All the vulnerabilites related to hp - x3220nr_firmware
cve-2020-10136
Vulnerability from cvelistv5
Published
2020-06-02 08:35
Modified
2024-09-17 00:56
Severity ?
EPSS score ?
Summary
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | IETF | RFC2003 - IP Encapsulation within IP |
Version: STD 1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#636397", "tags": [ "x_transferred" ], "url": "https://kb.cert.org/vuls/id/636397/" }, { "tags": [ "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4" }, { "tags": [ "x_transferred" ], "url": "https://www.digi.com/resources/security" }, { "name": "VU#636397", "tags": [ "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/636397" }, { "name": "Security Concerns with IP Tunneling", "tags": [ "x_transferred" ], "url": "https://datatracker.ietf.org/doc/html/rfc6169" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "RFC2003 - IP Encapsulation within IP", "vendor": "IETF", "versions": [ { "status": "affected", "version": "STD 1" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Yannay Livneh for reporting this issue." } ], "datePublic": "2020-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-17T21:10:04.191Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#636397", "url": "https://kb.cert.org/vuls/id/636397/" }, { "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4" }, { "url": "https://www.digi.com/resources/security" }, { "name": "VU#636397", "url": "https://www.kb.cert.org/vuls/id/636397" }, { "name": "Security Concerns with IP Tunneling", "url": "https://datatracker.ietf.org/doc/html/rfc6169" } ], "solutions": [ { "lang": "en", "value": "Customers should apply the latest patch provided by the affected vendor that addresses this issue and prevents unspecified IP-in-IP packets from being processed. Devices manufacturers are urged to disable IP-in-IP in their default configuration and require their customers to explicitly configure IP-in-IP as and when needed." } ], "source": { "discovery": "EXTERNAL" }, "title": "IP-in-IP protocol allows a remote, unauthenticated attacker to route arbitrary network traffic", "workarounds": [ { "lang": "en", "value": "Users can block IP-in-IP packets by filtering IP protocol number 4. Note this filtering is for the IPv4 Protocol (or IPv6 Next Header) field value of 4 and not IP protocol version 4 (IPv4)." } ], "x_generator": { "engine": "cveClient/1.0.15" } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2020-10136", "datePublished": "2020-06-02T08:35:12.921954Z", "dateReserved": "2020-03-05T00:00:00", "dateUpdated": "2024-09-17T00:56:11.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-06-02 09:15
Modified
2024-11-21 04:54
Severity ?
Summary
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | 5.2\(1\)sk3\(1.1\) | |
cisco | nx-os | 5.2\(1\)sk3\(2.1\) | |
cisco | nx-os | 5.2\(1\)sk3\(2.1a\) | |
cisco | nx-os | 5.2\(1\)sk3\(2.2\) | |
cisco | nx-os | 5.2\(1\)sk3\(2.2b\) | |
cisco | nx-os | 5.2\(1\)sm1\(5.1\) | |
cisco | nx-os | 5.2\(1\)sm1\(5.2\) | |
cisco | nx-os | 5.2\(1\)sm1\(5.2a\) | |
cisco | nx-os | 5.2\(1\)sm1\(5.2b\) | |
cisco | nx-os | 5.2\(1\)sm1\(5.2c\) | |
cisco | nx-os | 5.2\(1\)sm3\(1.1\) | |
cisco | nx-os | 5.2\(1\)sm3\(1.1a\) | |
cisco | nx-os | 5.2\(1\)sm3\(1.1b\) | |
cisco | nx-os | 5.2\(1\)sm3\(1.1c\) | |
cisco | nx-os | 5.2\(1\)sm3\(2.1\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.1\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.2\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.3\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.4\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.4b\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.5a\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.5b\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.6\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.10\) | |
cisco | nx-os | 5.2\(1\)sv3\(1.15\) | |
cisco | nx-os | 5.2\(1\)sv3\(2.1\) | |
cisco | nx-os | 5.2\(1\)sv3\(2.5\) | |
cisco | nx-os | 5.2\(1\)sv3\(2.8\) | |
cisco | nx-os | 5.2\(1\)sv3\(3.1\) | |
cisco | nx-os | 5.2\(1\)sv3\(3.15\) | |
cisco | nx-os | 5.2\(1\)sv3\(4.1\) | |
cisco | nx-os | 5.2\(1\)sv3\(4.1a\) | |
cisco | nx-os | 5.2\(1\)sv3\(4.1b\) | |
cisco | nx-os | 5.2\(1\)sv3\(4.1b\) | |
cisco | nx-os | 5.2\(1\)sv3\(4.1b\) | |
cisco | nx-os | 5.2\(1\)sv5\(1.1\) | |
cisco | nx-os | 5.2\(1\)sv5\(1.2\) | |
cisco | nx-os | 5.2\(1\)sv5\(1.3\) | |
cisco | nx-os | 5.2\(1\)sv5\(1.3\) | |
cisco | nexus_1000v | - | |
cisco | nexus_1000ve | - | |
cisco | nx-os | 5.0\(3\)a1\(1\) | |
cisco | nx-os | 5.0\(3\)a1\(2\) | |
cisco | nx-os | 5.0\(3\)a1\(2a\) | |
cisco | nx-os | 5.0\(3\)u1\(1\) | |
cisco | nx-os | 5.0\(3\)u1\(1a\) | |
cisco | nx-os | 5.0\(3\)u1\(1b\) | |
cisco | nx-os | 5.0\(3\)u1\(1c\) | |
cisco | nx-os | 5.0\(3\)u1\(1d\) | |
cisco | nx-os | 5.0\(3\)u1\(2\) | |
cisco | nx-os | 5.0\(3\)u1\(2a\) | |
cisco | nx-os | 5.0\(3\)u2\(1\) | |
cisco | nx-os | 5.0\(3\)u2\(2\) | |
cisco | nx-os | 5.0\(3\)u2\(2a\) | |
cisco | nx-os | 5.0\(3\)u2\(2b\) | |
cisco | nx-os | 5.0\(3\)u2\(2c\) | |
cisco | nx-os | 5.0\(3\)u2\(2d\) | |
cisco | nx-os | 5.0\(3\)u3\(1\) | |
cisco | nx-os | 5.0\(3\)u3\(2\) | |
cisco | nx-os | 5.0\(3\)u3\(2a\) | |
cisco | nx-os | 5.0\(3\)u3\(2b\) | |
cisco | nx-os | 5.0\(3\)u4\(1\) | |
cisco | nx-os | 5.0\(3\)u5\(1\) | |
cisco | nx-os | 5.0\(3\)u5\(1a\) | |
cisco | nx-os | 5.0\(3\)u5\(1b\) | |
cisco | nx-os | 5.0\(3\)u5\(1c\) | |
cisco | nx-os | 5.0\(3\)u5\(1d\) | |
cisco | nx-os | 5.0\(3\)u5\(1e\) | |
cisco | nx-os | 5.0\(3\)u5\(1f\) | |
cisco | nx-os | 5.0\(3\)u5\(1g\) | |
cisco | nx-os | 5.0\(3\)u5\(1h\) | |
cisco | nx-os | 5.0\(3\)u5\(1i\) | |
cisco | nx-os | 5.0\(3\)u5\(1j\) | |
cisco | nx-os | 6.0\(2\)a1\(1\) | |
cisco | nx-os | 6.0\(2\)a1\(1a\) | |
cisco | nx-os | 6.0\(2\)a1\(1b\) | |
cisco | nx-os | 6.0\(2\)a1\(1c\) | |
cisco | nx-os | 6.0\(2\)a1\(1d\) | |
cisco | nx-os | 6.0\(2\)a1\(1e\) | |
cisco | nx-os | 6.0\(2\)a1\(1f\) | |
cisco | nx-os | 6.0\(2\)a1\(2d\) | |
cisco | nx-os | 6.0\(2\)a3\(1\) | |
cisco | nx-os | 6.0\(2\)a3\(2\) | |
cisco | nx-os | 6.0\(2\)a3\(4\) | |
cisco | nx-os | 6.0\(2\)a4\(1\) | |
cisco | nx-os | 6.0\(2\)a4\(2\) | |
cisco | nx-os | 6.0\(2\)a4\(3\) | |
cisco | nx-os | 6.0\(2\)a4\(4\) | |
cisco | nx-os | 6.0\(2\)a4\(5\) | |
cisco | nx-os | 6.0\(2\)a4\(6\) | |
cisco | nx-os | 6.0\(2\)u1\(1\) | |
cisco | nx-os | 6.0\(2\)u1\(1a\) | |
cisco | nx-os | 6.0\(2\)u1\(2\) | |
cisco | nx-os | 6.0\(2\)u1\(3\) | |
cisco | nx-os | 6.0\(2\)u1\(4\) | |
cisco | nx-os | 6.0\(2\)u2\(1\) | |
cisco | nx-os | 6.0\(2\)u2\(2\) | |
cisco | nx-os | 6.0\(2\)u2\(3\) | |
cisco | nx-os | 6.0\(2\)u2\(4\) | |
cisco | nx-os | 6.0\(2\)u2\(4.92.4z\) | |
cisco | nx-os | 6.0\(2\)u2\(5\) | |
cisco | nx-os | 6.0\(2\)u2\(6\) | |
cisco | nx-os | 6.0\(2\)u3\(1\) | |
cisco | nx-os | 6.0\(2\)u3\(2\) | |
cisco | nx-os | 6.0\(2\)u3\(3\) | |
cisco | nx-os | 6.0\(2\)u3\(4\) | |
cisco | nx-os | 6.0\(2\)u3\(5\) | |
cisco | nx-os | 6.0\(2\)u3\(6\) | |
cisco | nx-os | 6.0\(2\)u3\(7\) | |
cisco | nx-os | 6.0\(2\)u3\(8\) | |
cisco | nx-os | 6.0\(2\)u3\(9\) | |
cisco | nx-os | 6.0\(2\)u4\(1\) | |
cisco | nx-os | 6.0\(2\)u4\(2\) | |
cisco | nx-os | 6.0\(2\)u4\(3\) | |
cisco | nx-os | 6.0\(2\)u4\(4\) | |
cisco | nx-os | 6.0\(2\)u5\(1\) | |
cisco | nx-os | 6.1\(2\)i2\(2b\) | |
cisco | nx-os | 6.1\(2\)i3\(1\) | |
cisco | nx-os | 6.1\(2\)i3\(2\) | |
cisco | nx-os | 6.1\(2\)i3\(3\) | |
cisco | nx-os | 6.1\(2\)i3\(3a\) | |
cisco | nx-os | 7.0\(3\)i1\(1\) | |
cisco | nx-os | 7.0\(3\)i1\(1a\) | |
cisco | nx-os | 7.0\(3\)i1\(1b\) | |
cisco | nx-os | 7.0\(3\)i1\(1z\) | |
cisco | nexus_3016 | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3172 | - | |
cisco | nx-os | 5.2\(1\)n1\(1\) | |
cisco | nx-os | 5.2\(1\)n1\(1a\) | |
cisco | nx-os | 5.2\(1\)n1\(1b\) | |
cisco | nx-os | 5.2\(1\)n1\(2\) | |
cisco | nx-os | 5.2\(1\)n1\(2a\) | |
cisco | nx-os | 5.2\(1\)n1\(3\) | |
cisco | nx-os | 5.2\(1\)n1\(4\) | |
cisco | nx-os | 5.2\(1\)n1\(5\) | |
cisco | nx-os | 5.2\(1\)n1\(6\) | |
cisco | nx-os | 5.2\(1\)n1\(7\) | |
cisco | nx-os | 5.2\(1\)n1\(8\) | |
cisco | nx-os | 5.2\(1\)n1\(8a\) | |
cisco | nx-os | 5.2\(1\)n1\(8b\) | |
cisco | nx-os | 5.2\(1\)n1\(9\) | |
cisco | nx-os | 5.2\(1\)n1\(9a\) | |
cisco | nx-os | 5.2\(1\)n1\(9b\) | |
cisco | nx-os | 6.0\(2\)n1\(1\) | |
cisco | nx-os | 6.0\(2\)n1\(1a\) | |
cisco | nx-os | 6.0\(2\)n1\(2\) | |
cisco | nx-os | 6.0\(2\)n1\(2a\) | |
cisco | nx-os | 6.0\(2\)n2\(1\) | |
cisco | nx-os | 6.0\(2\)n2\(1b\) | |
cisco | nx-os | 6.0\(2\)n2\(2\) | |
cisco | nx-os | 6.0\(2\)n2\(3\) | |
cisco | nx-os | 6.0\(2\)n2\(4\) | |
cisco | nx-os | 6.0\(2\)n2\(5\) | |
cisco | nx-os | 6.0\(2\)n2\(5a\) | |
cisco | nx-os | 6.0\(2\)n2\(5b\) | |
cisco | nx-os | 6.0\(2\)n2\(6\) | |
cisco | nx-os | 6.0\(2\)n2\(7\) | |
cisco | nx-os | 7.0\(0\)n1\(1\) | |
cisco | nx-os | 7.0\(1\)n1\(1\) | |
cisco | nx-os | 7.0\(2\)n1\(1\) | |
cisco | nx-os | 7.0\(3\)n1\(1\) | |
cisco | nx-os | 7.0\(4\)n1\(1\) | |
cisco | nx-os | 7.0\(4\)n1\(1a\) | |
cisco | nx-os | 7.0\(5\)n1\(1\) | |
cisco | nx-os | 7.0\(5\)n1\(1a\) | |
cisco | nx-os | 7.0\(6\)n1\(1\) | |
cisco | nx-os | 7.0\(6\)n1\(2s\) | |
cisco | nx-os | 7.0\(6\)n1\(3s\) | |
cisco | nx-os | 7.0\(6\)n1\(4s\) | |
cisco | nx-os | 7.0\(7\)n1\(1\) | |
cisco | nx-os | 7.0\(7\)n1\(1a\) | |
cisco | nx-os | 7.0\(7\)n1\(1b\) | |
cisco | nx-os | 7.0\(8\)n1\(1\) | |
cisco | nx-os | 7.0\(8\)n1\(1a\) | |
cisco | nx-os | 7.1\(0\)n1\(1\) | |
cisco | nx-os | 7.1\(0\)n1\(1a\) | |
cisco | nx-os | 7.1\(0\)n1\(1b\) | |
cisco | nx-os | 7.1\(1\)n1\(1\) | |
cisco | nx-os | 7.1\(1\)n1\(1a\) | |
cisco | nx-os | 7.1\(2\)n1\(1\) | |
cisco | nx-os | 7.1\(2\)n1\(1a\) | |
cisco | nx-os | 7.1\(3\)n1\(1\) | |
cisco | nx-os | 7.1\(3\)n1\(2\) | |
cisco | nx-os | 7.1\(3\)n1\(2a\) | |
cisco | nx-os | 7.1\(3\)n1\(3\) | |
cisco | nx-os | 7.1\(3\)n1\(4\) | |
cisco | nx-os | 7.1\(3\)n1\(5\) | |
cisco | nx-os | 7.1\(4\)n1\(1\) | |
cisco | nx-os | 7.1\(4\)n1\(1a\) | |
cisco | nx-os | 7.1\(4\)n1\(1c\) | |
cisco | nx-os | 7.1\(4\)n1\(1d\) | |
cisco | nx-os | 7.1\(5\)n1\(1\) | |
cisco | nx-os | 7.1\(5\)n1\(1b\) | |
cisco | nx-os | 7.2\(1\)n1\(1\) | |
cisco | nx-os | 7.3\(0\)n1\(1\) | |
cisco | nx-os | 7.3\(0\)n1\(1a\) | |
cisco | nx-os | 7.3\(0\)n1\(1b\) | |
cisco | nx-os | 7.3\(1\)n1\(1\) | |
cisco | nx-os | 7.3\(2\)n1\(1\) | |
cisco | nx-os | 7.3\(2\)n1\(1b\) | |
cisco | nx-os | 7.3\(2\)n1\(1c\) | |
cisco | nx-os | 7.3\(3\)n1\(1\) | |
cisco | nx-os | 7.3\(4\)n1\(1\) | |
cisco | nx-os | 7.3\(4\)n1\(1a\) | |
cisco | nx-os | 7.3\(5\)n1\(1\) | |
cisco | nx-os | 7.3\(6\)n1\(1\) | |
cisco | nx-os | 7.3\(6\)n1\(1a\) | |
cisco | nx-os | 7.3\(7\)n1\(1\) | |
cisco | nx-os | 7.3\(7\)n1\(1a\) | |
cisco | nexus_5010 | - | |
cisco | nexus_5020 | - | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6004 | - | |
cisco | nx-os | 5.2\(1\) | |
cisco | nx-os | 5.2\(3\) | |
cisco | nx-os | 5.2\(3a\) | |
cisco | nx-os | 5.2\(4\) | |
cisco | nx-os | 5.2\(5\) | |
cisco | nx-os | 5.2\(7\) | |
cisco | nx-os | 5.2\(9\) | |
cisco | nx-os | 5.2\(9a\) | |
cisco | nx-os | 6.2\(2\) | |
cisco | nx-os | 6.2\(2a\) | |
cisco | nx-os | 6.2\(6\) | |
cisco | nx-os | 6.2\(6a\) | |
cisco | nx-os | 6.2\(6b\) | |
cisco | nx-os | 6.2\(8\) | |
cisco | nx-os | 6.2\(8a\) | |
cisco | nx-os | 6.2\(8b\) | |
cisco | nx-os | 6.2\(10\) | |
cisco | nx-os | 6.2\(12\) | |
cisco | nx-os | 6.2\(14\) | |
cisco | nx-os | 6.2\(14a\) | |
cisco | nx-os | 6.2\(14b\) | |
cisco | nx-os | 6.2\(16\) | |
cisco | nx-os | 6.2\(18\) | |
cisco | nx-os | 6.2\(20\) | |
cisco | nx-os | 6.2\(20a\) | |
cisco | nx-os | 6.2\(22\) | |
cisco | nx-os | 6.2\(24\) | |
cisco | nx-os | 7.2\(0\)d1\(1\) | |
cisco | nx-os | 7.2\(1\)d1\(1\) | |
cisco | nx-os | 7.2\(2\)d1\(1\) | |
cisco | nx-os | 7.2\(2\)d1\(2\) | |
cisco | nx-os | 7.2\(2\)d1\(3\) | |
cisco | nx-os | 7.2\(2\)d1\(4\) | |
cisco | nx-os | 7.3\(0\)d1\(1\) | |
cisco | nx-os | 7.3\(0\)dx\(1\) | |
cisco | nx-os | 7.3\(1\)d1\(1\) | |
cisco | nx-os | 7.3\(2\)d1\(1\) | |
cisco | nx-os | 7.3\(2\)d1\(1d\) | |
cisco | nx-os | 7.3\(2\)d1\(2\) | |
cisco | nx-os | 7.3\(2\)d1\(3\) | |
cisco | nx-os | 7.3\(2\)d1\(3a\) | |
cisco | nx-os | 7.3\(3\)d1\(1\) | |
cisco | nx-os | 7.3\(4\)d1\(1\) | |
cisco | nx-os | 7.3\(5\)d1\(1\) | |
cisco | nx-os | 7.3\(6\)d1\(1\) | |
cisco | nexus_7000 | - | |
cisco | nexus_7700 | - | |
cisco | nx-os | 6.1\(2\)i1\(2\) | |
cisco | nx-os | 6.1\(2\)i1\(3\) | |
cisco | nx-os | 6.1\(2\)i2\(1\) | |
cisco | nx-os | 6.1\(2\)i2\(2\) | |
cisco | nx-os | 6.1\(2\)i2\(2a\) | |
cisco | nx-os | 6.1\(2\)i2\(2b\) | |
cisco | nx-os | 6.1\(2\)i2\(3\) | |
cisco | nx-os | 6.1\(2\)i3\(1\) | |
cisco | nx-os | 6.1\(2\)i3\(2\) | |
cisco | nx-os | 6.1\(2\)i3\(3\) | |
cisco | nx-os | 6.1\(2\)i3\(3a\) | |
cisco | nx-os | 7.0\(3\)i1\(1\) | |
cisco | nx-os | 7.0\(3\)i1\(1a\) | |
cisco | nx-os | 7.0\(3\)i1\(1b\) | |
cisco | nx-os | 7.0\(3\)i1\(1z\) | |
cisco | nexus_92304qc | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9236c | - | |
cisco | nexus_9272q | - | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396tx | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | ucs_manager | 3.2\(3n\)a | |
cisco | ucs_6248up | - | |
cisco | ucs_6296up | - | |
cisco | ucs_6324 | - | |
cisco | ucs_6332 | - | |
cisco | ucs_6332-16up | - | |
digi | saros | * | |
hp | x3220nr_firmware | * | |
hp | x3220nr_firmware | - | |
treck | tcp\/ip | * | |
cisco | unified_computing_system | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8AE969C2-960D-4C09-BBCA-B757D925EB5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5D85822F-209F-4FE3-8ED9-59EC33E71884", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9180296D-7BF2-445E-92AB-002D50D8D87B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0B7B63E-7B91-48BC-A0E7-5BDC1FCC02AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "28765813-6283-43AF-9C0E-6884B305C158", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3917B37-BA20-4B07-B003-B7E5F99C4A45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BA9CEC37-A833-41D6-B3DA-9D17962D0989", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3515BB86-5FD5-4203-B1AB-CCC8B784D091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F310196-08CD-4A81-BE5C-8B484A71CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B8663A9-7287-4A28-8278-124F437A2BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "36ECC59E-23AB-44F2-982E-8EC6901F6CCF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7ECE401-189C-4438-8B73-AED84EAEB2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "AEF80603-493F-41D1-B8E1-C73617AD4992", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B5E826B-AD7D-417E-87F4-C702BFB243A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4FC4D1AE-FC2D-4687-BE4A-04064CCDBBA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "95F0898B-06EC-426E-98A6-753FD1FA1250", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "48E47ECE-9070-4EC6-BEB2-B6C233419439", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5264C81D-8FA2-4C83-A136-A5F2A298DB08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "675E1BB5-E0B5-4123-819F-641DB1277EC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "EADE0C99-64F2-4294-A78B-782006C40F1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A58D667-218D-42DA-A15F-4DA23762A71B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "A4265ACF-8EC4-4794-A31F-28CC6CBEBFE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.6\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3BE1868-1AEB-468C-8B96-A0E85A5B7064", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "17C275C2-9082-47EC-B525-9EAA427A083B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "072DA31B-F629-4A39-9149-03CC339C8D01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C3D3F90-5552-45EA-97E6-D298D23A87A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "0D58CF7B-FCEF-4A97-A9D3-631556FCE3D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "650B2C45-A7F4-4104-BF7A-7C4E18CFA225", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F74EB97-3BC7-4CC5-A48F-57B0C4C0E108", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE71BCEF-43A3-41C4-871B-E30DD7BFE3DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE33B6DC-0339-4D13-8AEC-7A91A386D3AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6A89675-D360-4476-ADDE-FA3F0EBEC131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFC48A4A-C4CC-4463-83D8-32192F3B7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:hyper-v:*:*", "matchCriteriaId": "71AC07A2-0A94-4531-8733-C399EC926515", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:vsphere:*:*", "matchCriteriaId": "9414EB06-685B-449A-AAE0-70BF74B50F59", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "14F547DC-9941-49B8-9752-FC25D144022F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F0C0E2-17ED-4CCB-BAFA-CD957ACC8BF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5266D0F6-9B69-43A9-BA66-C0A6C1293BE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*", "matchCriteriaId": "DB787D8A-1E09-450B-A7EC-8F2C3B7A0383", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000ve:-:*:*:*:*:*:*:*", "matchCriteriaId": "882D7344-E38B-4F44-8CDE-1CCA827F28BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "65CDC91A-BFED-47C3-8B2E-4BEB99F73555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A58651D4-1292-445F-985F-945E2B881AD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "169B0759-C366-4633-99E0-0FCF8CBBB002", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "92BDA5ED-E9AF-4D9C-9D13-BADFC515670C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F8C124BA-D5FC-422A-B3F4-AC1A41B7EEE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "F358E8D0-624B-412A-8726-B8AF96156317", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B178F96C-78D0-466E-B201-FE5371F4610E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "17A4CE07-64FF-4C5C-81FF-A2388818CF7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFDC9595-39D4-4BF8-AF18-D27A500C9007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7241BFDB-6386-4CBE-ACFB-4599EDE9CB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AF7CE90-9433-4E1D-A2AD-0B8854521CCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "171160E9-F6B8-4C8A-B086-431E3E2A27BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CAFAE6E-8B64-4A1F-A7E4-2D4BDFB7D5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "91C35886-CB9B-4477-9AB3-9F1C9E45E757", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F393BE8-8CC4-4302-829F-2C4F97BAC14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE855B3E-B2B8-4EBA-8303-55F6A5A77E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "641D651A-B85B-4E9E-BE92-35AFAE8A63A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "7810F6FD-F58F-4121-9D30-8C5E3E163EFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09C38DCD-2A5F-4095-ABA4-02E95D93C358", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "103A4C19-0E91-45FC-9AA2-F40215FCF63B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F61C03B-D7AB-468A-B092-158730FB3E0B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F883AA8-CC44-4440-AB30-D7AC29C242F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7390B4D2-2121-4311-A798-337E8B777A7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "924C6663-9EA0-4124-ACC6-0AFC649AEA6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C559C83-FB34-4B1A-A6B3-1834D6CD022C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F422D53-4FF4-43FB-8F62-D53393A8C038", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "7CFFFE88-17EA-4515-BF71-C0AB82957B21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:*:*:*", "matchCriteriaId": "6EF14E5C-B776-4A04-A5CC-853CFF2816B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF7E681A-F354-4093-84A9-5A357EAB1559", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B627C66-CFE1-40B9-8264-392BB091EA52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "512B7DAC-3929-4063-9AA4-0C6B1E3047A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1j\\):-:*:*:*:*:*:*", "matchCriteriaId": "E51725F9-753E-4D03-B132-38EB0A00BC3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA76DC9B-8325-4BF6-B729-FA781E88E7AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "26BC5100-7F5D-4603-A313-00767C6DA96F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2EA595C-6A01-4D8D-9CB9-F280D540D3FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "882CE57A-B06D-4E93-A181-B74017ABBCC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "60848441-E3E5-47E8-809B-0B226658425E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A196373-F643-4D7E-8DC7-8FFD60660B46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1f\\):*:*:*:*:*:*:*", "matchCriteriaId": "090903C2-4B6A-4DE5-9AD6-76A412E81A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "7AF52EFA-7DE0-4669-ABA9-596D7D9A23AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF658ED7-F77C-405B-B06A-74B46FBDAD98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F0FDDF2-912C-4900-B0B7-20AF5D2F1B52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "7295EC54-FA19-4658-8510-3C072804D9E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B31E39D5-147B-4965-ACB6-34F1244143F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D672928-6AE8-488B-A2A5-257074BAB2D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C928C35-4E24-4DBE-ADEA-D449B88ECB6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E64D8992-CA79-4ADF-BF3B-A76E944EC740", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "11A35378-54EB-422F-B0DD-211B214803D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E46D326-665C-4DB7-89A0-0F1B987D4A18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5BFA21F2-E2B2-49B6-9956-D6219D499F7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "52899164-992D-4736-B460-FDFB825DB7A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8766DA4C-A25C-48D4-A6FC-2357200A9215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6C48105-F73E-40C9-8CD9-B46C5319FB5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "94F5B47A-023B-4415-8DB9-6829C5E72901", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "618861BD-8FEE-4EF8-BFFB-A5BCBA8EA3EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6459DD6B-6DC1-4C14-A8E7-4503ED5F69BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA600413-FC70-4776-99DF-180C96D4FD24", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "ECC9066F-3082-48A0-BA52-9ED9420EA47A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4.92.4z\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF23DA92-A5C0-488B-806E-8549190A08B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "78611E25-E33E-4C88-A681-97B5A2A01B51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "780B04ED-412E-441F-8717-D8F9257F5699", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FC6A3647-2AF0-4D45-BCC9-24618B43ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD2AABBD-8680-4615-A4E2-B607CB1B0979", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "693F444B-FA34-489C-BB45-E9185DE47816", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "13669043-3F12-4439-812F-6DE35F70B159", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "58A8BDE0-2F73-4E0C-B73A-918DB3352067", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "5CC4DC15-3045-4CE3-A7B5-4E6ED35BF51F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "625BE6B1-12A7-4A8A-A816-E82C026E0457", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "4EAC2920-462B-44F0-8E93-7875C2F74592", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "35957A41-D8F2-4BC1-986B-C3E271327D64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10BFAE68-01C5-4EF8-8B86-F470092E9034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D02FC11-EB21-45CD-A070-89C4862240BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C67AE59-380A-402B-9B2A-F595E001637B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "4301927C-7A6D-4DA9-9470-9182E7FB234A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C71ED401-6786-4AAE-A98F-BE4732256A7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9ED50316-7044-4757-9C51-5543BA5693A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69B757AE-83C8-4194-9BAE-DBECA2021597", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB1A44C9-147B-4D1F-AB98-EB4F9F8C1C3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "702EF8D5-1F3F-45EF-AC8D-BD5A9E46A78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "30AE9092-DCF1-472F-B26D-E5BAA8DF25DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "58BC9769-F3CD-4047-8C86-8C09FB2AB0F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C775E53-781D-4426-A59B-DB65D697A844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "619DEAAE-3356-4079-8CC8-F477FCA18199", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1z\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DFE4CA5-42CC-4D81-B044-2D4EDFA37AA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "757A0C8E-4817-41DD-A609-2B61C36DBBCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3AECFED5-8D06-4396-BDD2-AAA0F5241839", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "772A297E-E323-4D2D-9129-6C4FC63643DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "149ABB41-A8FF-4A8F-888E-F27BDAAE9C0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6918EB91-679A-4F47-BB9E-3A22287F14FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "A0464AAE-73CF-4B24-A5CE-5C1131909CF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "68376361-C835-4552-8490-553C9A082615", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "270620E3-92B7-4914-88C7-9D955B2B856E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8E48600-FD20-4743-A3E8-AD5297164551", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A10C1B6-616E-4F94-8889-9C99906326D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "01A091A5-2848-4901-B193-1EC9DD8A52E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "380FEA27-D68C-48DA-B2B9-4A3B3A71B059", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3EAF9D9A-BFA7-43B2-BCF5-D4AE884AFB44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "31224B4A-CE5F-4B6E-8BAD-DF5BAA7EEB78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B64B9F42-0779-439F-ABF9-4183B9A10D88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*", "matchCriteriaId": "704B6AA4-D001-45B6-9E84-10F7E70CD9DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C871A419-B769-46B2-956E-467BBE94F290", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AB525D6-6E1B-4806-A981-F0FEA87E516B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "7EACF481-3E4B-4580-8AE7-3D49790E0715", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "698ABD3F-C9DE-4376-B57A-D05AEDCD9A25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5010EDAE-67BB-4E23-B0F5-10096A7DAB54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "84CF5114-731F-4BF4-83E0-9B095C34541C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4750621F-E7C5-4E6A-BC5F-232E75A454E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "08F35A63-9343-47D6-AB91-37AB148137E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "CADBDD1D-DA17-40EE-8B23-81E9991387DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A623F8E1-B97B-41DD-947F-7E1B65DD6902", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F3D9588-D98A-45FC-8344-58C55F35610E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C2E584-4BA6-48E7-8C56-A7F7D9BABC93", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A190D0A-B758-49BA-9830-9870F699DA0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF5613C4-6D05-4CF3-931F-F685150494DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD613D8F-099C-43A1-BD29-A98250E1334A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "576B74DF-9527-4931-B1A3-8FEE1DB1AD99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA5B4FA9-E550-4C69-A4E7-A989BBCCF22E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "63949081-E2F3-4EB4-BABC-270AAB19EE78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "58292522-F486-410D-AD99-DFD6EC0AA9B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A462729A-720F-4180-96DD-713A70CEF494", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BEB59A4B-3FCA-47F9-A4DB-D2B8ABAFB54D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A07ACF87-C694-41DB-B4BD-23CE72E32EED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C83C312B-0B0E-4A02-A9EE-F864EFBE60CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(2s\\):*:*:*:*:*:*:*", "matchCriteriaId": "832DE1DB-0D1C-4C24-8E2D-D182205C94B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(3s\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD36EDD5-4408-4BD0-A75A-AFFD5BF44D38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(4s\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0FBFB9B-703D-42F8-93BA-969AB7284106", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E47E0A4D-4033-43A8-9A50-E1A2BD7B419C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C95519E-7536-4EF7-8222-D4089500F826", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "71F56568-57E6-4C1C-AC8A-D96E097E449E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F631EAC6-1D33-485E-9E00-8572FA015C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "25CEAE9E-DD9B-41E2-BC39-3332F428B489", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE199525-4C2D-48C2-A76C-BD14BF2851F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E3644F66-F964-4D50-A6E0-EE8784490BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "72AD166D-7CBF-4A4D-A376-907DDA1BB504", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A20D72B-E2C6-47B6-A54D-FA435F29D7F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C801D4A-E604-49CA-8D14-13622E85C563", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "77D9EEFA-D652-45D2-8AF5-8A72825E7ED0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC78BEB7-47D1-4544-BC40-AB5D73B93D78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AEB91EC-E548-4C53-920F-C4871BC464B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0282F963-2C1F-44F7-A0D0-4929685051AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A1F519D0-64BC-4862-8894-4F6C248253C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "94A247A8-E918-4757-9ADE-251B027CD307", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "195CD630-4949-4B52-B9FF-94F3DEFB47AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "225E5070-B635-4752-B771-0E721C96C2AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9103A92E-C9F3-401B-AE30-66466210ADED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9E5CD729-234E-43C0-A6A3-A3E0983A6605", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A30E576-56F8-4EBA-AADE-C70655DE6E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "74415A0A-A3F4-43BB-B609-B6641771D655", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B5ED7424-EB12-4C21-97C8-082156716C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "16359104-2DB6-41D6-97A8-8CA1C3AB5688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "94AA886F-7BD1-4699-B1D3-E495EFCA2812", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "569B3CE7-CA06-4636-8043-7ED7635195A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "41A683FE-68AF-43E4-B846-2E82ACDD5E4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "2C8B149C-D842-496A-BE21-41920F95139C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D72F0B8-D229-4995-A053-62FA6591DCBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D8025943-EA09-47E6-9109-7DAF078F8F26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A727000-44CC-461C-A7D6-0B9A99CB974A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "105B6601-D756-4B76-9554-5B6E027A5E8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EE35B51-2D13-4A8B-BFF5-0596DBDCD261", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69FE85C9-A0AC-4FD4-A6EE-F0868B69503B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B1340D1-8EE8-484F-979A-AB9E34D35EB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF1257BF-D534-4899-937F-DCBD033A7D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "86E5CF27-5661-41DF-B339-740718760AC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6AE0D110-D8D7-4D50-A599-618A5120EDD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9ACD2D0D-7A38-4FCD-9E24-5588BACF8DA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "586E9024-C983-4CFF-9A3F-A39256E09910", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*", "matchCriteriaId": "1D901758-5416-422A-A745-89EF53C5ADF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "356B4143-5184-491B-9D10-19D6536366CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C038896F-6DBC-4695-9DBE-A60F6C39AFFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F2453F2-704F-48F7-8009-991BE0B49251", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "E00B4AC8-1D27-4394-AF28-10785AEFC073", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7AA95379-A172-4262-8B34-A912E47BFB2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FDE8EF9-47CF-451D-9570-3D369D74D44F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "55A760CE-5E63-4A6B-8DA3-A473BC3900E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0E738E86-B75F-48BF-9E76-C7DD470F3688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "11E66F3E-9482-4F30-8480-F036F3C68B61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*", "matchCriteriaId": "68C6090F-0B05-46F0-8A67-928FE1C36D5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "FBD345BD-83EF-4913-A0F3-74E52AD76BBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "46B2B97B-DDB7-4208-BF1A-D10C8A075A14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*", "matchCriteriaId": "317C8BE8-84DA-43D5-AE93-7E7DCDE6883E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED7B1216-4C4F-4A23-9474-23876649ABF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "57892CBB-8C95-4E56-90F8-B77BBBDC03FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "A555382D-9D35-4931-B3B0-DD4D956AB7AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(14a\\):*:*:*:*:*:*:*", "matchCriteriaId": "65CCE422-71DB-4500-AC91-9FB4DD5924A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(14b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C37B944B-CFB6-41F6-B4ED-049BEB3732E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "985752BE-AC65-47BC-97F5-36C2E44E55D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "BEC60C3C-8689-47EC-B944-F0FB9D38E4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6A61F7E-9929-48F5-85BA-72E744AF30B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA24A851-F051-41A8-A33E-7296AD199306", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "52E6911E-3DD8-4FCC-A1B5-613098B25337", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*", "matchCriteriaId": "FEA235F0-95C4-471A-BBD6-EDB723E6E7CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BF973CD-3315-4D86-8F89-05DC97C736AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C18A0045-87F3-4782-81C5-0BF615EA9346", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2768DEF1-3DFA-4683-9D8D-C5915D8E7365", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3CD05045-E867-4B7E-ACE4-7B6EA69971AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF9B10D1-29C0-4B16-813A-B535C4C64E47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "84551391-3A13-42EC-855F-FBB3453F65D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7FD733DD-EC40-48EC-A8A6-AE09657EEFC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dx\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "18CE33FF-6C81-4B38-8C47-6DEBD4D4223C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A7B0A8C-ED8F-411C-843F-B801CBBBB6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FADC755B-3AB3-43D6-8495-1FABCBD548E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "42D84BD8-D76B-422E-9E46-4A667A981FAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "03607526-7F9E-43F5-94ED-3ED0B4D29DF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8890C4B8-2E5C-46D6-80DE-6B5256FA1CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F8A3FFE-D017-43F7-B481-AF25B8B2BE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "98FC292D-27D3-40CF-98C5-AF47686FC134", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C23B353-3500-4FA4-90CE-624A29B1048F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "29002523-6405-4198-A5E5-630A4B661767", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF0DFA7E-9B40-4E82-9EB9-886C79B2D61C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CD1CA5A5-703E-46B1-A4C8-EF8FAD58049E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "48889960-437F-4848-9D91-DF8BAA118C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1BB0F49B-85C0-4C52-82E0-C2683D43B553", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "9ABB647D-B91E-4C2F-9FBE-1C9AAB27E2D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "384B7337-1C2F-479E-BB2B-F31320D82EE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9ED50316-7044-4757-9C51-5543BA5693A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1CB11917-C606-4025-A91A-596F7D47A311", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69B757AE-83C8-4194-9BAE-DBECA2021597", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB1A44C9-147B-4D1F-AB98-EB4F9F8C1C3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "702EF8D5-1F3F-45EF-AC8D-BD5A9E46A78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "30AE9092-DCF1-472F-B26D-E5BAA8DF25DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "58BC9769-F3CD-4047-8C86-8C09FB2AB0F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C775E53-781D-4426-A59B-DB65D697A844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "619DEAAE-3356-4079-8CC8-F477FCA18199", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1z\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DFE4CA5-42CC-4D81-B044-2D4EDFA37AA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:ucs_manager:3.2\\(3n\\)a:*:*:*:*:*:*:*", "matchCriteriaId": "13FF5911-F491-4741-8602-31CB00884520", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*", "matchCriteriaId": "49112D3F-DFAD-4E71-992B-9E0640FA388C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A1D8F2-A4A6-4BAC-8326-9F9DE9572FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82093C6-B36D-4E4E-AD7F-8C107646B8D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*", "matchCriteriaId": "E406DDCE-6753-43E9-B6F0-7A038DE84E41", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*", "matchCriteriaId": "054D8EB2-97A3-4725-9DFF-27A4D231D90A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:digi:saros:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98B5C59-8AF6-448B-AB76-BB3FAA7D4DD6", "versionEndExcluding": "8.1.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:x3220nr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A230831D-5238-49D4-9137-AB51BA84FEE5", "versionEndExcluding": "3.00.11.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:x3220nr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "778ED36E-19A5-4BB7-A0C2-D7695DCC84C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*", "matchCriteriaId": "197CE9E4-02C7-4C1F-87D2-DFD6FF636DF2", "versionEndExcluding": "6.0.1.67", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_computing_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "B944AB06-2598-431A-B6A6-0C108EBDCD5C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing." }, { "lang": "es", "value": "M\u00faltiples productos que implementan la IP Encapsulation dentro del est\u00e1ndar IP (RFC 2003, STD 1) desencapsulan y enrutan el tr\u00e1fico IP-in-IP sin ninguna comprobaci\u00f3n, lo que podr\u00eda permitir a un atacante remoto no autenticado enrutar tr\u00e1fico arbitrario por medio de una interfaz de red expuesta y conllevar a una falsificaci\u00f3n, omisi\u00f3n de control de acceso y otros comportamientos inesperados de la red." } ], "id": "CVE-2020-10136", "lastModified": "2024-11-21T04:54:53.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-02T09:15:09.967", "references": [ { "source": "cret@cert.org", "url": "https://datatracker.ietf.org/doc/html/rfc6169" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/636397/" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.digi.com/resources/security" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/636397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://datatracker.ietf.org/doc/html/rfc6169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/636397/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.digi.com/resources/security" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/636397" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }