All the vulnerabilites related to cisco - unified_ip_phone_7961g-ge
cve-2011-1603
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:28
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
References
http://www.securitytracker.com/id?1025588vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/44814/third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/48079vdb-entry, x_refsource_BID
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtmlvendor-advisory, x_refsource_CISCO
http://osvdb.org/72718vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025588",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025588"
          },
          {
            "name": "44814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44814/"
          },
          {
            "name": "48079",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48079"
          },
          {
            "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
          },
          {
            "name": "72718",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/72718"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-07T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025588",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025588"
        },
        {
          "name": "44814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44814/"
        },
        {
          "name": "48079",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48079"
        },
        {
          "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
        },
        {
          "name": "72718",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/72718"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-1603",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025588",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025588"
            },
            {
              "name": "44814",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44814/"
            },
            {
              "name": "48079",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48079"
            },
            {
              "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
            },
            {
              "name": "72718",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/72718"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-1603",
    "datePublished": "2011-06-02T20:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.829Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1602
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:28
Severity ?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
References
http://www.securitytracker.com/id?1025588vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/48074vdb-entry, x_refsource_BID
http://secunia.com/advisories/44814/third-party-advisory, x_refsource_SECUNIA
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtmlvendor-advisory, x_refsource_CISCO
http://osvdb.org/72717vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:42.032Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025588",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025588"
          },
          {
            "name": "48074",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48074"
          },
          {
            "name": "44814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44814/"
          },
          {
            "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
          },
          {
            "name": "72717",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/72717"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-07T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025588",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025588"
        },
        {
          "name": "48074",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48074"
        },
        {
          "name": "44814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44814/"
        },
        {
          "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
        },
        {
          "name": "72717",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/72717"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-1602",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025588",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025588"
            },
            {
              "name": "48074",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48074"
            },
            {
              "name": "44814",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44814/"
            },
            {
              "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
            },
            {
              "name": "72717",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/72717"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-1602",
    "datePublished": "2011-06-02T20:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:42.032Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1637
Vulnerability from cvelistv5
Published
2011-06-02 20:00
Modified
2024-08-06 22:37
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
References
http://www.securitytracker.com/id?1025588vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/44814/third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/48075vdb-entry, x_refsource_BID
http://osvdb.org/72719vdb-entry, x_refsource_OSVDB
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtmlvendor-advisory, x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/67743vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:24.683Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025588",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025588"
          },
          {
            "name": "44814",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44814/"
          },
          {
            "name": "48075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48075"
          },
          {
            "name": "72719",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/72719"
          },
          {
            "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
          },
          {
            "name": "cisco-uipp-sign-security-bypass(67743)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025588",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025588"
        },
        {
          "name": "44814",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44814/"
        },
        {
          "name": "48075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48075"
        },
        {
          "name": "72719",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/72719"
        },
        {
          "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
        },
        {
          "name": "cisco-uipp-sign-security-bypass(67743)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-1637",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025588",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025588"
            },
            {
              "name": "44814",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44814/"
            },
            {
              "name": "48075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48075"
            },
            {
              "name": "72719",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/72719"
            },
            {
              "name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
            },
            {
              "name": "cisco-uipp-sign-security-bypass(67743)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-1637",
    "datePublished": "2011-06-02T20:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:37:24.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:26
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
Impacted products
Vendor Product Version
cisco unified_ip_phone_7906 *
cisco unified_ip_phone_7911g *
cisco unified_ip_phone_7931g *
cisco unified_ip_phone_7941g *
cisco unified_ip_phone_7941g-ge *
cisco unified_ip_phone_7942g *
cisco unified_ip_phone_7945g *
cisco unified_ip_phone_7961g *
cisco unified_ip_phone_7961g-ge *
cisco unified_ip_phone_7962g *
cisco unified_ip_phone_7965g *
cisco unified_ip_phone_7970g *
cisco unified_ip_phone_7971g-ge *
cisco unified_ip_phone_7975g *
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(3\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
              "matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
              "versionEndIncluding": "9.1\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 permiten a usuarios locales conseguir privilegios a trav\u00e9s de vectores no especificados. Error tambi\u00e9n conocido Bug ID CSCtn65815."
    }
  ],
  "id": "CVE-2011-1603",
  "lastModified": "2024-11-21T01:26:41.277",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-02T20:55:03.403",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/72718"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/48079"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/72718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025588"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:26
Severity ?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
Impacted products
Vendor Product Version
cisco unified_ip_phone_7906 *
cisco unified_ip_phone_7911g *
cisco unified_ip_phone_7931g *
cisco unified_ip_phone_7941g *
cisco unified_ip_phone_7941g-ge *
cisco unified_ip_phone_7942g *
cisco unified_ip_phone_7945g *
cisco unified_ip_phone_7961g *
cisco unified_ip_phone_7961g-ge *
cisco unified_ip_phone_7962g *
cisco unified_ip_phone_7965g *
cisco unified_ip_phone_7970g *
cisco unified_ip_phone_7971g-ge *
cisco unified_ip_phone_7975g *
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr2:*:*:*:*:*:*",
              "matchCriteriaId": "A9856E40-A873-4012-841C-F2D568FF93A0",
              "versionEndIncluding": "9.0\\(2\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
    },
    {
      "lang": "es",
      "value": "La utilidad \u0027su\u0027 en los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con el software anterior a la v9.0.3 permite a usuarios locales conseguir privilegios a trav\u00e9s de vectores no especificados. Error tambi\u00e9n conocido Bug ID CSCtf07426."
    }
  ],
  "id": "CVE-2011-1602",
  "lastModified": "2024-11-21T01:26:41.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-02T20:55:03.373",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/72717"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/48074"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/72717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025588"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-02 20:55
Modified
2024-11-21 01:26
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
Impacted products
Vendor Product Version
cisco unified_ip_phone_7906 *
cisco unified_ip_phone_7911g *
cisco unified_ip_phone_7931g *
cisco unified_ip_phone_7941g *
cisco unified_ip_phone_7941g-ge *
cisco unified_ip_phone_7942g *
cisco unified_ip_phone_7945g *
cisco unified_ip_phone_7961g *
cisco unified_ip_phone_7961g-ge *
cisco unified_ip_phone_7962g *
cisco unified_ip_phone_7965g *
cisco unified_ip_phone_7970g *
cisco unified_ip_phone_7971g-ge *
cisco unified_ip_phone_7975g *
cisco skinny_client_control_protocol_software *
cisco skinny_client_control_protocol_software 1.0\(1\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(2\)
cisco skinny_client_control_protocol_software 1.0\(3\)
cisco skinny_client_control_protocol_software 1.0\(4\)
cisco skinny_client_control_protocol_software 1.0\(5\)
cisco skinny_client_control_protocol_software 1.0\(9\)
cisco skinny_client_control_protocol_software 1.1\(1\)
cisco skinny_client_control_protocol_software 1.2\(1\)
cisco skinny_client_control_protocol_software 1.3\(1\)
cisco skinny_client_control_protocol_software 1.3\(2\)
cisco skinny_client_control_protocol_software 1.3\(3\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.3\(4\)
cisco skinny_client_control_protocol_software 1.4\(1\)
cisco skinny_client_control_protocol_software 1.4\(2\)
cisco skinny_client_control_protocol_software 2.0\(0\)
cisco skinny_client_control_protocol_software 2.0\(1\)
cisco skinny_client_control_protocol_software 3.0
cisco skinny_client_control_protocol_software 3.0\(0\)
cisco skinny_client_control_protocol_software 3.0\(1\)
cisco skinny_client_control_protocol_software 3.0\(2\)
cisco skinny_client_control_protocol_software 3.1
cisco skinny_client_control_protocol_software 3.1\(1\)
cisco skinny_client_control_protocol_software 3.1\(2\)
cisco skinny_client_control_protocol_software 3.1\(3\)
cisco skinny_client_control_protocol_software 3.1\(4\)
cisco skinny_client_control_protocol_software 3.1\(6\)
cisco skinny_client_control_protocol_software 3.1\(10\)
cisco skinny_client_control_protocol_software 3.1\(11\)
cisco skinny_client_control_protocol_software 3.2
cisco skinny_client_control_protocol_software 3.2\(1\)
cisco skinny_client_control_protocol_software 3.2\(2\)
cisco skinny_client_control_protocol_software 3.2\(3\)
cisco skinny_client_control_protocol_software 3.2\(4\)
cisco skinny_client_control_protocol_software 3.2\(5\)
cisco skinny_client_control_protocol_software 3.2\(6\)
cisco skinny_client_control_protocol_software 3.2\(6a\)
cisco skinny_client_control_protocol_software 3.2\(7\)
cisco skinny_client_control_protocol_software 3.2\(8\)
cisco skinny_client_control_protocol_software 3.2\(9\)
cisco skinny_client_control_protocol_software 3.2\(10\)
cisco skinny_client_control_protocol_software 3.2\(11\)
cisco skinny_client_control_protocol_software 3.2\(12\)
cisco skinny_client_control_protocol_software 3.2\(13\)
cisco skinny_client_control_protocol_software 3.2\(14\)
cisco skinny_client_control_protocol_software 3.2\(15\)
cisco skinny_client_control_protocol_software 3.3\(2\)
cisco skinny_client_control_protocol_software 3.3\(3\)
cisco skinny_client_control_protocol_software 3.3\(4\)
cisco skinny_client_control_protocol_software 3.3\(5\)
cisco skinny_client_control_protocol_software 3.3\(6\)
cisco skinny_client_control_protocol_software 3.3\(7\)
cisco skinny_client_control_protocol_software 3.3\(8\)
cisco skinny_client_control_protocol_software 3.3\(9\)
cisco skinny_client_control_protocol_software 3.3\(10\)
cisco skinny_client_control_protocol_software 3.3\(11\)
cisco skinny_client_control_protocol_software 3.3\(12\)
cisco skinny_client_control_protocol_software 3.3\(13\)
cisco skinny_client_control_protocol_software 3.3\(14\)
cisco skinny_client_control_protocol_software 3.3\(15\)
cisco skinny_client_control_protocol_software 3.3\(16\)
cisco skinny_client_control_protocol_software 3.3\(20\)
cisco skinny_client_control_protocol_software 4.0\(0\)
cisco skinny_client_control_protocol_software 4.1\(2\)
cisco skinny_client_control_protocol_software 4.1\(3\)
cisco skinny_client_control_protocol_software 4.1\(4\)
cisco skinny_client_control_protocol_software 4.1\(5\)
cisco skinny_client_control_protocol_software 4.1\(6\)
cisco skinny_client_control_protocol_software 4.1\(7\)
cisco skinny_client_control_protocol_software 5.0\(0\)
cisco skinny_client_control_protocol_software 5.0\(1a\)
cisco skinny_client_control_protocol_software 5.0\(3\)
cisco skinny_client_control_protocol_software 5.0\(5\)
cisco skinny_client_control_protocol_software 5.0\(6\)
cisco skinny_client_control_protocol_software 5.0\(7\)
cisco skinny_client_control_protocol_software 6.0\(0\)
cisco skinny_client_control_protocol_software 6.0\(2\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(3\)
cisco skinny_client_control_protocol_software 6.0\(4\)
cisco skinny_client_control_protocol_software 6.0\(5\)
cisco skinny_client_control_protocol_software 6.1\(0\)
cisco skinny_client_control_protocol_software 6.1\(1\)
cisco skinny_client_control_protocol_software 7.0\(1\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(2\)
cisco skinny_client_control_protocol_software 7.0\(3\)
cisco skinny_client_control_protocol_software 7.1\(2\)
cisco skinny_client_control_protocol_software 7.2\(2\)
cisco skinny_client_control_protocol_software 7.2\(3\)
cisco skinny_client_control_protocol_software 7.2\(4\)
cisco skinny_client_control_protocol_software 8.0\(1\)
cisco skinny_client_control_protocol_software 8.0\(2\)
cisco skinny_client_control_protocol_software 8.0\(3\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(4\)
cisco skinny_client_control_protocol_software 8.0\(5\)
cisco skinny_client_control_protocol_software 8.0\(6\)
cisco skinny_client_control_protocol_software 8.0\(7\)
cisco skinny_client_control_protocol_software 8.0\(8\)
cisco skinny_client_control_protocol_software 8.0\(9\)
cisco skinny_client_control_protocol_software 8.0\(10\)
cisco skinny_client_control_protocol_software 8.1\(1\)
cisco skinny_client_control_protocol_software 8.1\(2\)
cisco skinny_client_control_protocol_software 8.2\(1\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.2\(2\)
cisco skinny_client_control_protocol_software 8.3\(1\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(2\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(3\)
cisco skinny_client_control_protocol_software 8.3\(5\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(1\)
cisco skinny_client_control_protocol_software 8.4\(2\)
cisco skinny_client_control_protocol_software 8.4\(3\)
cisco skinny_client_control_protocol_software 8.4\(4\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(2\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(3\)
cisco skinny_client_control_protocol_software 8.5\(4\)
cisco skinny_client_control_protocol_software 8.70
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(2\)
cisco skinny_client_control_protocol_software 9.0\(3\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
              "matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
              "versionEndIncluding": "9.1\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
              "matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
              "matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocido como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 no verifican adecuadamente las firmas de im\u00e1genes de software, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de una imagen hecha a mano. Error tambi\u00e9n conocido como Bug ID CSCtn65962."
    }
  ],
  "id": "CVE-2011-1637",
  "lastModified": "2024-11-21T01:26:42.487",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 1.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-02T20:55:03.480",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/72719"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/48075"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/72719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44814/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}