", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E53BBA48-B11C-4E85-9257-61ECE5389CDE", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A60EF4E-A3A3-4E33-9561-BC8259062C2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDBA6F78-8754-4D1B-9A60-1C19568093BE", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "98523586-0F3A-4B62-A972-8E9BA4F0DC4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E7B6BDC-2BCA-428B-82E8-E083F3661358", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "8CD3BA54-85D9-4688-8B90-612F96D452A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08287D78-F7B0-4CB1-B719-86DB482C3CDA", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "95AD5321-1F1E-4699-8FBE-E9B04505092F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23B51027-95E5-443F-91F5-93D7B3B3320F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AFAE9706-8B37-4231-B4D4-CA6F527446E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "603D9E60-CBDF-4ADE-AB2C-903B412DE294", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "8DFEB361-1986-4522-BC23-06140F8D2625", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33FBBFDA-5279-4429-BFD5-27669148DB8C", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "3BDC341E-FA7D-4B90-A5AB-E41822E16385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2B9BC01-193F-402B-8A18-ED5C897C23B6", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C835D1DE-A639-4CB0-947B-988C89ABED5D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "824D4FDE-7D99-48B9-8F50-9C8DF4E5AD2A", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "7C5D8296-7B6E-4880-8C5F-D7293118CE5E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04E7ACB2-3D3B-4435-865A-3A1DB5AD055D", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F6551D-9188-44C6-8101-306D8077C0BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "410EAAFA-771D-4151-9583-D65AF0D97A17", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C27D4259-24AA-4F4F-AC82-53D8BFAA303A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACFC9FA4-0DD2-4134-B9E7-D30B2AE45C8A", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "393E2CBA-BF91-4AA7-B014-AE9808EEDD3E", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "412F1F7B-6348-40A0-8C04-D4C6B46B3E5C", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7869C8D8-D110-4B91-87B7-D17BF4147A49", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59B4F469-A2D7-4B86-BC0A-121A4E4DB193", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4634D2E-51B6-4C08-8309-CAD95CD54973", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "690B0EE1-C461-4A13-98D8-37CF5932E170", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8009A0BB-491B-417E-97F8-7AAA1B06DECD", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EFA56C16-C780-44B8-8C0C-63737C1C06F3", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9345DCEC-A026-40C8-A353-3A0469DC5DAA", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BFF357BD-04F6-46FA-BB4D-8A7595449B74", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "603591D4-5826-42E6-A8B9-E6C3BAE781A2", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1546E74-1020-4F6F-B9CD-63BE041C73E7", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A48CA589-1D31-4F39-9F5D-9F28EB0D600F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65778A40-A33C-4035-8DE3-997D9FF5EE6C", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8C01641-19E6-45FC-A359-93C9643ED565", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DE57A25-5323-4D1B-BCD9-B68302068F12", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "070D7935-38B0-4568-8DA9-A8E28786A803", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F21AC1A-62EC-4575-9655-F215C283B276", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D355124B-6687-4D10-9277-7E39A3737E74", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F259F652-2F84-4868-A68F-DF331F6B02FF", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CEAE751-6B97-4A64-A8CE-DD109E40E9C5", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28B7FD96-9F84-467F-A3F3-9AF0190CA63F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76A090DD-8C6A-4233-9E9C-6FB4A3B33FA0", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3279C13-02F8-4961-8D2D-A63B6B4FE12D", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2A87FF9-BD82-454D-AE01-DCE5317DE0FF", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A015D614-E5C0-4E29-8293-776BB1A94D10", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E65353E8-9949-4C4B-932C-667279130E33", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D484F828-5CFB-4A61-BF53-B9F28ACCF6EE", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "162B0262-CE2C-4984-A6B1-B901E811B0CC", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D22DF022-C31A-495C-85A7-A2F8A16DC2EF", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "763299A3-D24A-4504-B2A4-E803407C8362", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "176FE80D-5199-4510-A7F1-01D3256450C7", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D142F8B0-8B67-4B97-B96A-52BFCEC3CE58", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "520D3C41-1125-4745-A513-A4612046DD40", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D993645B-4DB2-45BA-B7EF-C988A49CDC8A", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "819EBA57-903A-4F08-ABD0-3CB9ECB4A065", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE0A7B1C-66F8-41C5-B3E6-8255D22407B7", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C6DC6B24-4789-44BB-B34B-904F5652C2E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC073DFE-4D85-4B43-8BD2-C4EC7F0EA36E", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3CD6C368-705C-4AA5-BFCE-63A6A411A800", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E93E5ACB-B4DC-4E10-BD6F-0BEACD024941", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B5EE74F-A8E1-4A75-8FD2-21230293809C", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D101025-42C2-46B1-BCE7-DAD2B6DE8141", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1E08B48-138B-441C-951D-44578A31F1ED", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8943AD9A-BA0C-4AD5-A35C-7FD82484719D", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E8EFD2C-E5BC-424E-9F00-4653C01981DA", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72AF1C2C-C190-4FBC-A468-0863CD5851FC", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08A36AED-FFD3-446C-AB12-B3DDD6BBE243", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "538851E7-2DEB-43F9-B5ED-C696F925F00C", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B08BA07-5F4F-44F7-BD1E-3E8455430FDC", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8695118-0A83-4A7F-BDCD-18EB4C906545", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77D42182-0D2B-43C0-8BE2-EA6255A166CC", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53DAEEBD-7155-412F-A63D-0779217C3E33", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F51D0CC0-23A0-46D6-BDEB-BC15C3D8253D", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "412BBA1B-6C54-47D0-A4C3-F2AD2C580674", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E0258DD-37D0-4607-B29D-095700ADE63C", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7444A63-6739-4B01-A503-88E6B8AEACF8", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "143CE2F5-9BCD-4AEF-A04A-E645C67E8240", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA315213-2376-4C38-838A-5A9CFD6F5378", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B3579E5-7CF6-41F3-B6B1-3D820ACA7619", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68D7186B-319F-4F2F-B839-FE8466CBCA48", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54E0657A-6E4E-4B24-8D6B-ADFD67F864AE", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CF43FBA-9B58-4A89-A345-E2B7BD0A0432", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C169C472-6BF7-45FF-A032-43AFD467EE18", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56924835-C5CE-4770-A5AD-62B421A0AF2E", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52D2E5EC-C66D-4FDE-A0BD-FD86CCA7B478", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7EE83B8-8275-4677-A531-7E02B1D7ADD2", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AAB35899-A2B7-4C61-A6F1-B602DD250010", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C6CFAF51-B5E7-4553-BA3C-A348602FFB54", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E8F53E9-E466-4DEB-828F-57521E93831E", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C897D930-A028-4B61-8B13-B10412B5C4E5", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEF95CAA-EA21-487F-B519-9C171FB76DB1", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61ECF32F-D3ED-431D-B5AD-DB41F48DE6D5", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E90397B5-E99A-46CC-B477-2E467AC3133C", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2EC0AB5-2605-4B1A-AA8C-C1E16A9BB441", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65238A4D-3CFE-4CB5-BC92-BE79C2F1CCC0", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53CD4704-9DF7-4C82-9D91-2CA2A217B760", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03D002DA-1AC3-4648-8F70-899985A661DB", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C3361C8-6A46-42FB-92B9-434E30C434DF", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1611DAC1-42B9-4844-B382-28175E92F17B", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0860456F-4527-45FD-BC45-1AA2D77ED782", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A06E69FB-69F8-48EB-96A5-BB8CCCCA7738", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FA390EBD-EA03-41CF-8DC5-0E48B504F46C", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5D2C109-1F37-4F56-A75C-B6FC48DCF590", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38724B36-783F-4BCB-B134-F32C941D5A50", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8305353E-DC47-4438-80E7-051625BAD735", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DF317B7-DA9F-464A-968C-336D41254367", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A78E85E-62CE-4789-A75C-9144F7DCDDE8", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DB46396-3A4D-4A47-90EA-225BE1676568", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81CF7414-A410-42FF-A40A-040A390C760D", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz basada en web de Cisco Small Business Smart and Managed Switches, podría permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz basada en web. La vulnerabilidad es debido a una comprobación insuficiente de la entrada suministrada por el usuario mediante la interfaz basada en web del dispositivo afectado. Un atacante podría explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un enlace malicioso y luego acceda a una página de interfaz web específica. Una explotación con éxito podría permitir al atacante ejecutar código de script arbitrario en el contexto de la interfaz afectada o acceder a información confidencial basada en navegador.", }, ], id: "CVE-2019-12718", lastModified: "2024-11-21T04:23:25.923", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-16T19:15:11.973", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-xss", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-21 04:23
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2FFD9F9B-22C3-4F52-8474-0DD7543CADF1", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29DE29FE-8FF3-4A08-80B6-3FB03DF5F305", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19A5CBC1-BB3F-4751-81B4-B40A682D7EEA", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3436DB0-18FA-486D-BAF7-92F1D87AFD28", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D30728E0-E8B8-45DB-9421-B5ACD50B1A97", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "3208F54F-21C5-49EC-8FBF-03BAD10742EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67809B1C-8B06-4473-84B4-DBCD99AC1779", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B9E2794-CD5B-46D8-9134-4CB9CC40CEB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E53BBA48-B11C-4E85-9257-61ECE5389CDE", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A60EF4E-A3A3-4E33-9561-BC8259062C2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDBA6F78-8754-4D1B-9A60-1C19568093BE", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "98523586-0F3A-4B62-A972-8E9BA4F0DC4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E7B6BDC-2BCA-428B-82E8-E083F3661358", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "8CD3BA54-85D9-4688-8B90-612F96D452A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08287D78-F7B0-4CB1-B719-86DB482C3CDA", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "DDC0F768-3A2D-4F0A-8BF5-208BA9F54F77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "95AD5321-1F1E-4699-8FBE-E9B04505092F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "7A50E921-6E98-4EA9-A329-4B70CE2B2FBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23B51027-95E5-443F-91F5-93D7B3B3320F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AFAE9706-8B37-4231-B4D4-CA6F527446E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "603D9E60-CBDF-4ADE-AB2C-903B412DE294", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "8DFEB361-1986-4522-BC23-06140F8D2625", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33FBBFDA-5279-4429-BFD5-27669148DB8C", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "3BDC341E-FA7D-4B90-A5AB-E41822E16385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2B9BC01-193F-402B-8A18-ED5C897C23B6", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C835D1DE-A639-4CB0-947B-988C89ABED5D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "824D4FDE-7D99-48B9-8F50-9C8DF4E5AD2A", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "7C5D8296-7B6E-4880-8C5F-D7293118CE5E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04E7ACB2-3D3B-4435-865A-3A1DB5AD055D", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F6551D-9188-44C6-8101-306D8077C0BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "410EAAFA-771D-4151-9583-D65AF0D97A17", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C27D4259-24AA-4F4F-AC82-53D8BFAA303A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACFC9FA4-0DD2-4134-B9E7-D30B2AE45C8A", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "393E2CBA-BF91-4AA7-B014-AE9808EEDD3E", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "412F1F7B-6348-40A0-8C04-D4C6B46B3E5C", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7869C8D8-D110-4B91-87B7-D17BF4147A49", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59B4F469-A2D7-4B86-BC0A-121A4E4DB193", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4634D2E-51B6-4C08-8309-CAD95CD54973", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "690B0EE1-C461-4A13-98D8-37CF5932E170", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8009A0BB-491B-417E-97F8-7AAA1B06DECD", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EFA56C16-C780-44B8-8C0C-63737C1C06F3", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9345DCEC-A026-40C8-A353-3A0469DC5DAA", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BFF357BD-04F6-46FA-BB4D-8A7595449B74", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "603591D4-5826-42E6-A8B9-E6C3BAE781A2", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1546E74-1020-4F6F-B9CD-63BE041C73E7", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A48CA589-1D31-4F39-9F5D-9F28EB0D600F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65778A40-A33C-4035-8DE3-997D9FF5EE6C", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8C01641-19E6-45FC-A359-93C9643ED565", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DE57A25-5323-4D1B-BCD9-B68302068F12", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "070D7935-38B0-4568-8DA9-A8E28786A803", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F21AC1A-62EC-4575-9655-F215C283B276", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D355124B-6687-4D10-9277-7E39A3737E74", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F259F652-2F84-4868-A68F-DF331F6B02FF", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CEAE751-6B97-4A64-A8CE-DD109E40E9C5", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28B7FD96-9F84-467F-A3F3-9AF0190CA63F", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76A090DD-8C6A-4233-9E9C-6FB4A3B33FA0", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3279C13-02F8-4961-8D2D-A63B6B4FE12D", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2A87FF9-BD82-454D-AE01-DCE5317DE0FF", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A015D614-E5C0-4E29-8293-776BB1A94D10", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E65353E8-9949-4C4B-932C-667279130E33", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D484F828-5CFB-4A61-BF53-B9F28ACCF6EE", versionEndExcluding: "2.5.0.90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "162B0262-CE2C-4984-A6B1-B901E811B0CC", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D22DF022-C31A-495C-85A7-A2F8A16DC2EF", versionEndExcluding: "1.4.11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F748CFB2-6868-46CA-B8AA-79657290651E", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "69C67F85-36DE-44FB-9DF0-E644563A479D", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E9523B9-EA3D-4F5F-9F02-95588F33DF2B", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4887364C-8016-4E81-AD98-02292515530F", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8FF0FFE0-20C8-4EA5-97E8-995727F0EEA8", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9189A85-A983-4ECB-BB63-997CCB5B4D46", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03C5F49A-EA97-4438-AA3F-6CB6673084E0", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C6DC6B24-4789-44BB-B34B-904F5652C2E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "304E4317-490F-4329-BDF4-17D6F58E2B6B", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01337909-675E-4A2D-9BB1-1AAEB310B3D5", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FBD67B0-489E-4900-9901-A08101E7FD7B", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D07311CF-09CB-469F-AEBF-DA57393571C3", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22791CAD-97C3-4809-966B-2B668A1A0C88", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDD8A210-2AAA-4D89-899D-F6D7F52CFA68", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67135368-FCE2-4E02-ACB1-B142995EE812", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB290655-DD04-43FF-AD3B-D577BAC3EB98", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C711C1F-82CC-4D14-99A5-AF15CCCB0DBE", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1570F59-105F-4EA2-9A17-9184ADFD0BC3", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83843306-40D2-4C6B-B311-AAF996DC5487", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D90FD61F-73C5-4298-A731-CCF873D8A126", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F826EE5-537E-40E4-97D6-A47EAAD45DDB", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79B78222-F16C-4AA3-906E-8F3C4FED1630", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAF36971-C8DB-4928-BA6C-820FAB0415D8", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D74E7B1-E028-4026-8B7F-D6BF2B64B5BC", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3BE0B00F-3C72-4148-B6B3-F25AE5104A6A", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDAF6815-AE1B-4469-811C-99603BDA4B40", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B873CED-C25A-473A-81BD-61D0A3BEA517", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "282C1426-C20B-45ED-AF2F-38D9901E896A", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DD4B57E1-A3F4-465E-BBCA-0430B75C1508", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30DC74C0-4461-4F04-84D1-04A10D06B012", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "566302E4-F223-4ABB-A94E-2EE6C0C14264", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E10B5CE-C9DD-4D9A-91A7-461F1B063C14", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C956CE3-F737-43E2-8737-AA539B8EC543", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F4A4F95-BC73-49FA-A1BA-2AEABA1FFBFF", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7311EFCD-9CB5-40A0-AC79-2D19E09EA19D", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "66EF4196-6F2B-4911-939F-334862DF1439", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E78D5D88-A668-4303-A523-3B9018CC1922", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8573615D-0184-46A5-B3AE-3EC7D4727EF5", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CD2BA73-6000-4C87-9592-928CED0660EE", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ABDA8FC6-99FE-45DB-807B-34CE9438A325", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E688048-EC49-4718-A444-10ECFD21F991", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4A4E845-CE5C-440C-90D0-26C09780633B", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826258A-7473-46D5-82F1-6E6CF56091E7", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F310AAE-76BD-4EC7-8A39-B17590A5840F", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15C7F635-741F-4F78-9172-A4D16CDDCE95", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F416E8B0-1F92-437B-B957-CE0BFB70CA83", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "97FE7A0F-C4E4-4061-B39D-5C97CD113444", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BCF14DB-59CB-4D71-A9AE-136E6681F791", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F1FE2CA2-4B6C-48A5-9915-B948DB45515A", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19D28C77-3C6A-4ECE-9771-5B85735047AB", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC9337A7-28EA-43FC-9CDC-E345A0D568EE", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "974278E7-129D-4624-AAC9-F4BECE9A8CEA", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52B4A2D6-D576-418C-A0CD-42D03D807688", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E0CA5F64-87D7-4A52-AD3A-24CA521C3C89", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7DC622F-17C7-4635-860D-9AED963FAF1E", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "69B492B1-C84D-42CD-BBF9-07920E95D709", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A9711C6-C647-4AB4-AE9B-9F156C59077A", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0373D61C-E076-47E2-9E5D-C88AC16B6F7F", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B512E8B-146D-4E6C-A0F3-1ADBCC9F146D", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10BB8F85-6D17-4C00-B4A9-EF5D5C677FFC", versionEndExcluding: "1.4.11.02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco Small Business Smart and Managed Switches, podría permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site request forgery (CSRF) en un sistema afectado. La vulnerabilidad es debido a las insuficientes protecciones CSRF para la interfaz de administración basada en web en un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que siga un enlace malicioso. Una explotación con éxito podría permitir al atacante realizar acciones arbitrarias con el nivel de privilegio del usuario objetivo. Si el usuario cuenta con privilegios administrativos, el atacante podría alterar la configuración, ejecutar comandos o causar una condición de denegación de servicio (DoS) en un dispositivo afectado.", }, ], id: "CVE-2019-12636", lastModified: "2024-11-21T04:23:14.233", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-16T19:15:10.987", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-sbss-csrf", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-01-18 06:29
Modified
2024-11-21 03:09
Severity ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/102718 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102718 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E62A8CD6-FD0B-4F93-A521-A574470806AA", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E28746B-DDAF-48C3-98D2-6DF02F10402B", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DB647C6-4F49-44B3-B5DC-1CB4B2808809", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D42E184D-0BB9-4632-A910-7223EF5846DC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D9AE8D4-8324-47DE-8A1B-002F04791CF4", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D3EAE27-6D3D-427E-B94B-E65FF60A477F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FA8309E-218A-4EBB-86CB-53568F87AE03", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18D13620-A801-4837-A2D9-D8BB5EC67C8E", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FC203EBF-AADC-4536-A3A8-8FAD7EF49F66", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3250E1B1-3478-4089-8D4D-210CF5382396", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C40A90E-B0CC-4713-858A-CE98FA73A59A", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA0176C1-1AC1-4A05-B2C7-E1E4C76A61FD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59267A4D-846E-4E07-9158-7AB7AE6A8754", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCFACA27-EBA0-44A2-ADDB-16701EE476A5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CB0A209-D8D2-48E9-9A83-A4EFFD5EBDC0", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE38A4A5-81FC-4A79-8E8F-F6B288ED2283", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B981B6EB-AAEE-4B4E-86B1-005E11D1DB30", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D496D2D-84AF-47A4-BC5E-607C7E5E6DF6", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19A38D74-522F-4001-97C8-8F3D33AC9DC8", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03436FAE-7FBF-4C4A-9EE4-3FD94316ED25", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6961B4DB-F152-43A6-9440-6655BCAD379F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E912AC1-B82E-406B-8480-720223F2FD74", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "438E02A3-D177-4476-80DA-0C95C783B161", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA6AE9A9-61D3-4CE4-B1D3-029734397956", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "142DCA4A-57D6-48C0-ADD9-749E9B8464D1", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7CEC74C-D5FE-45CA-83A1-15F771958993", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "46470295-0C82-4D37-A9CE-722CAEED6008", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9162932E-4570-4A6C-8634-1D756EF42C7F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAB16572-975A-473E-8EDA-757BE49CDFCF", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "662D1FD6-5DBB-4DC3-A11E-00AA87A3DF19", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F584E122-98B8-4F6F-92F1-4A6C83C3B934", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6B8D73B-BEF3-4006-9ED4-5C8F98B479D9", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F96925BF-73FC-454B-9B00-632EB2A1E1E5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "752F1EF7-FA82-4B8E-B8B6-5939270DB705", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB932882-F8F9-44ED-A673-9A07211D5D7F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "857756BD-B680-43EE-9FDB-F5FD56D7A1AC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28F46707-41BD-4118-933D-1FF48045880E", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37DB9ADA-FCCF-407A-A18D-530FF0815551", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4B89E91-97B0-47EE-BC1E-D0A0098C8C92", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50CB4BA4-E815-4506-A6FE-21B1F41EEEDF", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", matchCriteriaId: "6812853E-C083-4841-A467-91130ED194BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "666E6BEC-32C1-4361-AF78-3B5739D38378", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", matchCriteriaId: "26A7AB18-C75F-4C63-9132-140EFC46E3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5803FD62-086B-4316-BDFC-331156C208FD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "A9B70093-E9FE-410A-973E-CE847F08F43A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4015A3F7-5706-40E9-84AD-A81D9205B2CE", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", matchCriteriaId: "A3503F68-CF84-468E-9A40-9F98875DD1C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98827546-CA39-4D4E-9C0F-D3B020BE08D2", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4B42742-D701-4AE9-A833-189FB6708FC9", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3E798EF-99B0-4D76-B0F2-6FB9499FCF8B", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A289E57-D99E-4A61-BEE3-91A43F156030", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A415AFE8-B965-45B7-B01F-E3F8F79F8EDD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD23FB5D-9A7F-4A03-A269-A6FE486677D5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61764001-8BCD-4D43-9324-9ADED2F2890C", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61B9373-76C9-4EFC-B4AF-EB8833310750", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58E2227C-F7C1-424A-B5C5-5C4BDF052521", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E2BDD45-5A8B-494A-A9BE-597ABD9B16D7", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8982BA5-8ABD-4235-8D24-90F4C949C583", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDB31016-63A8-4436-A4A5-605E79071A71", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BC8B43A-27FD-4188-9247-11796701FF22", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F611F78-9D39-4970-B43B-D634203D6F2A", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49E144D2-93D7-4F19-8C96-50CB5BA0FBCE", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0D8F03D-511A-42FC-8A89-0C69A4BC0D13", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DA114A88-569D-4B50-A908-2CD30EF15D74", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC685D61-7F81-4877-A5A4-E1AE0D2298BC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE87339F-65FC-4BFA-9C5F-6E1E7CA08E2F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2D46DE3-626E-407D-A5CA-B05E32F1B6C8", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F600F290-8723-42BE-9E6A-587132ECE8F4", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F1E85841-5E82-4D66-B7E7-C8AE8A11E1BB", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BCAC9EF-CCF9-4BD2-AADD-A3F48B95B52C", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F214C861-ECCF-4734-9866-E237F5CC5D53", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6791A301-2164-4F44-8B03-91B96BE2CDD0", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03FF785B-6274-4092-9E43-3396F4FE8CAD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C38DF13-3C4A-4CB5-9205-74670FC0C8E5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76E523C7-CF2B-430B-829E-D803AA1CDE62", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADCEE83B-369D-4F38-AE97-9ABD11A20DAA", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54B4BEBC-BC5E-4003-9B34-E2A6896F509D", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0CF964C5-4CA9-4D81-B60E-2BEDEF47E571", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30B99E44-30D9-4AF1-97D5-EA2DCAF6E825", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "41879534-43D0-476A-931C-2E8B187D456E", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "975C54C6-B3B0-4C89-9C35-05BBEF6E75C7", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1DC345D-BEB3-409A-803C-D7FE72EFB073", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23C93EF7-4851-4E4E-A600-BAD62254D707", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D89D488C-0582-4338-8848-EEA8DB6AC2DC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00F8E3E4-55D4-43A7-8564-167A2A32DED1", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BA5FC05-98F4-4A8C-91E0-703784F5970C", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A55371BC-B4A3-4E56-AE2E-63BD3D5835D2", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7C44E0B-336B-466C-85E0-F92626456CED", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E12126E-E0E3-479D-B5FA-578683C70050", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.", }, { lang: "es", value: "Una vulnerabilidad en el framework web de Cisco Small Business Managed Switches Software podría permitir que un atacante remoto sin autenticar lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a una validación de entrada insuficiente de parámetros que se pasan al servidor web del sistema afectado. Un atacante podría explotar esta vulnerabilidad convenciendo a un usuario de que acceda a un enlace malicioso o interceptando e inyectando código en una petición de usuario. Un exploit con éxito podría permitir que el atacante ejecute código script arbitrario en el contexto de la interfaz web afectada o que acceda a información sensible del navegador. Esta vulnerabilidad afecta a los siguientes productos de Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches y Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.", }, ], id: "CVE-2017-12307", lastModified: "2024-11-21T03:09:16.587", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-01-18T06:29:00.207", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102718", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102718", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-08-17 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF693F4-E085-43E1-81CB-F4365E173FFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3521F951-DA4C-48C9-8FD0-CAD4328E61F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37654BAD-A965-4680-9496-2527CC20574F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EDCF275-D322-4551-B072-CAE85047759A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BB3C8A5-8918-48A9-A8FB-12F0E694247B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8BD64ED9-F8FD-4C26-82F9-C4D84D14681D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4DBA145A-98C6-494C-A488-37122AC62C91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B94C85-629E-4911-B55E-53B6D86BC603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56A0D3C4-B134-4709-BA6B-1D376A7D4696", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "027E1D98-A934-47E3-A3CA-813C3E581A58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8407005-2954-482E-A2BE-64FA81DB8C82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B91858-B62B-4EB8-86F4-E16A2FE2E38E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04F3DD74-DD70-4154-854D-C125A3065735", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "14F3604E-EC92-48A8-A0BB-AC848AF188CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "88E933E3-12C4-48A7-80A7-BD3C6D99F21E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4310B268-A950-4214-806B-2E2C5C85546C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0BF81119-6931-4423-BC37-085C772165DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8915A14C-5C9F-443C-95CA-A3DBBEFAE8C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A655D736-2E6B-4DA0-878D-419B17DB6C9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2E4C8F8F-F914-48A7-B47B-2F1EFE8F7605", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F44E170A-2F71-4112-9793-BDE10341A485", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9EADF9B5-CE67-4148-8AF1-200CB1087A28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CD46C00E-FFF2-4881-A86C-87676DA895D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33C6CC27-465A-4B48-B910-4AE704296BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "505929A2-38FD-4DE7-A545-17304C97F5C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B1AF8D7A-0138-4369-8134-369CE4F5B83C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF16C957-3898-40E8-89E8-68C4D11A7438", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9646CE32-97B0-4708-B9DC-54419898E5D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "465EF5CA-3AD1-4727-B245-3C69E28E02F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6CEFE6F1-4F0F-4A61-A9D2-AF2EF6A4BCB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C0E6130F-046E-4F43-9B33-1E2F78DA838D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F4BE80B2-F273-4336-897B-C67DCB8E2DFF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "82562C7C-8DC8-4D67-8FB8-DFC3CD034127", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7033CCD4-DA36-4D4F-AC61-FBDA9D14ADB4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "16458FAB-82F2-4BF7-834E-EAF425A55122", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1A52FA3-1EBE-4A7B-99A5-99A4162EBC02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F41B604A-8C7E-4A17-9D99-19638DE0C043", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CAFDC3D1-2390-4D1B-B6BC-95757E56721F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E56D27-ED97-4D92-9EE9-37CFF223ACFD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E070A80E-D5DD-49BC-B1CC-54C37D89F1FD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9B01E0FF-0EA1-4337-B95C-59E51A54E4DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "82F86D1D-95DD-456C-BE0B-DF85FAF7E8F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72FAB4B2-F4F7-43CE-B82A-5053CE65C658", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03407954-9170-46D1-BBFA-3479B51D9A87", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C06422E-173D-4650-A560-137E7B00763E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E3E9EF2-9588-4EF4-AE3A-CCF10A962C87", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AF9BB1CC-974C-4739-BC55-AFAA8C27B16D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "97E9723D-912C-4EAC-905D-C2AA20092F6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C25D316-9228-41E8-96CA-8CBF38855701", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6D863273-1BE8-4AC0-ABFF-58EF1597D363", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "70B2D902-C7E7-4EF7-B633-9FC9AA473010", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C115DA7-6CEF-49EF-8E24-FA0A7DD050A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE0090D8-7AB4-4BA7-A969-1C0C6B368B09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "219B048E-B61B-4C50-B345-FD25696CB764", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "10E69DC4-C09F-4178-8037-29406F79BFF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB77511-93E3-43D8-8D32-AABE27ADFB08", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7534A5E0-742E-414D-BDC5-259D39159BB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03699C15-D612-4CEC-923C-7E69CC6F6C79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48A444FC-D2A5-4847-B616-F5E729F10C75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196E58A-FF08-4086-8B89-42DF19A3E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5A806E-4E9F-45D2-936F-F9416342FBA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE54B823-D772-49CF-9BA4-D8056C31A915", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "471C22F3-B110-46E4-BA52-8FDA4412EA0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC963AF6-F648-4A5B-84C6-1D5823222527", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47341322-B516-4957-8CC0-5F34D8983937", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB592B62-F1DE-4BF5-A975-345483C37949", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6BCF751-3356-41C4-811E-B7CF56E63A7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "75AFA3D3-E364-46B6-A93F-04A75CB77558", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F13F3D35-4661-4E09-A970-F6AEC950ACC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B78DFA9D-05FD-404C-8546-86DC2A7F306C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D26514DC-FD8C-416B-AA7E-F62208F5E5E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBF6EC3F-225D-48B5-82C6-9559BE0B653F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0DCC3DF9-71EE-4503-92E2-74D19DD8478B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "582CD84B-C24D-43DD-8000-CA9BD41771DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "257121AF-7D08-40FC-BC75-BA0E29246B16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "731E458C-B7AA-437A-AA22-023AE746044A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBE8C75E-5727-43AA-8F27-9368C60C1DD1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "375B4C7B-4A60-4CCD-8656-C674D734FA10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C2537192-BED2-4B18-966C-E10F155ED1CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2E280C1-B685-4813-A8B9-4A654FA3222B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "96D82748-7475-4E94-928B-05D45D7AD2F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E5B39775-5AAF-4A0B-83E7-D6102D75C404", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22A19260-8730-42E6-B7B4-DCC7BEA6274F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AEA9482-67E6-4E6B-8A45-24908BB40C1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3012AD17-508E-4860-897B-4F9644BFEC03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4BE2BCF-A130-449B-B50B-0D5414DDD18C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30AA113A-4967-4554-8AE6-BA51C9A5F2C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0F73C16B-814C-447E-84C2-893B9ED90693", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9D4EE51C-F69E-412E-BE53-00B377564D01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48E2C7ED-765A-442D-8FC6-5D769AD05251", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1431252-1FAE-4492-A7C4-69D47BBEB228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41E2FD03-6870-466F-9389-6D044BAC5DA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA293370-953C-42ED-BF25-4C439A8D986A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9B7BB55-2872-411F-8E0B-EED8746FA013", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.", }, { lang: "es", value: "Una vulnerabilidad en el motor de procesamiento de paquetes IPv6 de Cisco Small Business Smart and Managed Switches podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobación insuficiente del tráfico IPv6 entrante. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete IPv6 diseñado por medio de un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar un reinicio inesperado del conmutador, conllevando a una condición de DoS. Esta vulnerabilidad es específica del tráfico IPv6. El tráfico IPv4 no está afectado.", }, ], id: "CVE-2020-3363", lastModified: "2024-11-21T05:30:52.957", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-08-17T18:15:12.587", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-21 05:29
Modified
2024-11-21 03:30
Severity ?
Summary
A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/100933 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100933 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "94B04BB6-59CF-44E5-A0D3-BE67B5C57854", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "037DBB1B-D044-44E4-A52A-567BD1CE2C69", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1E08101-09E4-4E03-B47B-BB5961491E67", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "315B9FBD-8132-4192-9F10-4C11258ED524", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB95AE0E-2534-4BAC-9480-7BC17C5EB1D0", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "284A43F4-C4AB-48AD-B4D4-EFB61792964C", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC338E75-CBEF-4010-B3C9-24B78DF05414", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90A4C654-6C95-4D65-9ADB-7D53A03C6B53", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C37A7ED8-E54E-44D4-9612-9114F8FDE553", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A2B6310-E2C4-46D3-AE0C-2E318870E239", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB328ED1-9705-440D-862D-F52B4D195363", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D84629A-B96B-4492-9988-94A5BB92D161", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC9DAE47-423E-45E7-B6DB-4C104371D0F2", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DA4E70C-C089-4B70-A905-356266C03D68", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EEDB984-EC17-414D-9514-8595D168D902", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4E701E1-BB13-4742-B925-409DECE26E0B", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEC87CC6-7F24-46BA-A1A9-8C0DF40C3E51", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B10721A8-98C5-4EBD-B208-553FD5BCCE4B", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C4AD929-F658-4BCA-B5A3-9142C6380947", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC2011B9-CEDD-46E4-8784-FAEB90E2A4F6", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF3B19AA-1F87-4D61-817F-AED3E5C6ABAC", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "886DD687-6981-4616-B4E9-3ED1F0949CE7", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17425E0B-2C3C-411B-8694-AFA4275F1A39", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "761E4820-0E4A-44F0-B738-979116586A46", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CE91665-49EC-41F0-90F0-D2C03A0A2E81", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D753EBFF-AE47-465F-8B40-30EA41C01C2F", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C0288DEE-2215-474C-8833-2F4EA16DBA0B", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21890651-67CF-4EA4-92EF-89A9060100FA", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EF8919D-ED09-421C-B649-36795689F1E5", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E0F97911-5452-4C23-A2FC-14DEC4E47433", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "582BF27D-BC0F-4721-BEEA-6B9099BBFF2F", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC186187-7420-4164-A606-B5F10DC56105", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9975567A-C169-45B9-99B1-500A96391C53", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0DC11D96-72FB-40E8-BFE1-4AFDA00DD41B", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DEBD433-A018-4AFB-992E-675C4CC5D2A6", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B0C13803-5052-423C-8C93-2C54DBCBCCDE", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "12F620D4-6023-4B41-B7DF-48A72A5C0A78", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E98BACEF-AF33-4900-A2EE-7298C0637C3E", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65E9F796-2B47-4596-B0D1-A586AF9F3C8E", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17A4C75C-5651-46DF-9E9F-0F09841B32A8", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F54552BD-1505-4D65-A5DA-0BD476B164A6", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2EB24D4F-2EFF-478A-A1F1-ADC4D2692859", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5ED0BEAE-B725-40B1-A8AF-F747A5D3EC0C", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", matchCriteriaId: "6812853E-C083-4841-A467-91130ED194BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D486D2C4-DF6F-4E8F-8BD0-5891AA8AC763", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", matchCriteriaId: "26A7AB18-C75F-4C63-9132-140EFC46E3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3436FDC5-9FC4-41DC-8989-98F6EC0BE2BC", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "A9B70093-E9FE-410A-973E-CE847F08F43A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F81A5EB6-94AA-455E-9609-035A18DDF374", versionEndExcluding: "1.4.8.06", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", matchCriteriaId: "A3503F68-CF84-468E-9A40-9F98875DD1C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4BC6336C-2351-4192-99DF-3C0A201F7593", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8141B0C-61C4-4F0B-890C-9540B579386E", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD930606-ED38-4E11-85FB-2520A85285AD", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C9FD643-13C5-4327-90B8-DEE683658874", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9BD33FFF-FE0E-4852-9F56-5843433D7823", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CC54297-D4E6-4786-8A98-D965F9EFD67A", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93099CC0-A7ED-4E27-A4FC-3FD6C4D98193", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "611F027A-1FC2-449D-AF7D-FF0D7886177B", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34E3F010-D1E9-4238-AB19-975ED5EFB5E1", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9F0F5B31-B746-4EB5-AB6A-E13602A1A3FE", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DACF69E-8AD8-4764-89A1-F158895F3084", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EFFE932F-6DCC-42B0-84FF-D172388102BA", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3AB71D4-B89C-4A08-8BF8-EEB67F3102B8", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4BC96BB1-2482-4ADC-BF0D-D6D7AEB97017", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4B1EEA1-D5B9-4D87-A2D0-7FB57163D4B1", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40B7BF3-701B-49B0-ACDA-DF4D8E88165D", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDA6CF9D-12BB-438D-807A-E4D3CE24CF8E", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F18B486C-C92E-4D4F-8206-EB8E9A3850AF", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6E9C557-F886-40AC-9B17-A3BB1773C0C8", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B885C5F5-C236-4C5F-9CAC-76F1E9464838", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7FC04842-1D72-4288-BA8C-EABA5AAB904B", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C56E6CAD-F314-4D17-8110-9C88C27D1A07", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F2519C2-F0EE-4F99-B537-23A8A48E865C", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9298FA5A-9B5F-4DCC-8FB3-F71BE7D34988", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50362982-A566-4D4C-B395-9DE48CDAE5A5", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2FB61FC6-4608-4EBE-A95F-198868E6BCF3", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "96838C5E-F1B8-401F-8A1A-6BB91756912A", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "12014E4E-78E9-48E7-915A-2166F5237BFC", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F503F055-A8A3-4782-99C8-02826AC2D512", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B0D1C787-27C4-4492-862F-C959E1EE3372", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22543B6D-96EE-4C88-84D5-6350DD0F2FB0", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43741AC4-4CD1-4F02-BC92-5A801C449DCE", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "41C1DC6C-D860-4061-B8EE-2DBDA787F1D1", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E265502-609E-4E6F-9817-9341E1AA80FD", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "823D486C-6F51-4C37-94CE-C53D6F29454E", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F960F9BF-90C1-4CDB-BAD0-CFB053E85928", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA4ED222-F963-425C-A99F-D4CACB314747", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63B2A832-8E66-49CF-99B6-9CDD1B1AD400", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B89D6B8-6A7B-4096-A3F7-7E24EBE8CB16", versionEndExcluding: "2.3.0.130", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.", }, { lang: "es", value: "Una vulnerabilidad en el subsistema Secure Shell (SSH) del software de Cisco Small Business Managed Switches podría permitir que un usuario remoto autenticado provoque la recarga del switch afectado. Esto resultaría en una condición de denegación de servicio. Esta vulnerabilidad se debe al procesado incorrecto de las conexiones SSH. Un atacante podría explotar esta vulnerabilidad iniciando sesión en un switch afectado mediante SSH y enviando un mensaje SSH malicioso. Esta vulnerabilidad afecta a los siguientes productos Cisco cuando SSH está activado: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches y ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.", }, ], id: "CVE-2017-6720", lastModified: "2024-11-21T03:30:22.600", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-21T05:29:01.043", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100933", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100933", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-02 05:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F8416CC-0A4C-4227-951B-14929E401A66", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22965552-683D-4811-A69C-4B9FB87CC21C", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C5A0ACA-1654-4A32-940C-80105E747813", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F908C393-B84F-4045-93DA-23037EA29A93", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F700C7FC-7C34-4DFA-860B-BD6BDB259BD0", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "733E125D-6914-4338-BA82-B885D31A0A32", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DE74203-4041-4F19-8E39-37581C24E6CC", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "041E477D-0D38-49F1-AB5E-BB42F9AD3DCB", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C181FD66-2C64-4DEB-A8F2-3DDF66B87447", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2BD04A21-F225-41D8-9A56-A350169432BE", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24477345-8D97-44F4-98AA-8959059D7D76", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D313EAD-CE05-4D48-A50C-98737206DFA1", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25C1B05A-2F05-4CBD-8648-FD4BF0FBDEE3", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6176441-3DC9-44FD-9751-F2AE9FD39BF3", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B71B9C17-B708-42BD-82EA-5C19B5B93B65", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B1007E9-2301-46D6-929B-1752D2704BFF", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A455130-06D1-4AA7-9F1F-4F3B09B2C9E0", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "81E67A14-67D7-446A-B16F-4546C64BAACE", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AC1A0BA-EA0F-4D31-B440-D15A4D5737AB", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B537A5CB-FE88-462B-85F5-7FEC51C244EF", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "433B833B-1E17-4FA2-A938-7AFE08AED85F", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67D32F03-1816-4C15-8BC1-97F51A9097A5", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C69A281-25E0-4B17-A610-19A2DC13AAE1", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44DAA587-1673-40D8-826B-BADAD2602330", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB3A7F3-91C2-46E7-8889-70720FC366AC", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53509E24-885E-4D5A-89F8-94D124EE2F9A", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0815568-7FBC-4794-9023-C5BDF6A2DA94", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03700689-2A5E-4155-AE32-62519DAF662C", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2DF7CF9E-510E-4F18-90F3-2244A30832E9", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EAE29E35-04DD-4BCD-966F-4023F2392E05", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "251A7270-0814-4EC1-8FAB-FAB58408626B", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC548F72-CD1E-4A77-BD94-71380A7CF7B3", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "409AD45A-3F8E-4AF6-80E8-4D6449AC6EEF", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BCDD945F-E5BE-41B7-BB2F-F5657B2DA8E3", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB233D2A-10E4-47BD-980C-E2047113F3D0", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A6CB98E-0CDF-4AEE-8681-30A3DD796B3A", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D8092743-980D-442F-958D-A804FF7D9F77", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42433AA1-CAE4-43C0-AE87-8CD406BB7BFD", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "95BBEB9F-6574-4B6D-ACC3-EA0E1C3E6A7D", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE960080-B027-4ED8-A99D-D03A6487D1CC", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "20AA691F-D07D-4484-8024-C03B935A8AB6", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F99C124E-2554-413A-99A7-D2BD86F24C65", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A00ABB6-25AC-41C9-BF5F-5B88CA69DB74", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9D2CA1B6-6520-4658-AAD0-AB8997E61097", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C58BAD66-6CAB-4021-8466-F4C8AEE3E66B", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21BA4FB4-965E-448F-8049-74C9E0F5E13C", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DD221AC-9D30-4B8E-9D15-DBE4DCB5AF72", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A38B9E3-B6D4-4218-BA85-993853A2943B", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F861ED41-C075-4908-8862-C80410F26D17", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCABDD82-A432-4E28-AB6C-9150102F89BD", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29D14CC5-370E-4822-92ED-B5E0D43E326D", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC4F63DF-1762-45D5-B157-44812D65F8BE", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "99157B79-030F-4C22-BC2C-658CB6F7E929", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1FF0B49-0054-4FB1-A882-7ACEFF08FFFE", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52FBF38D-F5CD-4966-BE01-F91DEFA72E70", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F94A2C0E-D26A-44CA-8B90-05A9C281F16B", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23F9A26A-4226-4050-BEB4-0D716B1F676B", versionEndExcluding: "2.5.5.47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE54B823-D772-49CF-9BA4-D8056C31A915", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC963AF6-F648-4A5B-84C6-1D5823222527", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "471C22F3-B110-46E4-BA52-8FDA4412EA0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47341322-B516-4957-8CC0-5F34D8983937", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB592B62-F1DE-4BF5-A975-345483C37949", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5351275-B6BB-4C0B-B6BE-04AD6B87DC89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6BE5BB77-2B41-48BF-BEA7-F1DF1342D0B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22A38A8A-081E-4471-8A13-0AF6AB7339C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "CDB01A53-2BC6-4F93-B873-1C9E2B67EAB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C879A7D2-34FC-4BF0-8845-CA358BED3B88", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-48:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB459E5-A7B1-4C99-9E08-0EAFD8690F84", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200e-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B28A1C-B891-4D1B-A91C-7DC88846F726", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200e-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C31245AB-ECAD-431D-90C5-C33D3F78B09B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5A806E-4E9F-45D2-936F-F9416342FBA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196E58A-FF08-4086-8B89-42DF19A3E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48A444FC-D2A5-4847-B616-F5E729F10C75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03699C15-D612-4CEC-923C-7E69CC6F6C79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6BCF751-3356-41C4-811E-B7CF56E63A7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "75AFA3D3-E364-46B6-A93F-04A75CB77558", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F13F3D35-4661-4E09-A970-F6AEC950ACC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B78DFA9D-05FD-404C-8546-86DC2A7F306C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D26514DC-FD8C-416B-AA7E-F62208F5E5E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBF6EC3F-225D-48B5-82C6-9559BE0B653F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0DCC3DF9-71EE-4503-92E2-74D19DD8478B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "582CD84B-C24D-43DD-8000-CA9BD41771DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "257121AF-7D08-40FC-BC75-BA0E29246B16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "731E458C-B7AA-437A-AA22-023AE746044A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBE8C75E-5727-43AA-8F27-9368C60C1DD1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "375B4C7B-4A60-4CCD-8656-C674D734FA10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C2537192-BED2-4B18-966C-E10F155ED1CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2E280C1-B685-4813-A8B9-4A654FA3222B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "96D82748-7475-4E94-928B-05D45D7AD2F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E5B39775-5AAF-4A0B-83E7-D6102D75C404", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22A19260-8730-42E6-B7B4-DCC7BEA6274F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AEA9482-67E6-4E6B-8A45-24908BB40C1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3012AD17-508E-4860-897B-4F9644BFEC03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4BE2BCF-A130-449B-B50B-0D5414DDD18C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30AA113A-4967-4554-8AE6-BA51C9A5F2C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0F73C16B-814C-447E-84C2-893B9ED90693", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9D4EE51C-F69E-412E-BE53-00B377564D01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48E2C7ED-765A-442D-8FC6-5D769AD05251", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1431252-1FAE-4492-A7C4-69D47BBEB228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41E2FD03-6870-466F-9389-6D044BAC5DA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA293370-953C-42ED-BF25-4C439A8D986A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9B7BB55-2872-411F-8E0B-EED8746FA013", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.", }, { lang: "es", value: "Una vulnerabilidad en la administración de la sesión para la interfaz basada en web de Cisco Small Business Smart and Managed Switches, podría permitir a un atacante remoto no autenticado vencer las protecciones de autenticación y conseguir acceso no autorizado a la interfaz de administración. El atacante podría obtener los privilegios de la cuenta de sesión secuestrada, que podría incluir privilegios de administrador en el dispositivo. La vulnerabilidad es debido al uso de una generación de entropía débil para los valores del identificador de sesión. Un atacante podría explotar esta vulnerabilidad para determinar un identificador de sesión actual mediante un ataque de fuerza bruta y reutilizar ese identificador de sesión para asumir una sesión en curso. De esta manera, un atacante podría tomar acciones dentro de la interfaz de administración con privilegios hasta el nivel del usuario administrativo", }, ], id: "CVE-2020-3297", lastModified: "2024-11-21T05:30:45.430", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-02T05:15:11.260", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-15 22:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108335 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3812C044-AAE0-4947-8814-42AB027FA25C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F09091AA-3F14-4F0C-93CE-52057B592EFF", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "749CB002-2803-4CD9-8E86-40D597C1FD06", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B8D9704-E3B8-4CF7-95ED-377401763CEC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A26421F1-8EE0-460F-A3E3-C3714F129A13", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C9D6D19-275C-437D-AE48-FBC8335E03C9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A44AF7A-62E4-41A7-836D-06A2736B8127", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F26E3FE7-D289-4B77-B21A-F52B251570ED", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5DC8656-4A5B-499C-A929-41D143010B48", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2EC7D13F-C2E6-448A-A385-C83425DF4930", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4421B4CE-EB60-4B35-B744-9B87488498F6", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "994DD7E5-8492-466C-A717-501AEF588D06", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9522A5E7-7DA5-4FA8-804E-2187E6D96473", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A85EE56-BD68-43B5-B132-CD73826A9398", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5800AF7B-2853-4440-BBA3-F70CBFF1837D", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E2F781F7-F4A3-493E-AD32-26CAC666FE82", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C410556A-C347-4406-9456-BD2404C495C9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "158C8920-8291-45A9-9D0B-EFD336C6173B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "FAD69957-B714-406D-9775-92A7D993BAC6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2F504C5-4906-4097-84C4-B140BCA5D96C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33FDFEB2-0055-4534-9C6C-56EEBAC02955", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "88C78582-B6F8-49E8-B220-1003D28242E7", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0086C004-55F6-48B9-A2FA-515A0DF2C480", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5791096-634C-4886-8CEA-669D817A26B9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72BB6D66-B721-4E56-962F-8BA34BBC9D34", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C76475A4-60E5-4E1A-A8E0-85FFE7975818", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C499B344-1B59-402D-AAF8-1DF2593045D6", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D99503A8-C123-41BF-97A4-E61A024CF4A0", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B316C88-0E9D-4DAC-8603-CD2A008B1026", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "193C6F24-7C86-4F33-829B-B79B534866FB", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "366DBF40-ECAC-4D77-A729-3393A207CA55", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5225175F-DA64-4807-955C-88136EFC1887", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D30F5D73-F421-45BC-B0B6-314D95333ABF", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8723C660-F052-4C9B-ADD1-8484C7209701", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B244259-7051-4205-818E-19D05CACD0B9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F4B49F4-0B5C-4C0F-855F-B726D0E05EBC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "C6E049B2-C818-4929-8DDA-3B38BF8C7B3A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04C2E571-AB33-4912-B62C-A58EB4DC6937", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "368AF76C-AA91-4DDB-BB72-6A975C79E59E", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "510EECC9-432D-42DC-96F2-CF965FB193BC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E8BAB8D-715F-4144-B224-9EC5B71C849A", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "D21DCD62-38AE-483E-A807-ABA90D6F7642", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE4237E2-3C18-4C51-8636-8D8BAC324956", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A295F93-D3F8-46AC-8A02-9BF53D20B7FC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "3EFED2B8-060D-470B-B19F-3134E2BAF915", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CCDFAA9-6F1A-40A7-8C18-729B6676496B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E410FC08-9222-48FC-8F79-2F8413B8570B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g52dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE3F7191-465B-44BD-AC81-897684BC17AC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g52dc:-:*:*:*:*:*:*:*", matchCriteriaId: "AB0A5845-F7B6-41DE-A4EC-AA9F4D2A3884", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x48dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2374880-D2E6-4750-8266-B282B446021C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x48dc:-:*:*:*:*:*:*:*", matchCriteriaId: "17FB5C8D-F3A3-4C76-B721-37157B45CAF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "842B9A79-D574-41EB-8027-9038FC0E3F64", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B12D57C7-8A54-4124-8E1E-37F03A5C985C", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53AD939F-CD46-4127-BED2-C90D9219367F", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "548424AC-7644-4FEE-88A7-24C7E7F814A1", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2203C60A-0069-4F5A-AAD7-BA99A45DC779", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AF4A347-A9EC-443D-8244-9CCF18E857C3", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCE45D7A-2724-45C3-A41F-9E38D37932C5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E99E251-5F53-4968-85BC-A0EFA7891917", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F09CCE38-1E2B-4BD1-96B0-535A51BD698E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9BB8399A-B1AD-4201-9A85-AE332F8D46DC", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71C37F67-8132-4A19-A702-7B6C60F9897E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13DBAA04-CE95-4549-9457-4900AB3D1A8E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4490464D-BAC7-489C-A2C1-4971AC8B7F54", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF659800-49AB-4416-B6F3-FF5F8F41C72B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAC0FB45-E376-4EFF-8866-2E42494296BB", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3623874C-7E67-40AF-A094-499E1857D048", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E417898B-0AE2-45AD-944A-9EE6D806CD8E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23356E45-B7B2-4A32-B821-D1C53D3FD6A5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDB5362A-022F-42F8-AD49-C2557243B972", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1175B98B-DFE3-4A48-A453-80FA643EBD35", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "991DA0D7-7142-4EC1-8991-195D2F5D0B31", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BC93E7A-6055-49E6-AEC7-F819113D902E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "645781BB-E440-42F9-9369-495366447B30", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FB911D6-F531-42DC-9537-B7DF20A09CE3", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C758954B-BCD6-4C06-844E-C0FB1626D024", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57E6CA13-6231-4722-90DD-4495F4C10E0B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DEB673A-B39B-49DC-9CF0-D1E636068E75", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "107F975E-EEE4-4F40-BDCF-9E5F86528982", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91AF6345-7D52-4467-9864-C63F888613AF", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "94B2FC17-14E6-41C9-B3B2-D8791EB1379C", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28EC4789-E1D6-47A4-A92B-0F6196688159", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4A9255C-6562-4DBC-A42C-D5D74FA948C5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52978A27-0D0E-4DB8-B988-D5E6F608DC1B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38531BE0-3233-44F9-9F91-74A479CA27C5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7EB87CFE-3151-4473-A006-258325F2E079", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad en el procesador de paquetes de entrada de Simple Network Management Protocol (SNMP) de Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches podría permitir que un atacante remoto autenticado provoque la aplicación SNMP de un dispositivo afectado para detener el procesamiento del tráfico, lo que hace que la utilización de la CPU alcance el cien por ciento. Puede requerirse una intervención manual antes de que un dispositivo reanude las operaciones normales. La vulnerabilidad se debe a la validación inapropiada de las unidades de datos del protocolo SNMP (PDU) en los paquetes SNMP. Un atacante podría aprovechar esta vulnerabilidad enviando un paquete SNMP malicioso a un dispositivo afectado. Un aprovechamiento exitoso podría permitir al atacante hacer que el dispositivo deje de pasar el tráfico, lo que podría resultar en una condición de denegación de servicio (DoS). Cisco ha generado actualizaciones de firmware que abordan esta vulnerabilidad.", }, ], id: "CVE-2019-1806", lastModified: "2024-11-21T04:37:25.137", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.1, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-15T22:29:00.247", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108335", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108335", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFFD881A-0D7E-401A-A69C-397E476E5DAD", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0FE0F973-8476-42C9-B05B-48BE34717CAC", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54584C84-2CE8-4E73-B58D-AFB3C8D7659E", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E94525F-05C6-4425-8C8B-8671F1EDA9A7", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05645288-92E8-4F21-80CB-39A5A31954F2", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8799EC0E-350D-43A6-AE31-68629A637308", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C73BA34-BDF4-4242-AEB5-D867BC5EF599", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F55B1A59-BF4A-4E96-82D6-2B604681E027", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6282A87C-6F2B-41F8-A53F-44DDDC437995", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1EE55BC7-8F28-47BB-8296-101B13E78C9A", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B22E45C4-B481-41AF-9D8F-DE705481DEF5", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCE3A235-E171-4682-AE90-F6D8FEAD96E8", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D0E9ED8-92E6-4492-9FE0-CD2A851970DA", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BBAFD98F-6F06-4C95-9A32-FC9EEC894059", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0D11848C-C027-41A4-8A6C-4E0E36AC2278", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7CCB2E7D-E353-4F68-90B9-D0FE415E5E29", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1080FE18-DD22-4E9B-A518-47026A848345", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC6B9FEA-A8DC-42FF-A435-A953AC185E3D", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25E8F696-D786-42CD-95C5-DE1E340A93B3", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B7FB78FF-A40D-45AD-8BF3-6277ED7A369F", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "92CFC5EA-BCB0-435E-960C-70C9171A54F3", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AB84F179-6915-4FBE-ABBE-D4F346A332E1", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4CE16A79-8601-46A7-B0B1-B9E7FE70CEAF", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "288A47B7-0EC5-4484-A0E4-F1B8AEC2CCC4", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67F78985-6305-4EB7-BD66-40EAB975F141", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "95756431-612D-422D-9DBC-61AF92F75432", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63DE059C-D45B-4B1D-9DEC-908028E6099F", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8340CD09-7FB0-425B-8262-C812D7B720DF", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "387B7C97-5AFE-4C32-93D4-B7236A0B70ED", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63159E4B-585F-40E9-981D-E2D569701DAE", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F983A1DC-807D-428E-A1E0-AB19BC2B46D1", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78D19883-F410-45F5-A04E-06A011D7666B", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9470B5BE-AB7B-4A33-8A22-D5C86E842FC7", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA285AC8-75E0-44FC-984C-DF8996F69817", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C8ADDA4-FD34-4AA4-8D92-0EFF279B669E", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0E2340CE-7F99-460A-AFD9-4AEEDDE5D789", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E1CDA64-2C97-4CC8-87A2-5FC6F23FC4DE", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3BE76CBB-9934-467F-B918-4C3D6C1C33E3", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1623541C-0521-432F-B7A0-0983C781255E", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "026C8FB0-AF69-4F7A-8068-8E92D1BCB73E", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86A7B907-DC97-4D58-9F72-063D8A526994", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "97DB2F1A-B496-4CB6-B632-7B4A2C3CB14D", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B288B192-45F7-4475-8DC6-A9E3D01E2028", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E62AA8CE-38C4-4079-97E9-A8FF23D236E6", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B6A5155-624E-4848-835F-FBCBE22E8F31", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59300A75-74B3-4411-8380-FDA62C8E826A", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E77ADA37-65DA-49CC-85FE-03D242AC2878", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9EF02C4-A24D-4A91-AD41-9F7D3C3CA2BC", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C621580-9656-4F3A-BF2D-6E97E9C1C943", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F79C2721-B554-4C77-A423-0EC44A07C2BB", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "222A1120-8920-4445-AC3A-3A2752141D61", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F28F657-840F-4EF3-BB3C-6BE2EFA33FB0", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00E8213A-63DB-4649-948A-478D094641BC", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF65FD90-F675-4056-8BA7-F20876B89E99", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "12D4A95A-9758-4EFC-B690-E6A5D4CF260E", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD243F82-C133-48B5-A55C-448C9B6C2012", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52237767-13BF-4B22-8322-4FA4DD9D56B3", versionEndExcluding: "2.5.0.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86CB6AD6-2606-4A19-844D-5CAA971E83C2", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9816F54-BA63-473B-BB4B-711722302517", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E8557B1-BF19-4BD7-BB2B-4EE1A55E09CE", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E68B7353-2034-4D3E-BBD0-CC8FFF55FA55", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B053CCA-DF85-4885-915F-5724D961514A", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FF7ADAE2-5201-476C-9B9E-3EA0AADEB047", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "425EF609-83E3-44D5-88B2-81C873BB1C96", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E7DDB5A-7D50-4C4B-950A-9DC77B342109", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6257E14D-BFE3-44E8-AB83-1B2096BDD87F", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F47DF59-773A-4BED-A548-BAD4E1612039", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "92C177B6-2FA8-486E-BDC9-8B69CE2C71A0", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD56251F-EE7A-4605-A9A0-180D0B68D67D", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54629245-E4CC-42D6-9AE5-6682EB673C91", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E0E9BF06-F9F3-47F1-9ACF-1C9875D34A2D", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EBCA2440-DD3B-4C6F-BC21-1C65A53948E7", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86CB6AD6-2606-4A19-844D-5CAA971E83C2", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E9816F54-BA63-473B-BB4B-711722302517", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E8557B1-BF19-4BD7-BB2B-4EE1A55E09CE", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E68B7353-2034-4D3E-BBD0-CC8FFF55FA55", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B053CCA-DF85-4885-915F-5724D961514A", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FF7ADAE2-5201-476C-9B9E-3EA0AADEB047", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "425EF609-83E3-44D5-88B2-81C873BB1C96", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E7DDB5A-7D50-4C4B-950A-9DC77B342109", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6257E14D-BFE3-44E8-AB83-1B2096BDD87F", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F47DF59-773A-4BED-A548-BAD4E1612039", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "92C177B6-2FA8-486E-BDC9-8B69CE2C71A0", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD56251F-EE7A-4605-A9A0-180D0B68D67D", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54629245-E4CC-42D6-9AE5-6682EB673C91", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E0E9BF06-F9F3-47F1-9ACF-1C9875D34A2D", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EBCA2440-DD3B-4C6F-BC21-1C65A53948E7", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "770E9D23-8366-494F-93DB-2C15CEECDB03", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03FE59DE-65A4-4969-B189-9EB1FDAC17C6", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EB3F54F-853D-48DA-85D7-08F7251CADEC", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33D30A71-3EC8-436E-B6EB-8F85749FBBB0", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7032AF3-FDDA-4AAB-843C-6EE000CA9BC9", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44DA72EA-B8A7-438F-8E41-FB1F667AE5A8", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAD56B74-D6FA-459E-A108-6AD1275EFE8A", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13877EA7-43C4-4171-A26A-372396950EC2", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "350B373C-2C15-4763-95AD-FE7639CB0DEC", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50C8BE22-9B68-4185-934E-14931A75D182", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D8E76F73-8ABB-4EB5-AEF2-74363650C84C", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C76BE1-CD8C-483D-B4BD-BCA99CCC8B2F", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "748EC0D2-60BC-4813-9FF4-7FAD6F242053", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F32367C8-388C-4A99-9731-16AF03CDB74C", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6E3B1BC2-EF01-4AD6-922A-9A4377974CA0", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA354974-6FB9-4AFD-8118-194E12AA109C", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39BE8486-4F69-42C1-B5D1-1A75B9743231", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C8337FB8-A6B5-49A1-B356-BE2BB3E4F3CF", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB1E6D8C-3DDB-43F0-BB04-0990AF1D4C2C", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4209B3-FABB-47D2-9E4B-DAD439E3E91D", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7C8FC7CC-1D31-4328-8F0A-9D73313FB261", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05D941DA-1558-4801-AC54-3BEC8A0F188A", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C1EA0FFC-79DD-4050-9014-1A4EB234BB11", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC1B84F1-DD45-483C-9C1B-9A0491D8B2CA", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A79CA958-9B1E-4B6D-9555-B893971CFD54", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00B7EBA0-1F05-4D4B-B2EC-F0EC6AE692BF", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CF1D6CB-5064-430A-8988-56FAA6DE63C9", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2470A37-530B-456E-8FE5-4D8274304135", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3233C427-6F16-4577-976D-DE1A36A5B5C4", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5EDC52AE-0844-46E7-ACB4-BB32D70E1C4A", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30223810-0822-4406-A781-A5049A4B6A5D", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D33D14D5-7F36-4374-B92D-60F63DE9DA80", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B909EAA7-2B09-4AE1-8248-E32EC5CE11F8", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB386177-1DE3-4223-A217-74060E907787", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "205F2AF5-BA3C-4516-8B2C-88D9B897C6F4", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "928646A6-E198-4F88-B084-F00987B9F8E6", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75416DF8-226E-48DE-9216-0458DC6D1E55", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1E4B6200-3241-4FAD-8AB7-7E19856BF032", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EBED6F3-7B67-416F-A368-0519B42E7AF9", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "483A0D55-30E1-4D7A-ADE6-1F55608AD932", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "129DA779-09A6-4A3B-AB4B-25FC3C3EBC1C", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53751D31-23FE-49D6-938D-638149553758", versionEndExcluding: "1.4.11.4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.", }, { lang: "es", value: "Una vulnerabilidad en la Interfaz de Usuario web de Cisco Small Business Switches, podría permitir a un atacante remoto no autenticado acceder a información confidencial del dispositivo. La vulnerabilidad se presenta porque el software carece de controles de autenticación apropiados para la información accesible desde la Interfaz de Usuario web. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP maliciosa hacia la interfaz de usuario web de un dispositivo afectado. Una explotación con éxito podría permitir al atacante acceder a información confidencial del dispositivo, que incluye archivos de configuración", }, ], id: "CVE-2019-15993", lastModified: "2024-11-21T04:29:53.367", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-23T01:15:13.410", references: [ { source: "ykramarz@cisco.com", url: "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200129-smlbus-switch-disclos", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-16", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-03 17:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F26E3FE7-D289-4B77-B21A-F52B251570ED", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5DC8656-4A5B-499C-A929-41D143010B48", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "577A47E0-77CA-4DCF-AC10-F47DD7DE8C48", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C9D6D19-275C-437D-AE48-FBC8335E03C9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A44AF7A-62E4-41A7-836D-06A2736B8127", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBE35256-0B87-4C1D-915A-E34DAA6772E1", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A26421F1-8EE0-460F-A3E3-C3714F129A13", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "64AED79F-7321-4A57-80AD-7B186AC1904D", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C729335-3E5C-43DB-9DB5-300A1C2DA4F3", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83310D13-587A-400F-B1B6-58D9C3220D3C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3812C044-AAE0-4947-8814-42AB027FA25C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F09091AA-3F14-4F0C-93CE-52057B592EFF", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACE36DF5-EAE8-4930-AD40-1CBCF5D7ED53", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "749CB002-2803-4CD9-8E86-40D597C1FD06", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B8D9704-E3B8-4CF7-95ED-377401763CEC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72BB6D66-B721-4E56-962F-8BA34BBC9D34", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "994DD7E5-8492-466C-A717-501AEF588D06", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AEA56AD-84ED-4B3A-9C36-A8336365BADA", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "193C6F24-7C86-4F33-829B-B79B534866FB", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C410556A-C347-4406-9456-BD2404C495C9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "88C78582-B6F8-49E8-B220-1003D28242E7", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B316C88-0E9D-4DAC-8603-CD2A008B1026", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4421B4CE-EB60-4B35-B744-9B87488498F6", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A85EE56-BD68-43B5-B132-CD73826A9398", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2EC7D13F-C2E6-448A-A385-C83425DF4930", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E2F781F7-F4A3-493E-AD32-26CAC666FE82", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5791096-634C-4886-8CEA-669D817A26B9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5800AF7B-2853-4440-BBA3-F70CBFF1837D", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D99503A8-C123-41BF-97A4-E61A024CF4A0", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2F504C5-4906-4097-84C4-B140BCA5D96C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C76475A4-60E5-4E1A-A8E0-85FFE7975818", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0086C004-55F6-48B9-A2FA-515A0DF2C480", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C499B344-1B59-402D-AAF8-1DF2593045D6", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9522A5E7-7DA5-4FA8-804E-2187E6D96473", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33FDFEB2-0055-4534-9C6C-56EEBAC02955", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02FFAFD4-2C33-458D-80BF-CEE6359A9B10", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7683ED86-436C-4EF4-96E0-FD9FA3DAC390", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04107C2D-731C-4F63-942B-725A478EDF2A", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "366DBF40-ECAC-4D77-A729-3393A207CA55", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5225175F-DA64-4807-955C-88136EFC1887", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B244259-7051-4205-818E-19D05CACD0B9", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F74383D9-2C00-4BFD-B0FC-DDF2EF127526", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4E6CDF62-5CB2-40D0-99D4-5CCE18955F4D", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04C2E571-AB33-4912-B62C-A58EB4DC6937", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "368AF76C-AA91-4DDB-BB72-6A975C79E59E", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "510EECC9-432D-42DC-96F2-CF965FB193BC", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FD8F047-9F27-42FA-BD09-B93D7CFF0F6B", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3272A7A2-2B7D-4E8D-88FF-9BC0DFE24D4C", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE4237E2-3C18-4C51-8636-8D8BAC324956", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FC82A2D4-5127-4EB2-A4D1-150A63E8D031", versionEndExcluding: "1.4.10.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "842B9A79-D574-41EB-8027-9038FC0E3F64", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B12D57C7-8A54-4124-8E1E-37F03A5C985C", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05EB6756-BCF2-4477-8AA2-2B24F00EB1C8", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53AD939F-CD46-4127-BED2-C90D9219367F", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "548424AC-7644-4FEE-88A7-24C7E7F814A1", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2203C60A-0069-4F5A-AAD7-BA99A45DC779", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C177A4D1-4D0A-4BE1-AAB0-4F11802BE3AE", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AF4A347-A9EC-443D-8244-9CCF18E857C3", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCE45D7A-2724-45C3-A41F-9E38D37932C5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8E99E251-5F53-4968-85BC-A0EFA7891917", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F09CCE38-1E2B-4BD1-96B0-535A51BD698E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9BB8399A-B1AD-4201-9A85-AE332F8D46DC", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71C37F67-8132-4A19-A702-7B6C60F9897E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13DBAA04-CE95-4549-9457-4900AB3D1A8E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E98DD16-7C7F-4A44-AC65-BFD2A28D7D61", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4490464D-BAC7-489C-A2C1-4971AC8B7F54", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF659800-49AB-4416-B6F3-FF5F8F41C72B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAC0FB45-E376-4EFF-8866-2E42494296BB", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3623874C-7E67-40AF-A094-499E1857D048", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E417898B-0AE2-45AD-944A-9EE6D806CD8E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23356E45-B7B2-4A32-B821-D1C53D3FD6A5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDB5362A-022F-42F8-AD49-C2557243B972", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A47E55F5-17DF-45EB-B3E6-4C73B8B2DB3E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1175B98B-DFE3-4A48-A453-80FA643EBD35", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AD51DB4-E33C-4F01-B8FC-7D1A65FFCD52", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "991DA0D7-7142-4EC1-8991-195D2F5D0B31", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BC93E7A-6055-49E6-AEC7-F819113D902E", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "645781BB-E440-42F9-9369-495366447B30", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4BEF14AB-1A92-4FAE-B8AB-CE08BD23626B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F7555C1-DDEB-4E50-A19E-A76FB9E38DE9", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13ED47EC-DF8C-492D-915E-37D81B29F6AA", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F03E3B0-B272-419F-AB11-8D4D932D26B7", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51C774AC-3F98-4DB2-B022-1CA00461293D", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4FCF7D-2669-4615-A35A-8FEE133DC93C", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F48B631-F727-497F-B139-54174DA63EAA", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC5D6EC8-B27C-412C-9A52-DB596BA4A4F3", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7463A23D-539F-485E-8C99-75D7F2E6A19F", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC1C0736-BDCF-4028-899E-985DFBABB6D6", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FB911D6-F531-42DC-9537-B7DF20A09CE3", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C7EA949-B771-4F17-B4A3-B1AA8BA1A0BD", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45CC2C4D-9ECE-4DE4-8EBD-FC2B9BC93490", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA54D5D8-55BC-4B7C-BEC1-01B9332B01FD", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C758954B-BCD6-4C06-844E-C0FB1626D024", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57E6CA13-6231-4722-90DD-4495F4C10E0B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B82B2A1F-34B7-4A76-B0C6-F9B18871A7FC", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DEB673A-B39B-49DC-9CF0-D1E636068E75", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "107F975E-EEE4-4F40-BDCF-9E5F86528982", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91AF6345-7D52-4467-9864-C63F888613AF", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F9A572F-EC0F-4359-B4D8-8C2CE90424BB", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "94B2FC17-14E6-41C9-B3B2-D8791EB1379C", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28EC4789-E1D6-47A4-A92B-0F6196688159", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D99F0229-FA8B-4509-A07F-F52B5DF5ABC8", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4A9255C-6562-4DBC-A42C-D5D74FA948C5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0C6F64E-2CF6-424E-BFAE-C5E0EF54DEB5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52978A27-0D0E-4DB8-B988-D5E6F608DC1B", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "38531BE0-3233-44F9-9F91-74A479CA27C5", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7EB87CFE-3151-4473-A006-258325F2E079", versionEndExcluding: "2.5.0.78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default.", }, { lang: "es", value: "Una vulnerabilidad en el proceso de identificación de Secure Shell (SSH) del programa Cisco Small Business Switches podría permitir a un atacante omitir la autorización de certificado del lado del cliente y volver a la autorización de contraseña. La vulnerabilidad se presenta porque OpenSSH maneja de manera inapropiada el proceso de identificación. Un atacante podría atacar esta vulnerabilidad al intentar conectarse al dispositivo por medio de SSH. Una operación con exito podría permitir al atacante acceder a la configuración como un usuario administrativo si no se cambian las credenciales por defecto. No existen soluciones disponibles; sin embargo, si la identificación de certificado del lado del cliente está habilitada, desactívela y use la autorización de contraseña segura. La autentorización del certificado del lado del cliente está deshabilitada por defecto.", }, ], id: "CVE-2019-1859", lastModified: "2024-11-21T04:37:32.957", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-03T17:29:01.500", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-285", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-295", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-11-08 17:29
Modified
2024-11-21 03:50
Severity ?
Summary
A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/105873 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105873 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE1F4AF2-7330-4535-900E-B4A2A6B76A8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*", matchCriteriaId: "D0219D69-91AE-4558-BF12-93BB82D74A48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03699C15-D612-4CEC-923C-7E69CC6F6C79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "82842273-F24B-4210-8E07-5F7253018FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-50fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48A444FC-D2A5-4847-B616-F5E729F10C75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*", matchCriteriaId: "64E81B93-C7DB-4CC7-9FEA-914C853411B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196E58A-FF08-4086-8B89-42DF19A3E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*", matchCriteriaId: "9F2F454F-9084-4AD8-8F81-45A4AFAF63B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0419BDEB-DADB-4D0E-A747-6EEFF9D3A26B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "0A30A529-9796-4D10-AE55-698930E95CD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-26fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E9702EE3-E077-4F70-AD90-EFD168BFCCBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D0ACAD62-EA73-494C-8244-541642C3E397", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-18_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE91F6B0-635D-48B3-BBB2-C9A6AC367815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*", matchCriteriaId: "DCD5CDA0-F982-492B-B631-6B0958F82A7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-10fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5A806E-4E9F-45D2-936F-F9416342FBA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*", matchCriteriaId: "D173967C-5FF3-49DE-863B-26F7DF8B5F01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "24AF3A3B-93C1-4DD6-AFEC-60B3E7FFB114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*", matchCriteriaId: "335CA93E-604D-4060-9D24-E4E9D7740A3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg200-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABE4DDC3-43B2-4487-90FE-A3529D3A5AA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "CB844823-174D-487B-A211-E650D638A010", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE54B823-D772-49CF-9BA4-D8056C31A915", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*", matchCriteriaId: "1866B4D0-0FF2-4C79-A07B-4FAE5586F7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "471C22F3-B110-46E4-BA52-8FDA4412EA0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "B4A8518B-EE72-4CEA-B2A8-9F17898F4476", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-24fp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC963AF6-F648-4A5B-84C6-1D5823222527", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8A349B-73D2-4010-90C2-B153B3245487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47341322-B516-4957-8CC0-5F34D8983937", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*", matchCriteriaId: "19F27801-DCF0-4843-90F8-2A1694BB29E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf200-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB592B62-F1DE-4BF5-A975-345483C37949", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B12AEA51-CF3B-44CC-9943-E370A29EFDC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6BCF751-3356-41C4-811E-B7CF56E63A7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "75AFA3D3-E364-46B6-A93F-04A75CB77558", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F13F3D35-4661-4E09-A970-F6AEC950ACC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B78DFA9D-05FD-404C-8546-86DC2A7F306C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9BD15BF8-7DB4-4138-8D59-EE06165DBCCD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D26514DC-FD8C-416B-AA7E-F62208F5E5E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBF6EC3F-225D-48B5-82C6-9559BE0B653F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0DCC3DF9-71EE-4503-92E2-74D19DD8478B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8BF48B8C-7C69-4BE7-9A99-B0FF04C61F5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8C0C7F6-B4EE-4242-A26D-0CEE850C83EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27A1E68F-8FD0-48EF-9B20-20B1EB5B81B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "582CD84B-C24D-43DD-8000-CA9BD41771DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "257121AF-7D08-40FC-BC75-BA0E29246B16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "731E458C-B7AA-437A-AA22-023AE746044A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBE8C75E-5727-43AA-8F27-9368C60C1DD1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "375B4C7B-4A60-4CCD-8656-C674D734FA10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F4765E-0A9A-4BC8-BDC1-EE1340A53048", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C2537192-BED2-4B18-966C-E10F155ED1CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2E280C1-B685-4813-A8B9-4A654FA3222B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD19ED04-BDAA-4797-8B9F-28CB5BF9C5DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "96D82748-7475-4E94-928B-05D45D7AD2F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E5B39775-5AAF-4A0B-83E7-D6102D75C404", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22A19260-8730-42E6-B7B4-DCC7BEA6274F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AEA9482-67E6-4E6B-8A45-24908BB40C1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3012AD17-508E-4860-897B-4F9644BFEC03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4BE2BCF-A130-449B-B50B-0D5414DDD18C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30AA113A-4967-4554-8AE6-BA51C9A5F2C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E1FAC9E-45D1-4CB9-9BB2-389427199D52", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91A93E7F-A05D-4617-9BB9-6962CDB08AE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0F73C16B-814C-447E-84C2-893B9ED90693", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6E4A156-2BF5-4F65-916C-E94AD6F899A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0ACD1A2A-9CCE-4A92-AC7B-9921172F1BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A1075B-47F6-4361-9FAC-4FCE932ED61D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9D4EE51C-F69E-412E-BE53-00B377564D01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "48E2C7ED-765A-442D-8FC6-5D769AD05251", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1431252-1FAE-4492-A7C4-69D47BBEB228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67BE410C-FF81-4D5D-8C81-15A4C0E02E4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41E2FD03-6870-466F-9389-6D044BAC5DA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA293370-953C-42ED-BF25-4C439A8D986A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C3F89D89-F7E9-4BC2-9A5F-3689930DAEF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9B7BB55-2872-411F-8E0B-EED8746FA013", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E70A5C52-9C3B-4FA8-9208-FF19200BD3F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF693F4-E085-43E1-81CB-F4365E173FFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "EDF0F571-4139-411C-9E9F-4974AB9ED29E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3521F951-DA4C-48C9-8FD0-CAD4328E61F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "850829DF-9613-4E1A-9D9A-A74D3AD8BA14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37654BAD-A965-4680-9496-2527CC20574F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C050FFC6-FB6E-4AEC-830A-856B9E728D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EDCF275-D322-4551-B072-CAE85047759A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "4AD1B2A7-B9CD-439B-B55E-D5AF769228FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5BB3C8A5-8918-48A9-A8FB-12F0E694247B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A7F2D0-9E2B-4162-8F31-BE44BCD3BDCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-08hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8BD64ED9-F8FD-4C26-82F9-C4D84D14681D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*", matchCriteriaId: "C733117C-BFAE-459D-A9E2-5082C77A4D22", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4DBA145A-98C6-494C-A488-37122AC62C91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9AEADBBF-9E5B-435E-BF81-3D2DBF369D33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-18_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B94C85-629E-4911-B55E-53B6D86BC603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*", matchCriteriaId: "72500D80-4EC8-4B49-8C22-FA19E03491DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56A0D3C4-B134-4709-BA6B-1D376A7D4696", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*", matchCriteriaId: "7CDA0852-1A08-4327-ABEE-9A1059DFE9BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "027E1D98-A934-47E3-A3CA-813C3E581A58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*", matchCriteriaId: "9610ED5C-26BE-45A6-B6DD-00DA6AB0F57D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-26p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8407005-2954-482E-A2BE-64FA81DB8C82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*", matchCriteriaId: "4B19804D-C92A-4758-A2CF-E3D4D6ED65FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B91858-B62B-4EB8-86F4-E16A2FE2E38E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*", matchCriteriaId: "AF27F695-F2EA-43C9-B283-E7EEA70CB0F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04F3DD74-DD70-4154-854D-C125A3065735", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*", matchCriteriaId: "7885727C-5100-49A7-909F-D4DF545BF65D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg250-50p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "14F3604E-EC92-48A8-A0BB-AC848AF188CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*", matchCriteriaId: "0DB6FE78-C783-4A7E-90B0-ABCDA72E2D8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "88E933E3-12C4-48A7-80A7-BD3C6D99F21E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39ED032-60A6-4CF4-8BAD-9882168BC0D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4310B268-A950-4214-806B-2E2C5C85546C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "9744BB70-191D-49D0-A03A-0B97187CACB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0BF81119-6931-4423-BC37-085C772165DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2D71F-2DD4-486B-8843-92CA3672B95E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf250-48hp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8915A14C-5C9F-443C-95CA-A3DBBEFAE8C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*", matchCriteriaId: "D555470E-9E28-4F37-BD09-EC789788772E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A655D736-2E6B-4DA0-878D-419B17DB6C9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2E4C8F8F-F914-48A7-B47B-2F1EFE8F7605", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F44E170A-2F71-4112-9793-BDE10341A485", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9EADF9B5-CE67-4148-8AF1-200CB1087A28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CD46C00E-FFF2-4881-A86C-87676DA895D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33C6CC27-465A-4B48-B910-4AE704296BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "505929A2-38FD-4DE7-A545-17304C97F5C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B1AF8D7A-0138-4369-8134-369CE4F5B83C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF16C957-3898-40E8-89E8-68C4D11A7438", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9646CE32-97B0-4708-B9DC-54419898E5D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "465EF5CA-3AD1-4727-B245-3C69E28E02F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6CEFE6F1-4F0F-4A61-A9D2-AF2EF6A4BCB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C0E6130F-046E-4F43-9B33-1E2F78DA838D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F4BE80B2-F273-4336-897B-C67DCB8E2DFF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "82562C7C-8DC8-4D67-8FB8-DFC3CD034127", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7033CCD4-DA36-4D4F-AC61-FBDA9D14ADB4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "16458FAB-82F2-4BF7-834E-EAF425A55122", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1A52FA3-1EBE-4A7B-99A5-99A4162EBC02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F41B604A-8C7E-4A17-9D99-19638DE0C043", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CAFDC3D1-2390-4D1B-B6BC-95757E56721F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E56D27-ED97-4D92-9EE9-37CFF223ACFD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E070A80E-D5DD-49BC-B1CC-54C37D89F1FD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9B01E0FF-0EA1-4337-B95C-59E51A54E4DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "82F86D1D-95DD-456C-BE0B-DF85FAF7E8F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72FAB4B2-F4F7-43CE-B82A-5053CE65C658", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03407954-9170-46D1-BBFA-3479B51D9A87", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C06422E-173D-4650-A560-137E7B00763E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E3E9EF2-9588-4EF4-AE3A-CCF10A962C87", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AF9BB1CC-974C-4739-BC55-AFAA8C27B16D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "97E9723D-912C-4EAC-905D-C2AA20092F6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C25D316-9228-41E8-96CA-8CBF38855701", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6D863273-1BE8-4AC0-ABFF-58EF1597D363", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "70B2D902-C7E7-4EF7-B633-9FC9AA473010", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C115DA7-6CEF-49EF-8E24-FA0A7DD050A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE0090D8-7AB4-4BA7-A969-1C0C6B368B09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "219B048E-B61B-4C50-B345-FD25696CB764", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "10E69DC4-C09F-4178-8037-29406F79BFF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB77511-93E3-43D8-8D32-AABE27ADFB08", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7534A5E0-742E-414D-BDC5-259D39159BB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad en el software Cisco Small Business Switches podría permitir que un atacante remoto no autenticado omita el mecanismo de autenticación de usuarios de un dispositivo afectado. La vulnerabilidad existe porque, en determinadas circunstancias, el software afectado habilita una cuenta de usuario privilegiado sin notificar a los administradores del sistema. Un atacante podría explotar esta vulnerabilidad usando esta cuenta para iniciar sesión en un dispositivo afectado y ejecutar comandos con derechos de administrador total. Cisco no ha publicado ninguna actualización de software que solucione esta vulnerabilidad. Este aviso se actualizará con información de software solucionado cuando dicho software esté disponible. Existe una alternativa para solucionar esta vulnerabilidad.", }, ], id: "CVE-2018-15439", lastModified: "2024-11-21T03:50:48.200", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-11-08T17:29:00.607", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/105873", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/105873", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-01-18 06:29
Modified
2024-11-21 03:09
Severity ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E62A8CD6-FD0B-4F93-A521-A574470806AA", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*", matchCriteriaId: "79843C24-2CE8-4040-9C04-79902D8F741D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E28746B-DDAF-48C3-98D2-6DF02F10402B", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "FD650E51-E248-4CFD-8163-72717B66D675", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DB647C6-4F49-44B3-B5DC-1CB4B2808809", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9B36A173-5C14-4B38-B3DD-CD83B19AF94B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D42E184D-0BB9-4632-A910-7223EF5846DC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "C4432E33-8F3C-4C51-8AE3-C53333A867E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D9AE8D4-8324-47DE-8A1B-002F04791CF4", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*", matchCriteriaId: "500F9351-FA0C-4648-A2A6-ACFF6C8FD157", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D3EAE27-6D3D-427E-B94B-E65FF60A477F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "8122322F-6104-4978-9E00-40437365FF67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1FA8309E-218A-4EBB-86CB-53568F87AE03", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "11548FB9-ADB1-4281-B89B-6D61836072DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18D13620-A801-4837-A2D9-D8BB5EC67C8E", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF58ED1-AECE-435C-8F8F-6053C44E01C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FC203EBF-AADC-4536-A3A8-8FAD7EF49F66", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "B2BE66F3-51C8-42D8-927A-5BA0B9B072EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3250E1B1-3478-4089-8D4D-210CF5382396", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B2DE3B15-DD70-445E-936C-0C9D5C3F1450", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C40A90E-B0CC-4713-858A-CE98FA73A59A", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*", matchCriteriaId: "3C65522C-E250-408C-8A89-AFE4909804D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA0176C1-1AC1-4A05-B2C7-E1E4C76A61FD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "F9620FE5-567B-4B78-910D-14819E2CDE3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59267A4D-846E-4E07-9158-7AB7AE6A8754", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "2EEA8A38-C545-49AA-812F-8668EED9B23D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCFACA27-EBA0-44A2-ADDB-16701EE476A5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "4F986FD6-A139-43CA-9D83-40CAA8D62B32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CB0A209-D8D2-48E9-9A83-A4EFFD5EBDC0", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "FB21D371-D443-40FE-8DFF-3DD4A9655471", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE38A4A5-81FC-4A79-8E8F-F6B288ED2283", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B981B6EB-AAEE-4B4E-86B1-005E11D1DB30", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "B9879BE9-D4FA-4EEA-8852-B972299220E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D496D2D-84AF-47A4-BC5E-607C7E5E6DF6", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "613300D2-A079-415A-B9F7-178B8048AA61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19A38D74-522F-4001-97C8-8F3D33AC9DC8", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA11905-1953-4EEB-95CE-3BDB619D0F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03436FAE-7FBF-4C4A-9EE4-3FD94316ED25", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "76D1DE6B-6E09-40CF-9507-867ECB183A30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6961B4DB-F152-43A6-9440-6655BCAD379F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*", matchCriteriaId: "02D9BEB5-78FE-49EB-92BE-6597E7608E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E912AC1-B82E-406B-8480-720223F2FD74", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*", matchCriteriaId: "BFEDE246-7DF9-486D-A5B9-5596FE0AC582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "438E02A3-D177-4476-80DA-0C95C783B161", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*", matchCriteriaId: "D52D0E9C-FC04-4A45-81D5-A335B30F725E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA6AE9A9-61D3-4CE4-B1D3-029734397956", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAD50CE-8D02-4FD9-965A-7C14D146B52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "142DCA4A-57D6-48C0-ADD9-749E9B8464D1", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "B39E214D-A4B7-460C-9402-8F94336B30A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7CEC74C-D5FE-45CA-83A1-15F771958993", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*", matchCriteriaId: "297A662D-BD11-4021-8F19-946CA4BCF8D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "46470295-0C82-4D37-A9CE-722CAEED6008", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "7ADB1D69-CBDC-4045-A806-087878560EF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9162932E-4570-4A6C-8634-1D756EF42C7F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "81B88075-F579-492C-B87C-5E4291D269B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAB16572-975A-473E-8EDA-757BE49CDFCF", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "605B8DE5-56EB-4FFF-BC04-1B3A38762727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "662D1FD6-5DBB-4DC3-A11E-00AA87A3DF19", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "C940275E-41A8-470D-AD97-AB6EC5A75CEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F584E122-98B8-4F6F-92F1-4A6C83C3B934", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "235AAB5A-9D0A-4864-89E2-D69D1D8A79D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6B8D73B-BEF3-4006-9ED4-5C8F98B479D9", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "967DCE55-B7D5-4D63-9693-B42FAA9243B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F96925BF-73FC-454B-9B00-632EB2A1E1E5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "9AA6BED3-2564-4A7C-91DC-F843E301A35E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "752F1EF7-FA82-4B8E-B8B6-5939270DB705", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB932882-F8F9-44ED-A673-9A07211D5D7F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "4BDF26D7-B3B5-47CA-94E9-B14BEFE02318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "857756BD-B680-43EE-9FDB-F5FD56D7A1AC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A3AC0655-0F02-4397-881F-CFB6DAC3AA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28F46707-41BD-4118-933D-1FF48045880E", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "C374EB87-A4C6-43FB-B42E-DEA973375EC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37DB9ADA-FCCF-407A-A18D-530FF0815551", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "903E59DA-DE59-4CD4-BE32-B91DDA1DA07D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4B89E91-97B0-47EE-BC1E-D0A0098C8C92", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*", matchCriteriaId: "0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "50CB4BA4-E815-4506-A6FE-21B1F41EEEDF", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*", matchCriteriaId: "6812853E-C083-4841-A467-91130ED194BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "666E6BEC-32C1-4361-AF78-3B5739D38378", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*", matchCriteriaId: "26A7AB18-C75F-4C63-9132-140EFC46E3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5803FD62-086B-4316-BDFC-331156C208FD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "A9B70093-E9FE-410A-973E-CE847F08F43A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4015A3F7-5706-40E9-84AD-A81D9205B2CE", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*", matchCriteriaId: "A3503F68-CF84-468E-9A40-9F98875DD1C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98827546-CA39-4D4E-9C0F-D3B020BE08D2", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFEF3C3-0C7C-4359-A45F-00152ACAB545", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4B42742-D701-4AE9-A833-189FB6708FC9", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "19890DBE-F1B9-4454-8738-AC2AC6704C75", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3E798EF-99B0-4D76-B0F2-6FB9499FCF8B", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*", matchCriteriaId: "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A289E57-D99E-4A61-BEE3-91A43F156030", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A415AFE8-B965-45B7-B01F-E3F8F79F8EDD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*", matchCriteriaId: "4E7B70CB-9D7A-4637-8A51-634157F7AC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD23FB5D-9A7F-4A03-A269-A6FE486677D5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*", matchCriteriaId: "E5248F85-411D-4ED9-983C-A28A90C8FC70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61764001-8BCD-4D43-9324-9ADED2F2890C", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6F6741-AA56-47EA-998C-78FD7F6B01CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A61B9373-76C9-4EFC-B4AF-EB8833310750", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*", matchCriteriaId: "7C96B794-16D3-46FE-8A2B-262BD38994E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58E2227C-F7C1-424A-B5C5-5C4BDF052521", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "A5307DEF-DCD1-417A-B649-FF4DCE66193E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E2BDD45-5A8B-494A-A9BE-597ABD9B16D7", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*", matchCriteriaId: "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8982BA5-8ABD-4235-8D24-90F4C949C583", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*", matchCriteriaId: "9054C3D1-BA1A-4BAC-8834-88673B804E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FDB31016-63A8-4436-A4A5-605E79071A71", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*", matchCriteriaId: "78B44981-5C59-4328-A7DB-FBF50F9C92C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BC8B43A-27FD-4188-9247-11796701FF22", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D5109D-C78B-4362-B000-0AA073FCC843", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F611F78-9D39-4970-B43B-D634203D6F2A", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "71D909B9-5B11-401E-8484-D6CD39D64142", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49E144D2-93D7-4F19-8C96-50CB5BA0FBCE", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*", matchCriteriaId: "8124725E-8340-43BC-BEBB-BC39E3AE7368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F0D8F03D-511A-42FC-8A89-0C69A4BC0D13", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*", matchCriteriaId: "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DA114A88-569D-4B50-A908-2CD30EF15D74", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*", matchCriteriaId: "765DECDB-4234-4444-B78F-01C1DCBAD8FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC685D61-7F81-4877-A5A4-E1AE0D2298BC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*", matchCriteriaId: "50A677CE-4360-4780-ABF9-466C45CB19E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE87339F-65FC-4BFA-9C5F-6E1E7CA08E2F", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2D46DE3-626E-407D-A5CA-B05E32F1B6C8", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*", matchCriteriaId: "8E26EE1D-763F-4893-9997-F4C1CE7A1089", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F600F290-8723-42BE-9E6A-587132ECE8F4", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*", matchCriteriaId: "C324F7E3-2088-452F-B049-519A9D25C9B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F1E85841-5E82-4D66-B7E7-C8AE8A11E1BB", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*", matchCriteriaId: "04042998-72B6-4215-9264-CC563E51D9CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BCAC9EF-CCF9-4BD2-AADD-A3F48B95B52C", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*", matchCriteriaId: "4882366A-9450-47BE-BE70-CC3A9D2F5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F214C861-ECCF-4734-9866-E237F5CC5D53", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "B402FBC0-91FC-471D-9D8A-C71F4FECF338", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6791A301-2164-4F44-8B03-91B96BE2CDD0", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*", matchCriteriaId: "2DB2B761-E591-42B6-B62F-63A6D41F4FAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03FF785B-6274-4092-9E43-3396F4FE8CAD", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C38DF13-3C4A-4CB5-9205-74670FC0C8E5", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76E523C7-CF2B-430B-829E-D803AA1CDE62", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*", matchCriteriaId: "BA6035EA-0F55-4C76-9E2F-DD4938576D1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ADCEE83B-369D-4F38-AE97-9ABD11A20DAA", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*", matchCriteriaId: "36E534B2-12EA-489B-A939-4F1965B5EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54B4BEBC-BC5E-4003-9B34-E2A6896F509D", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0CF964C5-4CA9-4D81-B60E-2BEDEF47E571", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*", matchCriteriaId: "6C0F8958-8059-411B-86C8-40B1073C80C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30B99E44-30D9-4AF1-97D5-EA2DCAF6E825", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "218D6018-551C-46B8-AE27-F88E6052F37B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "41879534-43D0-476A-931C-2E8B187D456E", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*", matchCriteriaId: "EAB8DE78-E398-458B-98EF-EEEB6E219BAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "975C54C6-B3B0-4C89-9C35-05BBEF6E75C7", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "E443C685-F000-4F89-ADEA-7084138018D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1DC345D-BEB3-409A-803C-D7FE72EFB073", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*", matchCriteriaId: "0779C5EE-C145-4C28-8F60-EE692409102D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23C93EF7-4851-4E4E-A600-BAD62254D707", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4D4AD6-C5FD-40D8-B002-2B784EC88B89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D89D488C-0582-4338-8848-EEA8DB6AC2DC", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*", matchCriteriaId: "40273E59-7C60-4094-B9FC-A633A2F23E61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00F8E3E4-55D4-43A7-8564-167A2A32DED1", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*", matchCriteriaId: "14A201E5-0603-4C96-8F4B-87934B7B99D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1BA5FC05-98F4-4A8C-91E0-703784F5970C", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*", matchCriteriaId: "D1A9D4D4-EF09-4862-B62A-94913AEFA2BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A55371BC-B4A3-4E56-AE2E-63BD3D5835D2", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "0093FE2A-3D4C-4435-AE35-D213C9700771", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7C44E0B-336B-466C-85E0-F92626456CED", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*", matchCriteriaId: "B84D71EE-64CC-4966-98D1-C0697816120A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E12126E-E0E3-479D-B5FA-578683C70050", versionEndExcluding: "1.4.9.4", versionStartIncluding: "1.4.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "5E99C3C2-0B98-4108-8102-80132BF47A32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.", }, { lang: "es", value: "Una vulnerabilidad en el framework web de Cisco Small Business Managed Switches Software podría permitir que un atacante remoto sin autenticar lleve a cabo un ataque de separación de respuesta HTTP contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a una validación de entrada insuficiente de algunos parámetros que se pasan al servidor web del sistema afectado. Un atacante podría explotar esta vulnerabilidad convenciendo a un usuario de que acceda a un enlace malicioso o interceptando una petición de usuario e inyectando código malicioso en la petición. Un exploit con éxito podría permitir que el atacante ejecute código script arbitrario en el contexto de la interfaz web afectada o que acceda a información sensible del navegador. Esta vulnerabilidad afecta a los siguientes productos de Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches y Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980.", }, ], id: "CVE-2017-12308", lastModified: "2024-11-21T03:09:16.797", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-01-18T06:29:00.267", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-113", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }