Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2023-AVI-0026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco BroadWorks Xtended Services Platform version 22.0 (Cisco recommande de migrer en version 23 avec les derniers correctifs de sécurité) | ||
| Cisco | N/A | Cisco BroadWorks Xtended Services Platform version 23.0 sans les correctifs de sécurité AP.xsp.23.0.1075.ap384245 et AP.platform.23.0.1075.ap384245 | ||
| Cisco | N/A | Cisco SIP sur les téléphones IP sans-fil 8821 versions antérieures à 11.0(6)SR4 | ||
| Cisco | N/A | Cisco Industrial Network Director (IND) versions antérieures à 1.7.0 | ||
| Cisco | N/A | Cisco SIP sur les téléphones IP des séries 7800 et 8800 versions antérieures à 14.1(1)SR2 | ||
| Cisco | Small Business | Routeurs Cisco Small Business RV016, RV042, RV042G et RV082 (Cisco indique que ces routeurs sont en fin de vie) | ||
| Cisco | N/A | Cisco BroadWorks Application Delivery Platform Device Management versions 22.0 sans les correctifs de sécurité ADP_Rel_2022.11_1.273 et dms_2022.11_1.273 |
References
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco BroadWorks Xtended Services Platform version 22.0 (Cisco recommande de migrer en version 23 avec les derniers correctifs de s\u00e9curit\u00e9)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco BroadWorks Xtended Services Platform version 23.0 sans les correctifs de s\u00e9curit\u00e9 AP.xsp.23.0.1075.ap384245 et AP.platform.23.0.1075.ap384245",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco SIP sur les t\u00e9l\u00e9phones IP sans-fil 8821 versions ant\u00e9rieures \u00e0 11.0(6)SR4",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Industrial Network Director (IND) versions ant\u00e9rieures \u00e0 1.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco SIP sur les t\u00e9l\u00e9phones IP des s\u00e9ries 7800 et 8800 versions ant\u00e9rieures \u00e0 14.1(1)SR2",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Routeurs Cisco Small Business RV016, RV042, RV042G et RV082 (Cisco indique que ces routeurs sont en fin de vie)",
"product": {
"name": "Small Business",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco BroadWorks Application Delivery Platform Device Management versions 22.0 sans les correctifs de s\u00e9curit\u00e9 ADP_Rel_2022.11_1.273 et dms_2022.11_1.273",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-20037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20037"
},
{
"name": "CVE-2023-20018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20018"
},
{
"name": "CVE-2023-20038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20038"
},
{
"name": "CVE-2023-20020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20020"
},
{
"name": "CVE-2023-20025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20025"
},
{
"name": "CVE-2023-20026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20026"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-12T00:00:00.000000"
},
{
"description": "Correction coquille.",
"revision_date": "2023-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ip-phone-auth-bypass-pSqxZRPR du 11 janvier 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sbr042-multi-vuln-ej76Pke5 du 11 janvier 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ind-fZyVjJtG du 11 janvier 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-bw-dos-HpkeYzp du 11 janvier 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-dos-HpkeYzp"
}
]
}
CVE-2023-20020 (GCVE-0-2023-20020)
Vulnerability from cvelistv5 – Published: 2023-01-19 01:35 – Updated: 2024-08-02 08:57
VLAI?
EPSS
Summary
A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition.
Severity ?
8.6 (High)
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco BroadWorks |
Affected:
23.0
Affected: 23.0 ap380391 Affected: 23.0 ap380396 Affected: 23.0 ap379795 Affected: 23.0 ap373098 Affected: 23.0 ap382864 Affected: 23.0 ap382358 Affected: 23.0 ap382281 Affected: 23.0 ap367434 Affected: 23.0 ap376661 Affected: 23.0 ap380691 Affected: 23.0 ap383569 Affected: 23.0 ap375601 Affected: 23.0 ap372017 Affected: 23.0 ap383519 Affected: 23.0 ap375345 Affected: 23.0 ap371300 Affected: 23.0 ap383785 Affected: 23.0 ap380771 Affected: 23.0 ap351263 Affected: 23.0 ap376010 Affected: 23.0 ap382487 Affected: 23.0 ap383490 Affected: 23.0 ap383710 Affected: 23.0 ap375383 Affected: 23.0 ap375309 Affected: 23.0 ap375465 Affected: 23.0 ap380201 Affected: 23.0 ap380041 Affected: 23.0 ap380507 Affected: 23.0 ap379461 Affected: 23.0 ap377147 Affected: 23.0 ap376261 Affected: 23.0 ap381243 Affected: 23.0 ap381271 Affected: 23.0 ap382195 Affected: 23.0 ap380130 Affected: 23.0 ap380232 Affected: 23.0 ap377483 Affected: 23.0 ap383716 Affected: 23.0 ap383913 Affected: 23.0 ap383943 Affected: 23.0 ap383955 Affected: 23.0 ap383979 Affected: 23.0 ap383838 Affected: 23.0 ap384023 Affected: 23.0 ap381781 Affected: 23.0 ap383717 Affected: 23.0 ap383797 Affected: 23.0 ap383815 Affected: 23.0 ap383998 Affected: 23.0 ap384015 Affected: 23.0 ap384127 Affected: 23.0 ap384131 Affected: 23.0 ap384151 Affected: 23.0 ap384173 Affected: 23.0 ap384179 Affected: 23.0 ap384185 Affected: 23.0 ap384211 Affected: 23.0 ap384220 Affected: 23.0 ap384227 Affected: 23.0 ap384344 Affected: 23.0 ap363366 Affected: 23.0 ap364258 Affected: 23.0 ap364844 Affected: 23.0 ap365170 Affected: 23.0 ap365576 Affected: 23.0 ap365858 Affected: 23.0 ap366221 Affected: 23.0 ap366294 Affected: 23.0 ap365801 Affected: 23.0 ap366170 Affected: 23.0 ap364925 Affected: 23.0 ap366295 Affected: 23.0 ap366346 Affected: 23.0 ap366348 Affected: 23.0 ap365171 Affected: 23.0 ap364295 Affected: 23.0 ap364559 Affected: 23.0 ap366118 Affected: 23.0 ap366252 Affected: 23.0 ap363815 Affected: 23.0 ap363729 Affected: 23.0 ap365390 Affected: 23.0 ap364932 Affected: 23.0 ap365239 Affected: 23.0 ap365759 Affected: 23.0 ap366211 Affected: 23.0 ap366290 Affected: 23.0 ap365223 Affected: 23.0 ap366117 Affected: 23.0 ap365730 Affected: 23.0 ap366299 Affected: 23.0 ap366261 Affected: 23.0 ap365889 Affected: 23.0 ap366181 Affected: 23.0 ap365115 Affected: 23.0 ap364048 Affected: 23.0 ap366298 Affected: 23.0 ap364699 Affected: 23.0 ap345032 Affected: 23.0 ap362683 Affected: 23.0 ap363361 Affected: 23.0 ap352969 Affected: 23.0 ap359103 Affected: 23.0 ap366375 Affected: 23.0 ap366870 Affected: 23.0 ap366912 Affected: 23.0 ap366624 Affected: 23.0 ap367109 Affected: 23.0 ap366397 Affected: 23.0 ap354354 Affected: 23.0 ap349850 Affected: 23.0 ap366880 Affected: 23.0 ap360007 Affected: 23.0 ap366744 Affected: 23.0 ap366747 Affected: 23.0 ap366656 Affected: 23.0 ap367206 Affected: 23.0 ap362771 Affected: 23.0 ap367291 Affected: 23.0 ap366916 Affected: 23.0 ap367207 Affected: 23.0 ap363363 Affected: 23.0 ap366959 Affected: 23.0 ap351530 Affected: 23.0 ap361116 Affected: 23.0 ap366898 Affected: 23.0 ap357608 Affected: 23.0 ap361533 Affected: 23.0 ap366827 Affected: 23.0 ap352962 Affected: 23.0 ap366412 Affected: 23.0 ap369295 Affected: 23.0 ap366358 Affected: 23.0 ap366677 Affected: 23.0 ap366882 Affected: 23.0 ap366972 Affected: 23.0 ap366486 Affected: 23.0 ap366803 Affected: 23.0 ap358290 Affected: 23.0 ap363265 Affected: 23.0 ap363128 Affected: 23.0 ap366701 Affected: 23.0 ap366373 Affected: 23.0 ap369674 Affected: 23.0 ap369206 Affected: 23.0 ap369065 Affected: 23.0 ap368327 Affected: 23.0 ap368308 Affected: 23.0 ap368632 Affected: 23.0 ap367290 Affected: 23.0 ap369302 Affected: 23.0 ap368419 Affected: 23.0 ap369501 Affected: 23.0 ap369219 Affected: 23.0 ap368601 Affected: 23.0 ap368604 Affected: 23.0 ap368706 Affected: 23.0 ap368461 Affected: 23.0 ap368612 Affected: 23.0 ap368552 Affected: 23.0 ap369529 Affected: 23.0 ap369748 Affected: 23.0 ap368218 Affected: 23.0 ap368913 Affected: 23.0 ap369607 Affected: 23.0 ap369693 Affected: 23.0 ap368957 Affected: 23.0 ap368510 Affected: 23.0 ap368445 Affected: 23.0 ap369106 Affected: 23.0 ap369257 Affected: 23.0 ap368987 Affected: 23.0 ap369150 Affected: 23.0 ap368695 Affected: 23.0 ap368167 Affected: 23.0 ap370361 Affected: 23.0 ap367969 Affected: 23.0 ap367367 Affected: 23.0 ap369434 Affected: 23.0 ap369132 Affected: 23.0 ap367678 Affected: 23.0 ap367517 Affected: 23.0 ap369863 Affected: 23.0 ap369227 Affected: 23.0 ap368970 Affected: 23.0 ap369454 Affected: 23.0 ap367332 Affected: 23.0 ap368067 Affected: 23.0 ap369641 Affected: 23.0 ap367794 Affected: 23.0 ap369934 Affected: 23.0 ap370196 Affected: 23.0 ap367358 Affected: 23.0 ap367453 Affected: 23.0 ap369881 Affected: 23.0 ap367732 Affected: 23.0 ap367294 Affected: 23.0 ap367646 Affected: 23.0 ap367874 Affected: 23.0 ap370344 Affected: 23.0 ap367524 Affected: 23.0 ap368153 Affected: 23.0 ap368087 Affected: 23.0 ap367820 Affected: 23.0 ap368180 Affected: 23.0 ap367726 Affected: 23.0 ap370103 Affected: 23.0 ap367974 Affected: 23.0 ap367396 Affected: 23.0 ap367340 Affected: 23.0 ap367293 Affected: 23.0 ap369855 Affected: 23.0 ap368140 Affected: 23.0 ap367298 Affected: 23.0 ap367998 Affected: 23.0 ap372337 Affected: 23.0 ap372706 Affected: 23.0 ap368032 Affected: 23.0 ap367906 Affected: 23.0 ap370138 Affected: 23.0 ap372380 Affected: 23.0 ap372246 Affected: 23.0 ap370193 Affected: 23.0 ap372643 Affected: 23.0 ap372560 Affected: 23.0 ap367513 Affected: 23.0 ap369931 Affected: 23.0 ap368195 Affected: 23.0 ap372243 Affected: 23.0 ap368216 Affected: 23.0 ap369929 Affected: 23.0 ap367365 Affected: 23.0 ap367782 Affected: 23.0 ap367675 Affected: 23.0 ap372757 Affected: 23.0 ap372389 Affected: 23.0 ap372799 Affected: 23.0 ap372641 Affected: 23.0 ap371050 Affected: 23.0 ap372338 Affected: 23.0 ap372623 Affected: 23.0 ap372422 Affected: 23.0 ap372033 Affected: 23.0 ap372178 Affected: 23.0 ap371516 Affected: 23.0 ap372351 Affected: 23.0 ap372708 Affected: 23.0 ap372100 Affected: 23.0 ap372504 Affected: 23.0 ap371961 Affected: 23.0 ap370590 Affected: 23.0 ap370544 Affected: 23.0 ap372599 Affected: 23.0 ap371610 Affected: 23.0 ap371836 Affected: 23.0 ap371343 Affected: 23.0 ap372674 Affected: 23.0 ap371202 Affected: 23.0 ap370911 Affected: 23.0 ap370817 Affected: 23.0 ap372043 Affected: 23.0 ap370802 Affected: 23.0 ap371725 Affected: 23.0 ap370437 Affected: 23.0 ap370926 Affected: 23.0 ap370884 Affected: 23.0 ap371681 Affected: 23.0 ap371366 Affected: 23.0 ap370952 Affected: 23.0 ap371281 Affected: 23.0 ap371436 Affected: 23.0 ap371153 Affected: 23.0 ap371033 Affected: 23.0 ap371977 Affected: 23.0 ap371627 Affected: 23.0 ap371155 Affected: 23.0 ap371134 Affected: 23.0 ap371295 Affected: 23.0 ap372152 Affected: 23.0 ap371760 Affected: 23.0 ap370627 Affected: 23.0 ap371583 Affected: 23.0 ap371546 Affected: 23.0 ap371770 Affected: 23.0 ap371437 Affected: 23.0 ap372091 Affected: 23.0 ap372163 Affected: 23.0 ap370737 Affected: 23.0 ap370908 Affected: 23.0 ap370465 Affected: 23.0 ap371587 Affected: 23.0 ap375133 Affected: 23.0 ap371682 Affected: 23.0 ap375266 Affected: 23.0 ap372099 Affected: 23.0 ap375254 Affected: 23.0 ap372016 Affected: 23.0 ap372177 Affected: 23.0 ap375242 Affected: 23.0 ap375206 Affected: 23.0 ap375291 Affected: 23.0 ap371775 Affected: 23.0 ap375196 Affected: 23.0 ap375688 Affected: 23.0 ap375382 Affected: 23.0 ap375634 Affected: 23.0 ap375654 Affected: 23.0 ap375449 Affected: 23.0 ap375321 Affected: 23.0 ap375685 Affected: 23.0 ap375509 Affected: 23.0 ap375719 Affected: 23.0 ap375720 Affected: 23.0 ap375464 Affected: 23.0 ap375625 Affected: 23.0 ap375441 Affected: 23.0 ap375709 Affected: 23.0 ap375343 Affected: 23.0 ap375533 Affected: 23.0 ap375672 Affected: 23.0 ap375545 Affected: 23.0 ap375264 Affected: 23.0 ap375661 Affected: 23.0 ap375646 Affected: 23.0 ap375238 Affected: 23.0 ap375304 Affected: 23.0 ap375097 Affected: 23.0 ap373664 Affected: 23.0 ap373562 Affected: 23.0 ap372932 Affected: 23.0 ap374339 Affected: 23.0 ap374265 Affected: 23.0 ap374230 Affected: 23.0 ap374430 Affected: 23.0 ap373102 Affected: 23.0 ap375655 Affected: 23.0 ap373777 Affected: 23.0 ap374113 Affected: 23.0 ap373015 Affected: 23.0 ap374971 Affected: 23.0 ap374803 Affected: 23.0 ap374677 Affected: 23.0 ap372974 Affected: 23.0 ap373117 Affected: 23.0 ap374312 Affected: 23.0 ap374354 Affected: 23.0 ap375018 Affected: 23.0 ap373018 Affected: 23.0 ap374506 Affected: 23.0 ap374588 Affected: 23.0 ap373950 Affected: 23.0 ap375038 Affected: 23.0 ap373480 Affected: 23.0 ap374238 Affected: 23.0 ap372845 Affected: 23.0 ap373564 Affected: 23.0 ap373482 Affected: 23.0 ap372994 Affected: 23.0 ap373137 Affected: 23.0 ap373108 Affected: 23.0 ap374977 Affected: 23.0 ap373034 Affected: 23.0 ap374324 Affected: 23.0 ap374031 Affected: 23.0 ap374093 Affected: 23.0 ap373732 Affected: 23.0 ap374507 Affected: 23.0 ap373684 Affected: 23.0 ap374356 Affected: 23.0 ap373820 Affected: 23.0 ap373104 Affected: 23.0 ap373954 Affected: 23.0 ap373644 Affected: 23.0 ap373899 Affected: 23.0 ap374822 Affected: 23.0 ap374254 Affected: 23.0 ap375069 Affected: 23.0 ap373918 Affected: 23.0 ap374557 Affected: 23.0 ap372854 Affected: 23.0 ap373647 Affected: 23.0 ap374838 Affected: 23.0 ap374330 Affected: 23.0 ap374799 Affected: 23.0 ap374428 Affected: 23.0 ap373008 Affected: 23.0 ap375936 Affected: 23.0 ap375862 Affected: 23.0 ap374994 Affected: 23.0 ap376041 Affected: 23.0 ap374895 Affected: 23.0 ap375793 Affected: 23.0 ap376088 Affected: 23.0 ap373046 Affected: 23.0 ap375937 Affected: 23.0 ap374680 Affected: 23.0 ap376181 Affected: 23.0 ap375797 Affected: 23.0 ap375003 Affected: 23.0 ap373763 Affected: 23.0 ap373539 Affected: 23.0 ap373111 Affected: 23.0 ap375734 Affected: 23.0 ap376117 Affected: 23.0 ap375743 Affected: 23.0 ap376087 Affected: 23.0 ap376179 Affected: 23.0 ap376100 Affected: 23.0 ap373299 Affected: 23.0 ap373303 Affected: 23.0 ap375908 Affected: 23.0 ap376356 Affected: 23.0 ap375984 Affected: 23.0 ap373318 Affected: 23.0 ap375865 Affected: 23.0 ap373196 Affected: 23.0 ap376038 Affected: 23.0 ap373257 Affected: 23.0 ap373285 Affected: 23.0 ap376218 Affected: 23.0 ap373438 Affected: 23.0 ap373212 Affected: 23.0 ap373391 Affected: 23.0 ap373315 Affected: 23.0 ap373271 Affected: 23.0 ap376509 Affected: 23.0 ap376252 Affected: 23.0 ap376602 Affected: 23.0 ap376752 Affected: 23.0 ap373452 Affected: 23.0 ap376429 Affected: 23.0 ap376860 Affected: 23.0 ap376710 Affected: 23.0 ap376410 Affected: 23.0 ap376577 Affected: 23.0 ap376633 Affected: 23.0 ap376298 Affected: 23.0 ap373189 Affected: 23.0 ap376426 Affected: 23.0 ap376873 Affected: 23.0 ap376668 Affected: 23.0 ap376407 Affected: 23.0 ap376670 Affected: 23.0 ap376485 Affected: 23.0 ap376642 Affected: 23.0 ap376652 Affected: 23.0 ap376523 Affected: 23.0 ap376656 Affected: 23.0 ap376620 Affected: 23.0 ap376531 Affected: 23.0 ap378025 Affected: 23.0 ap377412 Affected: 23.0 ap376504 Affected: 23.0 ap376762 Affected: 23.0 ap376541 Affected: 23.0 ap376671 Affected: 23.0 ap376844 Affected: 23.0 ap376701 Affected: 23.0 ap376614 Affected: 23.0 ap377578 Affected: 23.0 ap377496 Affected: 23.0 ap377715 Affected: 23.0 ap377508 Affected: 23.0 ap376416 Affected: 23.0 ap377409 Affected: 23.0 ap377778 Affected: 23.0 ap376355 Affected: 23.0 ap377866 Affected: 23.0 ap377516 Affected: 23.0 ap377644 Affected: 23.0 ap377755 Affected: 23.0 ap377540 Affected: 23.0 ap377497 Affected: 23.0 ap377523 Affected: 23.0 ap377581 Affected: 23.0 ap377727 Affected: 23.0 ap378436 Affected: 23.0 ap377515 Affected: 23.0 ap377674 Affected: 23.0 ap378400 Affected: 23.0 ap377566 Affected: 23.0 ap377494 Affected: 23.0 ap377799 Affected: 23.0 ap377779 Affected: 23.0 ap378165 Affected: 23.0 ap378332 Affected: 23.0 ap377757 Affected: 23.0 ap377908 Affected: 23.0 ap377802 Affected: 23.0 ap377999 Affected: 23.0 ap377984 Affected: 23.0 ap378134 Affected: 23.0 ap378545 Affected: 23.0 ap378863 Affected: 23.0 ap378882 Affected: 23.0 ap379016 Affected: 23.0 ap378599 Affected: 23.0 ap378218 Affected: 23.0 ap378164 Affected: 23.0 ap379085 Affected: 23.0 ap378880 Affected: 23.0 ap378334 Affected: 23.0 ap378862 Affected: 23.0 ap378425 Affected: 23.0 ap378259 Affected: 23.0 ap378970 Affected: 23.0 ap378153 Affected: 23.0 ap378585 Affected: 23.0 ap378509 Affected: 23.0 ap378393 Affected: 23.0 ap378079 Affected: 23.0 ap378404 Affected: 23.0 ap378471 Affected: 23.0 ap378966 Affected: 23.0 ap379049 Affected: 23.0 ap379012 Affected: 23.0 ap379080 Affected: 23.0 ap378865 Affected: 23.0 ap378140 Affected: 23.0 ap378574 Affected: 23.0 ap378440 Affected: 23.0 ap378055 Affected: 23.0 ap378823 Affected: 23.0 ap378603 Affected: 23.0 ap379397 Affected: 23.0 ap379153 Affected: 23.0 ap378953 Affected: 23.0 ap378866 Affected: 23.0 ap379008 Affected: 23.0 ap378924 Affected: 23.0 ap378581 Affected: 23.0 ap378999 Affected: 23.0 ap378161 Affected: 23.0 ap378080 Affected: 23.0 ap379493 Affected: 23.0 ap380161 Affected: 23.0 ap379046 Affected: 23.0 ap379874 Affected: 23.0 ap378391 Affected: 23.0 ap380239 Affected: 23.0 ap379951 Affected: 23.0 ap379772 Affected: 23.0 ap378419 Affected: 23.0 ap378257 Affected: 23.0 ap379775 Affected: 23.0 ap379838 Affected: 23.0 ap379531 Affected: 23.0 ap379888 Affected: 23.0 ap379167 Affected: 23.0 ap378485 Affected: 23.0 ap380167 Affected: 23.0 ap380099 Affected: 23.0 ap379847 Affected: 23.0 ap379098 Affected: 23.0 ap379972 Affected: 23.0 ap379438 Affected: 23.0 ap380143 Affected: 23.0 ap380187 Affected: 23.0 ap379326 Affected: 23.0 ap379427 Affected: 23.0 ap380045 Affected: 23.0 ap379848 Affected: 23.0 ap377384 Affected: 23.0 ap376984 Affected: 23.0 ap377042 Affected: 23.0 ap379890 Affected: 23.0 ap380128 Affected: 23.0 ap377149 Affected: 23.0 ap380446 Affected: 23.0 ap379694 Affected: 23.0 ap376988 Affected: 23.0 ap380270 Affected: 23.0 ap379780 Affected: 23.0 ap380371 Affected: 23.0 ap377225 Affected: 23.0 ap379752 Affected: 23.0 ap380137 Affected: 23.0 ap377045 Affected: 23.0 ap376989 Affected: 23.0 ap380180 Affected: 23.0 ap380042 Affected: 23.0 ap376935 Affected: 23.0 ap379487 Affected: 23.0 ap379934 Affected: 23.0 ap377023 Affected: 23.0 ap377327 Affected: 23.0 ap379833 Affected: 23.0 ap376953 Affected: 23.0 ap380473 Affected: 23.0 ap380535 Affected: 23.0 ap377068 Affected: 23.0 ap379853 Affected: 23.0 ap379350 Affected: 23.0 ap380998 Affected: 23.0 ap380626 Affected: 23.0 ap377079 Affected: 23.0 ap379151 Affected: 23.0 ap377329 Affected: 23.0 ap381091 Affected: 23.0 ap380751 Affected: 23.0 ap380543 Affected: 23.0 ap381270 Affected: 23.0 ap380817 Affected: 23.0 ap381055 Affected: 23.0 ap380506 Affected: 23.0 ap381275 Affected: 23.0 ap380739 Affected: 23.0 ap380783 Affected: 23.0 ap380970 Affected: 23.0 ap380537 Affected: 23.0 ap381140 Affected: 23.0 ap380697 Affected: 23.0 ap380936 Affected: 23.0 ap380486 Affected: 23.0 ap380512 Affected: 23.0 ap380737 Affected: 23.0 ap381118 Affected: 23.0 ap380555 Affected: 23.0 ap381072 Affected: 23.0 ap381584 Affected: 23.0 ap381088 Affected: 23.0 ap381137 Affected: 23.0 ap382053 Affected: 23.0 ap381523 Affected: 23.0 ap381732 Affected: 23.0 ap382372 Affected: 23.0 ap382252 Affected: 23.0 ap383002 Affected: 23.0 ap382857 Affected: 23.0 ap383512 Affected: 23.0 ap382846 Affected: 23.0 ap382253 Affected: 23.0 ap381322 Affected: 23.0 ap382057 Affected: 23.0 ap382386 Affected: 23.0 ap382709 Affected: 23.0 ap382954 Affected: 23.0 ap382505 Affected: 23.0 ap382225 Affected: 23.0 ap382717 Affected: 23.0 ap381840 Affected: 23.0 ap381594 Affected: 23.0 ap381410 Affected: 23.0 ap382463 Affected: 23.0 ap382198 Affected: 23.0 ap381526 Affected: 23.0 ap381498 Affected: 23.0 ap381418 Affected: 23.0 ap383573 Affected: 23.0 ap382838 Affected: 23.0 ap381609 Affected: 23.0 ap381548 Affected: 23.0 ap382409 Affected: 23.0 ap383706 Affected: 23.0 ap382945 Affected: 23.0 ap382300 Affected: 23.0 ap382615 Affected: 23.0 ap382977 Affected: 23.0 ap384345 Affected: 23.0 ap383547 Affected: 23.0 ap382158 Affected: 23.0 ap382240 Affected: 23.0 ap383515 Affected: 23.0 ap383754 Affected: 23.0 ap381961 Affected: 23.0 ap382526 Affected: 23.0 ap382951 Affected: 23.0 ap382824 Affected: 23.0 ap382993 Affected: 23.0 ap383536 Affected: 23.0 ap383247 Affected: 23.0 ap381504 Affected: 23.0 ap383170 Affected: 23.0 ap382032 Affected: 23.0 ap382992 Affected: 23.0 ap383594 Affected: 23.0 ap383365 Affected: 23.0 ap383772 Affected: 23.0 ap381569 Affected: 23.0 ap381348 Affected: 23.0 ap382192 Affected: 23.0 ap381367 Affected: 23.0 ap383352 Affected: 23.0 ap383597 Affected: 23.0 ap381622 Affected: 23.0 ap383518 Affected: 23.0 ap383492 Affected: 23.0 ap383309 Affected: 23.0 ap383064 Affected: 23.0 ap383168 Affected: 23.0 ap382362 Affected: 23.0 ap382251 Affected: 23.0 ap383319 Affected: 23.0 ap382434 Affected: 23.0 ap384431 Affected: 23.0 ap383514 Affected: 23.0 ap384441 Affected: 22.0 ap383594 Affected: 22.0 ap371725 Affected: 22.0 ap383319 Affected: 22.0 ap367293 Affected: 22.0 ap383512 Affected: 22.0 ap376088 Affected: 22.0 ap361155 Affected: 22.0 ap382864 Affected: 22.0 ap383716 Affected: 22.0 ap383701 Affected: 22.0 ap342175 Affected: 22.0 ap339371 Affected: 22.0 ap353835 Affected: 22.0 ap351023 Affected: 22.0 ap354154 Affected: 22.0 ap353865 Affected: 22.0 ap350800 Affected: 22.0 ap350032 Affected: 22.0 ap349201 Affected: 22.0 ap353120 Affected: 22.0 ap351924 Affected: 22.0 ap351817 Affected: 22.0 ap353549 Affected: 22.0 ap353179 Affected: 22.0 ap351960 Affected: 22.0 ap352304 Affected: 22.0 ap353390 Affected: 22.0 ap352707 Affected: 22.0 ap355636 Affected: 22.0 ap352837 Affected: 22.0 ap353311 Affected: 22.0 ap352337 Affected: 22.0 ap355300 Affected: 22.0 ap356412 Affected: 22.0 ap355946 Affected: 22.0 ap355647 Affected: 22.0 ap356253 Affected: 22.0 ap354528 Affected: 22.0 ap355353 Affected: 22.0 ap356359 Affected: 22.0 ap355952 Affected: 22.0 ap354909 Affected: 22.0 ap356749 Affected: 22.0 ap357347 Affected: 22.0 ap354597 Affected: 22.0 ap356319 Affected: 22.0 ap356774 Affected: 22.0 ap356551 Affected: 22.0 ap351262 Affected: 22.0 ap357040 Affected: 22.0 ap357525 Affected: 22.0 ap357447 Affected: 22.0 ap357560 Affected: 22.0 ap357608 Affected: 22.0 ap357655 Affected: 22.0 ap357597 Affected: 22.0 ap358099 Affected: 22.0 ap357523 Affected: 22.0 ap357621 Affected: 22.0 ap357795 Affected: 22.0 ap358291 Affected: 22.0 ap359434 Affected: 22.0 ap358290 Affected: 22.0 ap358119 Affected: 22.0 ap359549 Affected: 22.0 ap358603 Affected: 22.0 ap359674 Affected: 22.0 ap359121 Affected: 22.0 ap360250 Affected: 22.0 ap360564 Affected: 22.0 ap359106 Affected: 22.0 ap359218 Affected: 22.0 ap359769 Affected: 22.0 ap360164 Affected: 22.0 ap359001 Affected: 22.0 ap360365 Affected: 22.0 ap360816 Affected: 22.0 ap361116 Affected: 22.0 ap361353 Affected: 22.0 ap361076 Affected: 22.0 ap360531 Affected: 22.0 ap362367 Affected: 22.0 ap362683 Affected: 22.0 ap362276 Affected: 22.0 ap362707 Affected: 22.0 ap361934 Affected: 22.0 ap363082 Affected: 22.0 ap361154 Affected: 22.0 ap362122 Affected: 22.0 ap364194 Affected: 22.0 ap361666 Affected: 22.0 ap362492 Affected: 22.0 ap363753 Affected: 22.0 ap362644 Affected: 22.0 ap367820 Affected: 22.0 ap362575 Affected: 22.0 ap363361 Affected: 22.0 ap363760 Affected: 22.0 ap364048 Affected: 22.0 ap363233 Affected: 22.0 ap363666 Affected: 22.0 ap363568 Affected: 22.0 ap367974 Affected: 22.0 ap364278 Affected: 22.0 ap363824 Affected: 22.0 ap368067 Affected: 22.0 ap363976 Affected: 22.0 ap364213 Affected: 22.0 ap364275 Affected: 22.0 ap366397 Affected: 22.0 ap366624 Affected: 22.0 ap363582 Affected: 22.0 ap364125 Affected: 22.0 ap366252 Affected: 22.0 ap363408 Affected: 22.0 ap366715 Affected: 22.0 ap364214 Affected: 22.0 ap364258 Affected: 22.0 ap366784 Affected: 22.0 ap366358 Affected: 22.0 ap366180 Affected: 22.0 ap365172 Affected: 22.0 ap366430 Affected: 22.0 ap364778 Affected: 22.0 ap364834 Affected: 22.0 ap364521 Affected: 22.0 ap364905 Affected: 22.0 ap364844 Affected: 22.0 ap364635 Affected: 22.0 ap367298 Affected: 22.0 ap365171 Affected: 22.0 ap364924 Affected: 22.0 ap365905 Affected: 22.0 ap365515 Affected: 22.0 ap367001 Affected: 22.0 ap365577 Affected: 22.0 ap365759 Affected: 22.0 ap365758 Affected: 22.0 ap367290 Affected: 22.0 ap367183 Affected: 22.0 ap371654 Affected: 22.0 ap371703 Affected: 22.0 ap365511 Affected: 22.0 ap365576 Affected: 22.0 ap370802 Affected: 22.0 ap365944 Affected: 22.0 ap366959 Affected: 22.0 ap371202 Affected: 22.0 ap365858 Affected: 22.0 ap371919 Affected: 22.0 ap367294 Affected: 22.0 ap371343 Affected: 22.0 ap367206 Affected: 22.0 ap371134 Affected: 22.0 ap372178 Affected: 22.0 ap371926 Affected: 22.0 ap372017 Affected: 22.0 ap371681 Affected: 22.0 ap372192 Affected: 22.0 ap371610 Affected: 22.0 ap371546 Affected: 22.0 ap371281 Affected: 22.0 ap371770 Affected: 22.0 ap370908 Affected: 22.0 ap368308 Affected: 22.0 ap371195 Affected: 22.0 ap371366 Affected: 22.0 ap368140 Affected: 22.0 ap371977 Affected: 22.0 ap371682 Affected: 22.0 ap371627 Affected: 22.0 ap369641 Affected: 22.0 ap369855 Affected: 22.0 ap368195 Affected: 22.0 ap368957 Affected: 22.0 ap368612 Affected: 22.0 ap368568 Affected: 22.0 ap368217 Affected: 22.0 ap369529 Affected: 22.0 ap368096 Affected: 22.0 ap368601 Affected: 22.0 ap368970 Affected: 22.0 ap369881 Affected: 22.0 ap369550 Affected: 22.0 ap369295 Affected: 22.0 ap369473 Affected: 22.0 ap369065 Affected: 22.0 ap372433 Affected: 22.0 ap372567 Affected: 22.0 ap372522 Affected: 22.0 ap369800 Affected: 22.0 ap372389 Affected: 22.0 ap372560 Affected: 22.0 ap370563 Affected: 22.0 ap370344 Affected: 22.0 ap372623 Affected: 22.0 ap370424 Affected: 22.0 ap370170 Affected: 22.0 ap374680 Affected: 22.0 ap374169 Affected: 22.0 ap374799 Affected: 22.0 ap370437 Affected: 22.0 ap374430 Affected: 22.0 ap374677 Affected: 22.0 ap372968 Affected: 22.0 ap373118 Affected: 22.0 ap373855 Affected: 22.0 ap373438 Affected: 22.0 ap374660 Affected: 22.0 ap373391 Affected: 22.0 ap373196 Affected: 22.0 ap373732 Affected: 22.0 ap374113 Affected: 22.0 ap373034 Affected: 22.0 ap373189 Affected: 22.0 ap374488 Affected: 22.0 ap374354 Affected: 22.0 ap373285 Affected: 22.0 ap373108 Affected: 22.0 ap374238 Affected: 22.0 ap373315 Affected: 22.0 ap373299 Affected: 22.0 ap373137 Affected: 22.0 ap373482 Affected: 22.0 ap375734 Affected: 22.0 ap375625 Affected: 22.0 ap375862 Affected: 22.0 ap373318 Affected: 22.0 ap375441 Affected: 22.0 ap375200 Affected: 22.0 ap374131 Affected: 22.0 ap373008 Affected: 22.0 ap376504 Affected: 22.0 ap376355 Affected: 22.0 ap372799 Affected: 22.0 ap376577 Affected: 22.0 ap374977 Affected: 22.0 ap375206 Affected: 22.0 ap375309 Affected: 22.0 ap375937 Affected: 22.0 ap375465 Affected: 22.0 ap375464 Affected: 22.0 ap375865 Affected: 22.0 ap375672 Affected: 22.0 ap375793 Affected: 22.0 ap374891 Affected: 22.0 ap376100 Affected: 22.0 ap375382 Affected: 22.0 ap375383 Affected: 22.0 ap375661 Affected: 22.0 ap375709 Affected: 22.0 ap375984 Affected: 22.0 ap375719 Affected: 22.0 ap376117 Affected: 22.0 ap376535 Affected: 22.0 ap375654 Affected: 22.0 ap375133 Affected: 22.0 ap375413 Affected: 22.0 ap379838 Affected: 22.0 ap375797 Affected: 22.0 ap379775 Affected: 22.0 ap380446 Affected: 22.0 ap379752 Affected: 22.0 ap376261 Affected: 22.0 ap380232 Affected: 22.0 ap375720 Affected: 22.0 ap380506 Affected: 22.0 ap380108 Affected: 22.0 ap376633 Affected: 22.0 ap379917 Affected: 22.0 ap380201 Affected: 22.0 ap379951 Affected: 22.0 ap380507 Affected: 22.0 ap380449 Affected: 22.0 ap380137 Affected: 22.0 ap376988 Affected: 22.0 ap376989 Affected: 22.0 ap376752 Affected: 22.0 ap376642 Affected: 22.0 ap377225 Affected: 22.0 ap376953 Affected: 22.0 ap376935 Affected: 22.0 ap377497 Affected: 22.0 ap376652 Affected: 22.0 ap380130 Affected: 22.0 ap376762 Affected: 22.0 ap377982 Affected: 22.0 ap376844 Affected: 22.0 ap377625 Affected: 22.0 ap377483 Affected: 22.0 ap377042 Affected: 22.0 ap378334 Affected: 22.0 ap377389 Affected: 22.0 ap378055 Affected: 22.0 ap378485 Affected: 22.0 ap378257 Affected: 22.0 ap377164 Affected: 22.0 ap378393 Affected: 22.0 ap378025 Affected: 22.0 ap377409 Affected: 22.0 ap378419 Affected: 22.0 ap377327 Affected: 22.0 ap378161 Affected: 22.0 ap377045 Affected: 22.0 ap378866 Affected: 22.0 ap379461 Affected: 22.0 ap379326 Affected: 22.0 ap378079 Affected: 22.0 ap377715 Affected: 22.0 ap379151 Affected: 22.0 ap379350 Affected: 22.0 ap379427 Affected: 22.0 ap379493 Affected: 22.0 ap379556 Affected: 22.0 ap379153 Affected: 22.0 ap382225 Affected: 22.0 ap380555 Affected: 22.0 ap381137 Affected: 22.0 ap382032 Affected: 22.0 ap382362 Affected: 22.0 ap381275 Affected: 22.0 ap381622 Affected: 22.0 ap380970 Affected: 22.0 ap382251 Affected: 22.0 ap382372 Affected: 22.0 ap381009 Affected: 22.0 ap381140 Affected: 22.0 ap381504 Affected: 22.0 ap382409 Affected: 22.0 ap382993 Affected: 22.0 ap382951 Affected: 22.0 ap383655 Affected: 22.0 ap382615 Affected: 22.0 ap382903 Affected: 22.0 ap382838 Affected: 22.0 ap382476 Affected: 22.0 ap354180 Affected: 22.0 ap359429 Affected: RI.2021.02 Affected: RI.2021.08 Affected: RI.2021.09 Affected: RI.2021.10 Affected: RI.2021.11 Affected: RI.2021.12 Affected: RI.2022.02 Affected: RI.2022.03 Affected: RI.2022.04 Affected: RI.2022.07 Affected: RI.2022.06 Affected: RI.2022.05 Affected: RI.2022.09 Affected: RI.2022.10 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:57:35.651Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-bw-dos-HpkeYzp",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-dos-HpkeYzp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco BroadWorks",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "23.0"
},
{
"status": "affected",
"version": "23.0 ap380391"
},
{
"status": "affected",
"version": "23.0 ap380396"
},
{
"status": "affected",
"version": "23.0 ap379795"
},
{
"status": "affected",
"version": "23.0 ap373098"
},
{
"status": "affected",
"version": "23.0 ap382864"
},
{
"status": "affected",
"version": "23.0 ap382358"
},
{
"status": "affected",
"version": "23.0 ap382281"
},
{
"status": "affected",
"version": "23.0 ap367434"
},
{
"status": "affected",
"version": "23.0 ap376661"
},
{
"status": "affected",
"version": "23.0 ap380691"
},
{
"status": "affected",
"version": "23.0 ap383569"
},
{
"status": "affected",
"version": "23.0 ap375601"
},
{
"status": "affected",
"version": "23.0 ap372017"
},
{
"status": "affected",
"version": "23.0 ap383519"
},
{
"status": "affected",
"version": "23.0 ap375345"
},
{
"status": "affected",
"version": "23.0 ap371300"
},
{
"status": "affected",
"version": "23.0 ap383785"
},
{
"status": "affected",
"version": "23.0 ap380771"
},
{
"status": "affected",
"version": "23.0 ap351263"
},
{
"status": "affected",
"version": "23.0 ap376010"
},
{
"status": "affected",
"version": "23.0 ap382487"
},
{
"status": "affected",
"version": "23.0 ap383490"
},
{
"status": "affected",
"version": "23.0 ap383710"
},
{
"status": "affected",
"version": "23.0 ap375383"
},
{
"status": "affected",
"version": "23.0 ap375309"
},
{
"status": "affected",
"version": "23.0 ap375465"
},
{
"status": "affected",
"version": "23.0 ap380201"
},
{
"status": "affected",
"version": "23.0 ap380041"
},
{
"status": "affected",
"version": "23.0 ap380507"
},
{
"status": "affected",
"version": "23.0 ap379461"
},
{
"status": "affected",
"version": "23.0 ap377147"
},
{
"status": "affected",
"version": "23.0 ap376261"
},
{
"status": "affected",
"version": "23.0 ap381243"
},
{
"status": "affected",
"version": "23.0 ap381271"
},
{
"status": "affected",
"version": "23.0 ap382195"
},
{
"status": "affected",
"version": "23.0 ap380130"
},
{
"status": "affected",
"version": "23.0 ap380232"
},
{
"status": "affected",
"version": "23.0 ap377483"
},
{
"status": "affected",
"version": "23.0 ap383716"
},
{
"status": "affected",
"version": "23.0 ap383913"
},
{
"status": "affected",
"version": "23.0 ap383943"
},
{
"status": "affected",
"version": "23.0 ap383955"
},
{
"status": "affected",
"version": "23.0 ap383979"
},
{
"status": "affected",
"version": "23.0 ap383838"
},
{
"status": "affected",
"version": "23.0 ap384023"
},
{
"status": "affected",
"version": "23.0 ap381781"
},
{
"status": "affected",
"version": "23.0 ap383717"
},
{
"status": "affected",
"version": "23.0 ap383797"
},
{
"status": "affected",
"version": "23.0 ap383815"
},
{
"status": "affected",
"version": "23.0 ap383998"
},
{
"status": "affected",
"version": "23.0 ap384015"
},
{
"status": "affected",
"version": "23.0 ap384127"
},
{
"status": "affected",
"version": "23.0 ap384131"
},
{
"status": "affected",
"version": "23.0 ap384151"
},
{
"status": "affected",
"version": "23.0 ap384173"
},
{
"status": "affected",
"version": "23.0 ap384179"
},
{
"status": "affected",
"version": "23.0 ap384185"
},
{
"status": "affected",
"version": "23.0 ap384211"
},
{
"status": "affected",
"version": "23.0 ap384220"
},
{
"status": "affected",
"version": "23.0 ap384227"
},
{
"status": "affected",
"version": "23.0 ap384344"
},
{
"status": "affected",
"version": "23.0 ap363366"
},
{
"status": "affected",
"version": "23.0 ap364258"
},
{
"status": "affected",
"version": "23.0 ap364844"
},
{
"status": "affected",
"version": "23.0 ap365170"
},
{
"status": "affected",
"version": "23.0 ap365576"
},
{
"status": "affected",
"version": "23.0 ap365858"
},
{
"status": "affected",
"version": "23.0 ap366221"
},
{
"status": "affected",
"version": "23.0 ap366294"
},
{
"status": "affected",
"version": "23.0 ap365801"
},
{
"status": "affected",
"version": "23.0 ap366170"
},
{
"status": "affected",
"version": "23.0 ap364925"
},
{
"status": "affected",
"version": "23.0 ap366295"
},
{
"status": "affected",
"version": "23.0 ap366346"
},
{
"status": "affected",
"version": "23.0 ap366348"
},
{
"status": "affected",
"version": "23.0 ap365171"
},
{
"status": "affected",
"version": "23.0 ap364295"
},
{
"status": "affected",
"version": "23.0 ap364559"
},
{
"status": "affected",
"version": "23.0 ap366118"
},
{
"status": "affected",
"version": "23.0 ap366252"
},
{
"status": "affected",
"version": "23.0 ap363815"
},
{
"status": "affected",
"version": "23.0 ap363729"
},
{
"status": "affected",
"version": "23.0 ap365390"
},
{
"status": "affected",
"version": "23.0 ap364932"
},
{
"status": "affected",
"version": "23.0 ap365239"
},
{
"status": "affected",
"version": "23.0 ap365759"
},
{
"status": "affected",
"version": "23.0 ap366211"
},
{
"status": "affected",
"version": "23.0 ap366290"
},
{
"status": "affected",
"version": "23.0 ap365223"
},
{
"status": "affected",
"version": "23.0 ap366117"
},
{
"status": "affected",
"version": "23.0 ap365730"
},
{
"status": "affected",
"version": "23.0 ap366299"
},
{
"status": "affected",
"version": "23.0 ap366261"
},
{
"status": "affected",
"version": "23.0 ap365889"
},
{
"status": "affected",
"version": "23.0 ap366181"
},
{
"status": "affected",
"version": "23.0 ap365115"
},
{
"status": "affected",
"version": "23.0 ap364048"
},
{
"status": "affected",
"version": "23.0 ap366298"
},
{
"status": "affected",
"version": "23.0 ap364699"
},
{
"status": "affected",
"version": "23.0 ap345032"
},
{
"status": "affected",
"version": "23.0 ap362683"
},
{
"status": "affected",
"version": "23.0 ap363361"
},
{
"status": "affected",
"version": "23.0 ap352969"
},
{
"status": "affected",
"version": "23.0 ap359103"
},
{
"status": "affected",
"version": "23.0 ap366375"
},
{
"status": "affected",
"version": "23.0 ap366870"
},
{
"status": "affected",
"version": "23.0 ap366912"
},
{
"status": "affected",
"version": "23.0 ap366624"
},
{
"status": "affected",
"version": "23.0 ap367109"
},
{
"status": "affected",
"version": "23.0 ap366397"
},
{
"status": "affected",
"version": "23.0 ap354354"
},
{
"status": "affected",
"version": "23.0 ap349850"
},
{
"status": "affected",
"version": "23.0 ap366880"
},
{
"status": "affected",
"version": "23.0 ap360007"
},
{
"status": "affected",
"version": "23.0 ap366744"
},
{
"status": "affected",
"version": "23.0 ap366747"
},
{
"status": "affected",
"version": "23.0 ap366656"
},
{
"status": "affected",
"version": "23.0 ap367206"
},
{
"status": "affected",
"version": "23.0 ap362771"
},
{
"status": "affected",
"version": "23.0 ap367291"
},
{
"status": "affected",
"version": "23.0 ap366916"
},
{
"status": "affected",
"version": "23.0 ap367207"
},
{
"status": "affected",
"version": "23.0 ap363363"
},
{
"status": "affected",
"version": "23.0 ap366959"
},
{
"status": "affected",
"version": "23.0 ap351530"
},
{
"status": "affected",
"version": "23.0 ap361116"
},
{
"status": "affected",
"version": "23.0 ap366898"
},
{
"status": "affected",
"version": "23.0 ap357608"
},
{
"status": "affected",
"version": "23.0 ap361533"
},
{
"status": "affected",
"version": "23.0 ap366827"
},
{
"status": "affected",
"version": "23.0 ap352962"
},
{
"status": "affected",
"version": "23.0 ap366412"
},
{
"status": "affected",
"version": "23.0 ap369295"
},
{
"status": "affected",
"version": "23.0 ap366358"
},
{
"status": "affected",
"version": "23.0 ap366677"
},
{
"status": "affected",
"version": "23.0 ap366882"
},
{
"status": "affected",
"version": "23.0 ap366972"
},
{
"status": "affected",
"version": "23.0 ap366486"
},
{
"status": "affected",
"version": "23.0 ap366803"
},
{
"status": "affected",
"version": "23.0 ap358290"
},
{
"status": "affected",
"version": "23.0 ap363265"
},
{
"status": "affected",
"version": "23.0 ap363128"
},
{
"status": "affected",
"version": "23.0 ap366701"
},
{
"status": "affected",
"version": "23.0 ap366373"
},
{
"status": "affected",
"version": "23.0 ap369674"
},
{
"status": "affected",
"version": "23.0 ap369206"
},
{
"status": "affected",
"version": "23.0 ap369065"
},
{
"status": "affected",
"version": "23.0 ap368327"
},
{
"status": "affected",
"version": "23.0 ap368308"
},
{
"status": "affected",
"version": "23.0 ap368632"
},
{
"status": "affected",
"version": "23.0 ap367290"
},
{
"status": "affected",
"version": "23.0 ap369302"
},
{
"status": "affected",
"version": "23.0 ap368419"
},
{
"status": "affected",
"version": "23.0 ap369501"
},
{
"status": "affected",
"version": "23.0 ap369219"
},
{
"status": "affected",
"version": "23.0 ap368601"
},
{
"status": "affected",
"version": "23.0 ap368604"
},
{
"status": "affected",
"version": "23.0 ap368706"
},
{
"status": "affected",
"version": "23.0 ap368461"
},
{
"status": "affected",
"version": "23.0 ap368612"
},
{
"status": "affected",
"version": "23.0 ap368552"
},
{
"status": "affected",
"version": "23.0 ap369529"
},
{
"status": "affected",
"version": "23.0 ap369748"
},
{
"status": "affected",
"version": "23.0 ap368218"
},
{
"status": "affected",
"version": "23.0 ap368913"
},
{
"status": "affected",
"version": "23.0 ap369607"
},
{
"status": "affected",
"version": "23.0 ap369693"
},
{
"status": "affected",
"version": "23.0 ap368957"
},
{
"status": "affected",
"version": "23.0 ap368510"
},
{
"status": "affected",
"version": "23.0 ap368445"
},
{
"status": "affected",
"version": "23.0 ap369106"
},
{
"status": "affected",
"version": "23.0 ap369257"
},
{
"status": "affected",
"version": "23.0 ap368987"
},
{
"status": "affected",
"version": "23.0 ap369150"
},
{
"status": "affected",
"version": "23.0 ap368695"
},
{
"status": "affected",
"version": "23.0 ap368167"
},
{
"status": "affected",
"version": "23.0 ap370361"
},
{
"status": "affected",
"version": "23.0 ap367969"
},
{
"status": "affected",
"version": "23.0 ap367367"
},
{
"status": "affected",
"version": "23.0 ap369434"
},
{
"status": "affected",
"version": "23.0 ap369132"
},
{
"status": "affected",
"version": "23.0 ap367678"
},
{
"status": "affected",
"version": "23.0 ap367517"
},
{
"status": "affected",
"version": "23.0 ap369863"
},
{
"status": "affected",
"version": "23.0 ap369227"
},
{
"status": "affected",
"version": "23.0 ap368970"
},
{
"status": "affected",
"version": "23.0 ap369454"
},
{
"status": "affected",
"version": "23.0 ap367332"
},
{
"status": "affected",
"version": "23.0 ap368067"
},
{
"status": "affected",
"version": "23.0 ap369641"
},
{
"status": "affected",
"version": "23.0 ap367794"
},
{
"status": "affected",
"version": "23.0 ap369934"
},
{
"status": "affected",
"version": "23.0 ap370196"
},
{
"status": "affected",
"version": "23.0 ap367358"
},
{
"status": "affected",
"version": "23.0 ap367453"
},
{
"status": "affected",
"version": "23.0 ap369881"
},
{
"status": "affected",
"version": "23.0 ap367732"
},
{
"status": "affected",
"version": "23.0 ap367294"
},
{
"status": "affected",
"version": "23.0 ap367646"
},
{
"status": "affected",
"version": "23.0 ap367874"
},
{
"status": "affected",
"version": "23.0 ap370344"
},
{
"status": "affected",
"version": "23.0 ap367524"
},
{
"status": "affected",
"version": "23.0 ap368153"
},
{
"status": "affected",
"version": "23.0 ap368087"
},
{
"status": "affected",
"version": "23.0 ap367820"
},
{
"status": "affected",
"version": "23.0 ap368180"
},
{
"status": "affected",
"version": "23.0 ap367726"
},
{
"status": "affected",
"version": "23.0 ap370103"
},
{
"status": "affected",
"version": "23.0 ap367974"
},
{
"status": "affected",
"version": "23.0 ap367396"
},
{
"status": "affected",
"version": "23.0 ap367340"
},
{
"status": "affected",
"version": "23.0 ap367293"
},
{
"status": "affected",
"version": "23.0 ap369855"
},
{
"status": "affected",
"version": "23.0 ap368140"
},
{
"status": "affected",
"version": "23.0 ap367298"
},
{
"status": "affected",
"version": "23.0 ap367998"
},
{
"status": "affected",
"version": "23.0 ap372337"
},
{
"status": "affected",
"version": "23.0 ap372706"
},
{
"status": "affected",
"version": "23.0 ap368032"
},
{
"status": "affected",
"version": "23.0 ap367906"
},
{
"status": "affected",
"version": "23.0 ap370138"
},
{
"status": "affected",
"version": "23.0 ap372380"
},
{
"status": "affected",
"version": "23.0 ap372246"
},
{
"status": "affected",
"version": "23.0 ap370193"
},
{
"status": "affected",
"version": "23.0 ap372643"
},
{
"status": "affected",
"version": "23.0 ap372560"
},
{
"status": "affected",
"version": "23.0 ap367513"
},
{
"status": "affected",
"version": "23.0 ap369931"
},
{
"status": "affected",
"version": "23.0 ap368195"
},
{
"status": "affected",
"version": "23.0 ap372243"
},
{
"status": "affected",
"version": "23.0 ap368216"
},
{
"status": "affected",
"version": "23.0 ap369929"
},
{
"status": "affected",
"version": "23.0 ap367365"
},
{
"status": "affected",
"version": "23.0 ap367782"
},
{
"status": "affected",
"version": "23.0 ap367675"
},
{
"status": "affected",
"version": "23.0 ap372757"
},
{
"status": "affected",
"version": "23.0 ap372389"
},
{
"status": "affected",
"version": "23.0 ap372799"
},
{
"status": "affected",
"version": "23.0 ap372641"
},
{
"status": "affected",
"version": "23.0 ap371050"
},
{
"status": "affected",
"version": "23.0 ap372338"
},
{
"status": "affected",
"version": "23.0 ap372623"
},
{
"status": "affected",
"version": "23.0 ap372422"
},
{
"status": "affected",
"version": "23.0 ap372033"
},
{
"status": "affected",
"version": "23.0 ap372178"
},
{
"status": "affected",
"version": "23.0 ap371516"
},
{
"status": "affected",
"version": "23.0 ap372351"
},
{
"status": "affected",
"version": "23.0 ap372708"
},
{
"status": "affected",
"version": "23.0 ap372100"
},
{
"status": "affected",
"version": "23.0 ap372504"
},
{
"status": "affected",
"version": "23.0 ap371961"
},
{
"status": "affected",
"version": "23.0 ap370590"
},
{
"status": "affected",
"version": "23.0 ap370544"
},
{
"status": "affected",
"version": "23.0 ap372599"
},
{
"status": "affected",
"version": "23.0 ap371610"
},
{
"status": "affected",
"version": "23.0 ap371836"
},
{
"status": "affected",
"version": "23.0 ap371343"
},
{
"status": "affected",
"version": "23.0 ap372674"
},
{
"status": "affected",
"version": "23.0 ap371202"
},
{
"status": "affected",
"version": "23.0 ap370911"
},
{
"status": "affected",
"version": "23.0 ap370817"
},
{
"status": "affected",
"version": "23.0 ap372043"
},
{
"status": "affected",
"version": "23.0 ap370802"
},
{
"status": "affected",
"version": "23.0 ap371725"
},
{
"status": "affected",
"version": "23.0 ap370437"
},
{
"status": "affected",
"version": "23.0 ap370926"
},
{
"status": "affected",
"version": "23.0 ap370884"
},
{
"status": "affected",
"version": "23.0 ap371681"
},
{
"status": "affected",
"version": "23.0 ap371366"
},
{
"status": "affected",
"version": "23.0 ap370952"
},
{
"status": "affected",
"version": "23.0 ap371281"
},
{
"status": "affected",
"version": "23.0 ap371436"
},
{
"status": "affected",
"version": "23.0 ap371153"
},
{
"status": "affected",
"version": "23.0 ap371033"
},
{
"status": "affected",
"version": "23.0 ap371977"
},
{
"status": "affected",
"version": "23.0 ap371627"
},
{
"status": "affected",
"version": "23.0 ap371155"
},
{
"status": "affected",
"version": "23.0 ap371134"
},
{
"status": "affected",
"version": "23.0 ap371295"
},
{
"status": "affected",
"version": "23.0 ap372152"
},
{
"status": "affected",
"version": "23.0 ap371760"
},
{
"status": "affected",
"version": "23.0 ap370627"
},
{
"status": "affected",
"version": "23.0 ap371583"
},
{
"status": "affected",
"version": "23.0 ap371546"
},
{
"status": "affected",
"version": "23.0 ap371770"
},
{
"status": "affected",
"version": "23.0 ap371437"
},
{
"status": "affected",
"version": "23.0 ap372091"
},
{
"status": "affected",
"version": "23.0 ap372163"
},
{
"status": "affected",
"version": "23.0 ap370737"
},
{
"status": "affected",
"version": "23.0 ap370908"
},
{
"status": "affected",
"version": "23.0 ap370465"
},
{
"status": "affected",
"version": "23.0 ap371587"
},
{
"status": "affected",
"version": "23.0 ap375133"
},
{
"status": "affected",
"version": "23.0 ap371682"
},
{
"status": "affected",
"version": "23.0 ap375266"
},
{
"status": "affected",
"version": "23.0 ap372099"
},
{
"status": "affected",
"version": "23.0 ap375254"
},
{
"status": "affected",
"version": "23.0 ap372016"
},
{
"status": "affected",
"version": "23.0 ap372177"
},
{
"status": "affected",
"version": "23.0 ap375242"
},
{
"status": "affected",
"version": "23.0 ap375206"
},
{
"status": "affected",
"version": "23.0 ap375291"
},
{
"status": "affected",
"version": "23.0 ap371775"
},
{
"status": "affected",
"version": "23.0 ap375196"
},
{
"status": "affected",
"version": "23.0 ap375688"
},
{
"status": "affected",
"version": "23.0 ap375382"
},
{
"status": "affected",
"version": "23.0 ap375634"
},
{
"status": "affected",
"version": "23.0 ap375654"
},
{
"status": "affected",
"version": "23.0 ap375449"
},
{
"status": "affected",
"version": "23.0 ap375321"
},
{
"status": "affected",
"version": "23.0 ap375685"
},
{
"status": "affected",
"version": "23.0 ap375509"
},
{
"status": "affected",
"version": "23.0 ap375719"
},
{
"status": "affected",
"version": "23.0 ap375720"
},
{
"status": "affected",
"version": "23.0 ap375464"
},
{
"status": "affected",
"version": "23.0 ap375625"
},
{
"status": "affected",
"version": "23.0 ap375441"
},
{
"status": "affected",
"version": "23.0 ap375709"
},
{
"status": "affected",
"version": "23.0 ap375343"
},
{
"status": "affected",
"version": "23.0 ap375533"
},
{
"status": "affected",
"version": "23.0 ap375672"
},
{
"status": "affected",
"version": "23.0 ap375545"
},
{
"status": "affected",
"version": "23.0 ap375264"
},
{
"status": "affected",
"version": "23.0 ap375661"
},
{
"status": "affected",
"version": "23.0 ap375646"
},
{
"status": "affected",
"version": "23.0 ap375238"
},
{
"status": "affected",
"version": "23.0 ap375304"
},
{
"status": "affected",
"version": "23.0 ap375097"
},
{
"status": "affected",
"version": "23.0 ap373664"
},
{
"status": "affected",
"version": "23.0 ap373562"
},
{
"status": "affected",
"version": "23.0 ap372932"
},
{
"status": "affected",
"version": "23.0 ap374339"
},
{
"status": "affected",
"version": "23.0 ap374265"
},
{
"status": "affected",
"version": "23.0 ap374230"
},
{
"status": "affected",
"version": "23.0 ap374430"
},
{
"status": "affected",
"version": "23.0 ap373102"
},
{
"status": "affected",
"version": "23.0 ap375655"
},
{
"status": "affected",
"version": "23.0 ap373777"
},
{
"status": "affected",
"version": "23.0 ap374113"
},
{
"status": "affected",
"version": "23.0 ap373015"
},
{
"status": "affected",
"version": "23.0 ap374971"
},
{
"status": "affected",
"version": "23.0 ap374803"
},
{
"status": "affected",
"version": "23.0 ap374677"
},
{
"status": "affected",
"version": "23.0 ap372974"
},
{
"status": "affected",
"version": "23.0 ap373117"
},
{
"status": "affected",
"version": "23.0 ap374312"
},
{
"status": "affected",
"version": "23.0 ap374354"
},
{
"status": "affected",
"version": "23.0 ap375018"
},
{
"status": "affected",
"version": "23.0 ap373018"
},
{
"status": "affected",
"version": "23.0 ap374506"
},
{
"status": "affected",
"version": "23.0 ap374588"
},
{
"status": "affected",
"version": "23.0 ap373950"
},
{
"status": "affected",
"version": "23.0 ap375038"
},
{
"status": "affected",
"version": "23.0 ap373480"
},
{
"status": "affected",
"version": "23.0 ap374238"
},
{
"status": "affected",
"version": "23.0 ap372845"
},
{
"status": "affected",
"version": "23.0 ap373564"
},
{
"status": "affected",
"version": "23.0 ap373482"
},
{
"status": "affected",
"version": "23.0 ap372994"
},
{
"status": "affected",
"version": "23.0 ap373137"
},
{
"status": "affected",
"version": "23.0 ap373108"
},
{
"status": "affected",
"version": "23.0 ap374977"
},
{
"status": "affected",
"version": "23.0 ap373034"
},
{
"status": "affected",
"version": "23.0 ap374324"
},
{
"status": "affected",
"version": "23.0 ap374031"
},
{
"status": "affected",
"version": "23.0 ap374093"
},
{
"status": "affected",
"version": "23.0 ap373732"
},
{
"status": "affected",
"version": "23.0 ap374507"
},
{
"status": "affected",
"version": "23.0 ap373684"
},
{
"status": "affected",
"version": "23.0 ap374356"
},
{
"status": "affected",
"version": "23.0 ap373820"
},
{
"status": "affected",
"version": "23.0 ap373104"
},
{
"status": "affected",
"version": "23.0 ap373954"
},
{
"status": "affected",
"version": "23.0 ap373644"
},
{
"status": "affected",
"version": "23.0 ap373899"
},
{
"status": "affected",
"version": "23.0 ap374822"
},
{
"status": "affected",
"version": "23.0 ap374254"
},
{
"status": "affected",
"version": "23.0 ap375069"
},
{
"status": "affected",
"version": "23.0 ap373918"
},
{
"status": "affected",
"version": "23.0 ap374557"
},
{
"status": "affected",
"version": "23.0 ap372854"
},
{
"status": "affected",
"version": "23.0 ap373647"
},
{
"status": "affected",
"version": "23.0 ap374838"
},
{
"status": "affected",
"version": "23.0 ap374330"
},
{
"status": "affected",
"version": "23.0 ap374799"
},
{
"status": "affected",
"version": "23.0 ap374428"
},
{
"status": "affected",
"version": "23.0 ap373008"
},
{
"status": "affected",
"version": "23.0 ap375936"
},
{
"status": "affected",
"version": "23.0 ap375862"
},
{
"status": "affected",
"version": "23.0 ap374994"
},
{
"status": "affected",
"version": "23.0 ap376041"
},
{
"status": "affected",
"version": "23.0 ap374895"
},
{
"status": "affected",
"version": "23.0 ap375793"
},
{
"status": "affected",
"version": "23.0 ap376088"
},
{
"status": "affected",
"version": "23.0 ap373046"
},
{
"status": "affected",
"version": "23.0 ap375937"
},
{
"status": "affected",
"version": "23.0 ap374680"
},
{
"status": "affected",
"version": "23.0 ap376181"
},
{
"status": "affected",
"version": "23.0 ap375797"
},
{
"status": "affected",
"version": "23.0 ap375003"
},
{
"status": "affected",
"version": "23.0 ap373763"
},
{
"status": "affected",
"version": "23.0 ap373539"
},
{
"status": "affected",
"version": "23.0 ap373111"
},
{
"status": "affected",
"version": "23.0 ap375734"
},
{
"status": "affected",
"version": "23.0 ap376117"
},
{
"status": "affected",
"version": "23.0 ap375743"
},
{
"status": "affected",
"version": "23.0 ap376087"
},
{
"status": "affected",
"version": "23.0 ap376179"
},
{
"status": "affected",
"version": "23.0 ap376100"
},
{
"status": "affected",
"version": "23.0 ap373299"
},
{
"status": "affected",
"version": "23.0 ap373303"
},
{
"status": "affected",
"version": "23.0 ap375908"
},
{
"status": "affected",
"version": "23.0 ap376356"
},
{
"status": "affected",
"version": "23.0 ap375984"
},
{
"status": "affected",
"version": "23.0 ap373318"
},
{
"status": "affected",
"version": "23.0 ap375865"
},
{
"status": "affected",
"version": "23.0 ap373196"
},
{
"status": "affected",
"version": "23.0 ap376038"
},
{
"status": "affected",
"version": "23.0 ap373257"
},
{
"status": "affected",
"version": "23.0 ap373285"
},
{
"status": "affected",
"version": "23.0 ap376218"
},
{
"status": "affected",
"version": "23.0 ap373438"
},
{
"status": "affected",
"version": "23.0 ap373212"
},
{
"status": "affected",
"version": "23.0 ap373391"
},
{
"status": "affected",
"version": "23.0 ap373315"
},
{
"status": "affected",
"version": "23.0 ap373271"
},
{
"status": "affected",
"version": "23.0 ap376509"
},
{
"status": "affected",
"version": "23.0 ap376252"
},
{
"status": "affected",
"version": "23.0 ap376602"
},
{
"status": "affected",
"version": "23.0 ap376752"
},
{
"status": "affected",
"version": "23.0 ap373452"
},
{
"status": "affected",
"version": "23.0 ap376429"
},
{
"status": "affected",
"version": "23.0 ap376860"
},
{
"status": "affected",
"version": "23.0 ap376710"
},
{
"status": "affected",
"version": "23.0 ap376410"
},
{
"status": "affected",
"version": "23.0 ap376577"
},
{
"status": "affected",
"version": "23.0 ap376633"
},
{
"status": "affected",
"version": "23.0 ap376298"
},
{
"status": "affected",
"version": "23.0 ap373189"
},
{
"status": "affected",
"version": "23.0 ap376426"
},
{
"status": "affected",
"version": "23.0 ap376873"
},
{
"status": "affected",
"version": "23.0 ap376668"
},
{
"status": "affected",
"version": "23.0 ap376407"
},
{
"status": "affected",
"version": "23.0 ap376670"
},
{
"status": "affected",
"version": "23.0 ap376485"
},
{
"status": "affected",
"version": "23.0 ap376642"
},
{
"status": "affected",
"version": "23.0 ap376652"
},
{
"status": "affected",
"version": "23.0 ap376523"
},
{
"status": "affected",
"version": "23.0 ap376656"
},
{
"status": "affected",
"version": "23.0 ap376620"
},
{
"status": "affected",
"version": "23.0 ap376531"
},
{
"status": "affected",
"version": "23.0 ap378025"
},
{
"status": "affected",
"version": "23.0 ap377412"
},
{
"status": "affected",
"version": "23.0 ap376504"
},
{
"status": "affected",
"version": "23.0 ap376762"
},
{
"status": "affected",
"version": "23.0 ap376541"
},
{
"status": "affected",
"version": "23.0 ap376671"
},
{
"status": "affected",
"version": "23.0 ap376844"
},
{
"status": "affected",
"version": "23.0 ap376701"
},
{
"status": "affected",
"version": "23.0 ap376614"
},
{
"status": "affected",
"version": "23.0 ap377578"
},
{
"status": "affected",
"version": "23.0 ap377496"
},
{
"status": "affected",
"version": "23.0 ap377715"
},
{
"status": "affected",
"version": "23.0 ap377508"
},
{
"status": "affected",
"version": "23.0 ap376416"
},
{
"status": "affected",
"version": "23.0 ap377409"
},
{
"status": "affected",
"version": "23.0 ap377778"
},
{
"status": "affected",
"version": "23.0 ap376355"
},
{
"status": "affected",
"version": "23.0 ap377866"
},
{
"status": "affected",
"version": "23.0 ap377516"
},
{
"status": "affected",
"version": "23.0 ap377644"
},
{
"status": "affected",
"version": "23.0 ap377755"
},
{
"status": "affected",
"version": "23.0 ap377540"
},
{
"status": "affected",
"version": "23.0 ap377497"
},
{
"status": "affected",
"version": "23.0 ap377523"
},
{
"status": "affected",
"version": "23.0 ap377581"
},
{
"status": "affected",
"version": "23.0 ap377727"
},
{
"status": "affected",
"version": "23.0 ap378436"
},
{
"status": "affected",
"version": "23.0 ap377515"
},
{
"status": "affected",
"version": "23.0 ap377674"
},
{
"status": "affected",
"version": "23.0 ap378400"
},
{
"status": "affected",
"version": "23.0 ap377566"
},
{
"status": "affected",
"version": "23.0 ap377494"
},
{
"status": "affected",
"version": "23.0 ap377799"
},
{
"status": "affected",
"version": "23.0 ap377779"
},
{
"status": "affected",
"version": "23.0 ap378165"
},
{
"status": "affected",
"version": "23.0 ap378332"
},
{
"status": "affected",
"version": "23.0 ap377757"
},
{
"status": "affected",
"version": "23.0 ap377908"
},
{
"status": "affected",
"version": "23.0 ap377802"
},
{
"status": "affected",
"version": "23.0 ap377999"
},
{
"status": "affected",
"version": "23.0 ap377984"
},
{
"status": "affected",
"version": "23.0 ap378134"
},
{
"status": "affected",
"version": "23.0 ap378545"
},
{
"status": "affected",
"version": "23.0 ap378863"
},
{
"status": "affected",
"version": "23.0 ap378882"
},
{
"status": "affected",
"version": "23.0 ap379016"
},
{
"status": "affected",
"version": "23.0 ap378599"
},
{
"status": "affected",
"version": "23.0 ap378218"
},
{
"status": "affected",
"version": "23.0 ap378164"
},
{
"status": "affected",
"version": "23.0 ap379085"
},
{
"status": "affected",
"version": "23.0 ap378880"
},
{
"status": "affected",
"version": "23.0 ap378334"
},
{
"status": "affected",
"version": "23.0 ap378862"
},
{
"status": "affected",
"version": "23.0 ap378425"
},
{
"status": "affected",
"version": "23.0 ap378259"
},
{
"status": "affected",
"version": "23.0 ap378970"
},
{
"status": "affected",
"version": "23.0 ap378153"
},
{
"status": "affected",
"version": "23.0 ap378585"
},
{
"status": "affected",
"version": "23.0 ap378509"
},
{
"status": "affected",
"version": "23.0 ap378393"
},
{
"status": "affected",
"version": "23.0 ap378079"
},
{
"status": "affected",
"version": "23.0 ap378404"
},
{
"status": "affected",
"version": "23.0 ap378471"
},
{
"status": "affected",
"version": "23.0 ap378966"
},
{
"status": "affected",
"version": "23.0 ap379049"
},
{
"status": "affected",
"version": "23.0 ap379012"
},
{
"status": "affected",
"version": "23.0 ap379080"
},
{
"status": "affected",
"version": "23.0 ap378865"
},
{
"status": "affected",
"version": "23.0 ap378140"
},
{
"status": "affected",
"version": "23.0 ap378574"
},
{
"status": "affected",
"version": "23.0 ap378440"
},
{
"status": "affected",
"version": "23.0 ap378055"
},
{
"status": "affected",
"version": "23.0 ap378823"
},
{
"status": "affected",
"version": "23.0 ap378603"
},
{
"status": "affected",
"version": "23.0 ap379397"
},
{
"status": "affected",
"version": "23.0 ap379153"
},
{
"status": "affected",
"version": "23.0 ap378953"
},
{
"status": "affected",
"version": "23.0 ap378866"
},
{
"status": "affected",
"version": "23.0 ap379008"
},
{
"status": "affected",
"version": "23.0 ap378924"
},
{
"status": "affected",
"version": "23.0 ap378581"
},
{
"status": "affected",
"version": "23.0 ap378999"
},
{
"status": "affected",
"version": "23.0 ap378161"
},
{
"status": "affected",
"version": "23.0 ap378080"
},
{
"status": "affected",
"version": "23.0 ap379493"
},
{
"status": "affected",
"version": "23.0 ap380161"
},
{
"status": "affected",
"version": "23.0 ap379046"
},
{
"status": "affected",
"version": "23.0 ap379874"
},
{
"status": "affected",
"version": "23.0 ap378391"
},
{
"status": "affected",
"version": "23.0 ap380239"
},
{
"status": "affected",
"version": "23.0 ap379951"
},
{
"status": "affected",
"version": "23.0 ap379772"
},
{
"status": "affected",
"version": "23.0 ap378419"
},
{
"status": "affected",
"version": "23.0 ap378257"
},
{
"status": "affected",
"version": "23.0 ap379775"
},
{
"status": "affected",
"version": "23.0 ap379838"
},
{
"status": "affected",
"version": "23.0 ap379531"
},
{
"status": "affected",
"version": "23.0 ap379888"
},
{
"status": "affected",
"version": "23.0 ap379167"
},
{
"status": "affected",
"version": "23.0 ap378485"
},
{
"status": "affected",
"version": "23.0 ap380167"
},
{
"status": "affected",
"version": "23.0 ap380099"
},
{
"status": "affected",
"version": "23.0 ap379847"
},
{
"status": "affected",
"version": "23.0 ap379098"
},
{
"status": "affected",
"version": "23.0 ap379972"
},
{
"status": "affected",
"version": "23.0 ap379438"
},
{
"status": "affected",
"version": "23.0 ap380143"
},
{
"status": "affected",
"version": "23.0 ap380187"
},
{
"status": "affected",
"version": "23.0 ap379326"
},
{
"status": "affected",
"version": "23.0 ap379427"
},
{
"status": "affected",
"version": "23.0 ap380045"
},
{
"status": "affected",
"version": "23.0 ap379848"
},
{
"status": "affected",
"version": "23.0 ap377384"
},
{
"status": "affected",
"version": "23.0 ap376984"
},
{
"status": "affected",
"version": "23.0 ap377042"
},
{
"status": "affected",
"version": "23.0 ap379890"
},
{
"status": "affected",
"version": "23.0 ap380128"
},
{
"status": "affected",
"version": "23.0 ap377149"
},
{
"status": "affected",
"version": "23.0 ap380446"
},
{
"status": "affected",
"version": "23.0 ap379694"
},
{
"status": "affected",
"version": "23.0 ap376988"
},
{
"status": "affected",
"version": "23.0 ap380270"
},
{
"status": "affected",
"version": "23.0 ap379780"
},
{
"status": "affected",
"version": "23.0 ap380371"
},
{
"status": "affected",
"version": "23.0 ap377225"
},
{
"status": "affected",
"version": "23.0 ap379752"
},
{
"status": "affected",
"version": "23.0 ap380137"
},
{
"status": "affected",
"version": "23.0 ap377045"
},
{
"status": "affected",
"version": "23.0 ap376989"
},
{
"status": "affected",
"version": "23.0 ap380180"
},
{
"status": "affected",
"version": "23.0 ap380042"
},
{
"status": "affected",
"version": "23.0 ap376935"
},
{
"status": "affected",
"version": "23.0 ap379487"
},
{
"status": "affected",
"version": "23.0 ap379934"
},
{
"status": "affected",
"version": "23.0 ap377023"
},
{
"status": "affected",
"version": "23.0 ap377327"
},
{
"status": "affected",
"version": "23.0 ap379833"
},
{
"status": "affected",
"version": "23.0 ap376953"
},
{
"status": "affected",
"version": "23.0 ap380473"
},
{
"status": "affected",
"version": "23.0 ap380535"
},
{
"status": "affected",
"version": "23.0 ap377068"
},
{
"status": "affected",
"version": "23.0 ap379853"
},
{
"status": "affected",
"version": "23.0 ap379350"
},
{
"status": "affected",
"version": "23.0 ap380998"
},
{
"status": "affected",
"version": "23.0 ap380626"
},
{
"status": "affected",
"version": "23.0 ap377079"
},
{
"status": "affected",
"version": "23.0 ap379151"
},
{
"status": "affected",
"version": "23.0 ap377329"
},
{
"status": "affected",
"version": "23.0 ap381091"
},
{
"status": "affected",
"version": "23.0 ap380751"
},
{
"status": "affected",
"version": "23.0 ap380543"
},
{
"status": "affected",
"version": "23.0 ap381270"
},
{
"status": "affected",
"version": "23.0 ap380817"
},
{
"status": "affected",
"version": "23.0 ap381055"
},
{
"status": "affected",
"version": "23.0 ap380506"
},
{
"status": "affected",
"version": "23.0 ap381275"
},
{
"status": "affected",
"version": "23.0 ap380739"
},
{
"status": "affected",
"version": "23.0 ap380783"
},
{
"status": "affected",
"version": "23.0 ap380970"
},
{
"status": "affected",
"version": "23.0 ap380537"
},
{
"status": "affected",
"version": "23.0 ap381140"
},
{
"status": "affected",
"version": "23.0 ap380697"
},
{
"status": "affected",
"version": "23.0 ap380936"
},
{
"status": "affected",
"version": "23.0 ap380486"
},
{
"status": "affected",
"version": "23.0 ap380512"
},
{
"status": "affected",
"version": "23.0 ap380737"
},
{
"status": "affected",
"version": "23.0 ap381118"
},
{
"status": "affected",
"version": "23.0 ap380555"
},
{
"status": "affected",
"version": "23.0 ap381072"
},
{
"status": "affected",
"version": "23.0 ap381584"
},
{
"status": "affected",
"version": "23.0 ap381088"
},
{
"status": "affected",
"version": "23.0 ap381137"
},
{
"status": "affected",
"version": "23.0 ap382053"
},
{
"status": "affected",
"version": "23.0 ap381523"
},
{
"status": "affected",
"version": "23.0 ap381732"
},
{
"status": "affected",
"version": "23.0 ap382372"
},
{
"status": "affected",
"version": "23.0 ap382252"
},
{
"status": "affected",
"version": "23.0 ap383002"
},
{
"status": "affected",
"version": "23.0 ap382857"
},
{
"status": "affected",
"version": "23.0 ap383512"
},
{
"status": "affected",
"version": "23.0 ap382846"
},
{
"status": "affected",
"version": "23.0 ap382253"
},
{
"status": "affected",
"version": "23.0 ap381322"
},
{
"status": "affected",
"version": "23.0 ap382057"
},
{
"status": "affected",
"version": "23.0 ap382386"
},
{
"status": "affected",
"version": "23.0 ap382709"
},
{
"status": "affected",
"version": "23.0 ap382954"
},
{
"status": "affected",
"version": "23.0 ap382505"
},
{
"status": "affected",
"version": "23.0 ap382225"
},
{
"status": "affected",
"version": "23.0 ap382717"
},
{
"status": "affected",
"version": "23.0 ap381840"
},
{
"status": "affected",
"version": "23.0 ap381594"
},
{
"status": "affected",
"version": "23.0 ap381410"
},
{
"status": "affected",
"version": "23.0 ap382463"
},
{
"status": "affected",
"version": "23.0 ap382198"
},
{
"status": "affected",
"version": "23.0 ap381526"
},
{
"status": "affected",
"version": "23.0 ap381498"
},
{
"status": "affected",
"version": "23.0 ap381418"
},
{
"status": "affected",
"version": "23.0 ap383573"
},
{
"status": "affected",
"version": "23.0 ap382838"
},
{
"status": "affected",
"version": "23.0 ap381609"
},
{
"status": "affected",
"version": "23.0 ap381548"
},
{
"status": "affected",
"version": "23.0 ap382409"
},
{
"status": "affected",
"version": "23.0 ap383706"
},
{
"status": "affected",
"version": "23.0 ap382945"
},
{
"status": "affected",
"version": "23.0 ap382300"
},
{
"status": "affected",
"version": "23.0 ap382615"
},
{
"status": "affected",
"version": "23.0 ap382977"
},
{
"status": "affected",
"version": "23.0 ap384345"
},
{
"status": "affected",
"version": "23.0 ap383547"
},
{
"status": "affected",
"version": "23.0 ap382158"
},
{
"status": "affected",
"version": "23.0 ap382240"
},
{
"status": "affected",
"version": "23.0 ap383515"
},
{
"status": "affected",
"version": "23.0 ap383754"
},
{
"status": "affected",
"version": "23.0 ap381961"
},
{
"status": "affected",
"version": "23.0 ap382526"
},
{
"status": "affected",
"version": "23.0 ap382951"
},
{
"status": "affected",
"version": "23.0 ap382824"
},
{
"status": "affected",
"version": "23.0 ap382993"
},
{
"status": "affected",
"version": "23.0 ap383536"
},
{
"status": "affected",
"version": "23.0 ap383247"
},
{
"status": "affected",
"version": "23.0 ap381504"
},
{
"status": "affected",
"version": "23.0 ap383170"
},
{
"status": "affected",
"version": "23.0 ap382032"
},
{
"status": "affected",
"version": "23.0 ap382992"
},
{
"status": "affected",
"version": "23.0 ap383594"
},
{
"status": "affected",
"version": "23.0 ap383365"
},
{
"status": "affected",
"version": "23.0 ap383772"
},
{
"status": "affected",
"version": "23.0 ap381569"
},
{
"status": "affected",
"version": "23.0 ap381348"
},
{
"status": "affected",
"version": "23.0 ap382192"
},
{
"status": "affected",
"version": "23.0 ap381367"
},
{
"status": "affected",
"version": "23.0 ap383352"
},
{
"status": "affected",
"version": "23.0 ap383597"
},
{
"status": "affected",
"version": "23.0 ap381622"
},
{
"status": "affected",
"version": "23.0 ap383518"
},
{
"status": "affected",
"version": "23.0 ap383492"
},
{
"status": "affected",
"version": "23.0 ap383309"
},
{
"status": "affected",
"version": "23.0 ap383064"
},
{
"status": "affected",
"version": "23.0 ap383168"
},
{
"status": "affected",
"version": "23.0 ap382362"
},
{
"status": "affected",
"version": "23.0 ap382251"
},
{
"status": "affected",
"version": "23.0 ap383319"
},
{
"status": "affected",
"version": "23.0 ap382434"
},
{
"status": "affected",
"version": "23.0 ap384431"
},
{
"status": "affected",
"version": "23.0 ap383514"
},
{
"status": "affected",
"version": "23.0 ap384441"
},
{
"status": "affected",
"version": "22.0 ap383594"
},
{
"status": "affected",
"version": "22.0 ap371725"
},
{
"status": "affected",
"version": "22.0 ap383319"
},
{
"status": "affected",
"version": "22.0 ap367293"
},
{
"status": "affected",
"version": "22.0 ap383512"
},
{
"status": "affected",
"version": "22.0 ap376088"
},
{
"status": "affected",
"version": "22.0 ap361155"
},
{
"status": "affected",
"version": "22.0 ap382864"
},
{
"status": "affected",
"version": "22.0 ap383716"
},
{
"status": "affected",
"version": "22.0 ap383701"
},
{
"status": "affected",
"version": "22.0 ap342175"
},
{
"status": "affected",
"version": "22.0 ap339371"
},
{
"status": "affected",
"version": "22.0 ap353835"
},
{
"status": "affected",
"version": "22.0 ap351023"
},
{
"status": "affected",
"version": "22.0 ap354154"
},
{
"status": "affected",
"version": "22.0 ap353865"
},
{
"status": "affected",
"version": "22.0 ap350800"
},
{
"status": "affected",
"version": "22.0 ap350032"
},
{
"status": "affected",
"version": "22.0 ap349201"
},
{
"status": "affected",
"version": "22.0 ap353120"
},
{
"status": "affected",
"version": "22.0 ap351924"
},
{
"status": "affected",
"version": "22.0 ap351817"
},
{
"status": "affected",
"version": "22.0 ap353549"
},
{
"status": "affected",
"version": "22.0 ap353179"
},
{
"status": "affected",
"version": "22.0 ap351960"
},
{
"status": "affected",
"version": "22.0 ap352304"
},
{
"status": "affected",
"version": "22.0 ap353390"
},
{
"status": "affected",
"version": "22.0 ap352707"
},
{
"status": "affected",
"version": "22.0 ap355636"
},
{
"status": "affected",
"version": "22.0 ap352837"
},
{
"status": "affected",
"version": "22.0 ap353311"
},
{
"status": "affected",
"version": "22.0 ap352337"
},
{
"status": "affected",
"version": "22.0 ap355300"
},
{
"status": "affected",
"version": "22.0 ap356412"
},
{
"status": "affected",
"version": "22.0 ap355946"
},
{
"status": "affected",
"version": "22.0 ap355647"
},
{
"status": "affected",
"version": "22.0 ap356253"
},
{
"status": "affected",
"version": "22.0 ap354528"
},
{
"status": "affected",
"version": "22.0 ap355353"
},
{
"status": "affected",
"version": "22.0 ap356359"
},
{
"status": "affected",
"version": "22.0 ap355952"
},
{
"status": "affected",
"version": "22.0 ap354909"
},
{
"status": "affected",
"version": "22.0 ap356749"
},
{
"status": "affected",
"version": "22.0 ap357347"
},
{
"status": "affected",
"version": "22.0 ap354597"
},
{
"status": "affected",
"version": "22.0 ap356319"
},
{
"status": "affected",
"version": "22.0 ap356774"
},
{
"status": "affected",
"version": "22.0 ap356551"
},
{
"status": "affected",
"version": "22.0 ap351262"
},
{
"status": "affected",
"version": "22.0 ap357040"
},
{
"status": "affected",
"version": "22.0 ap357525"
},
{
"status": "affected",
"version": "22.0 ap357447"
},
{
"status": "affected",
"version": "22.0 ap357560"
},
{
"status": "affected",
"version": "22.0 ap357608"
},
{
"status": "affected",
"version": "22.0 ap357655"
},
{
"status": "affected",
"version": "22.0 ap357597"
},
{
"status": "affected",
"version": "22.0 ap358099"
},
{
"status": "affected",
"version": "22.0 ap357523"
},
{
"status": "affected",
"version": "22.0 ap357621"
},
{
"status": "affected",
"version": "22.0 ap357795"
},
{
"status": "affected",
"version": "22.0 ap358291"
},
{
"status": "affected",
"version": "22.0 ap359434"
},
{
"status": "affected",
"version": "22.0 ap358290"
},
{
"status": "affected",
"version": "22.0 ap358119"
},
{
"status": "affected",
"version": "22.0 ap359549"
},
{
"status": "affected",
"version": "22.0 ap358603"
},
{
"status": "affected",
"version": "22.0 ap359674"
},
{
"status": "affected",
"version": "22.0 ap359121"
},
{
"status": "affected",
"version": "22.0 ap360250"
},
{
"status": "affected",
"version": "22.0 ap360564"
},
{
"status": "affected",
"version": "22.0 ap359106"
},
{
"status": "affected",
"version": "22.0 ap359218"
},
{
"status": "affected",
"version": "22.0 ap359769"
},
{
"status": "affected",
"version": "22.0 ap360164"
},
{
"status": "affected",
"version": "22.0 ap359001"
},
{
"status": "affected",
"version": "22.0 ap360365"
},
{
"status": "affected",
"version": "22.0 ap360816"
},
{
"status": "affected",
"version": "22.0 ap361116"
},
{
"status": "affected",
"version": "22.0 ap361353"
},
{
"status": "affected",
"version": "22.0 ap361076"
},
{
"status": "affected",
"version": "22.0 ap360531"
},
{
"status": "affected",
"version": "22.0 ap362367"
},
{
"status": "affected",
"version": "22.0 ap362683"
},
{
"status": "affected",
"version": "22.0 ap362276"
},
{
"status": "affected",
"version": "22.0 ap362707"
},
{
"status": "affected",
"version": "22.0 ap361934"
},
{
"status": "affected",
"version": "22.0 ap363082"
},
{
"status": "affected",
"version": "22.0 ap361154"
},
{
"status": "affected",
"version": "22.0 ap362122"
},
{
"status": "affected",
"version": "22.0 ap364194"
},
{
"status": "affected",
"version": "22.0 ap361666"
},
{
"status": "affected",
"version": "22.0 ap362492"
},
{
"status": "affected",
"version": "22.0 ap363753"
},
{
"status": "affected",
"version": "22.0 ap362644"
},
{
"status": "affected",
"version": "22.0 ap367820"
},
{
"status": "affected",
"version": "22.0 ap362575"
},
{
"status": "affected",
"version": "22.0 ap363361"
},
{
"status": "affected",
"version": "22.0 ap363760"
},
{
"status": "affected",
"version": "22.0 ap364048"
},
{
"status": "affected",
"version": "22.0 ap363233"
},
{
"status": "affected",
"version": "22.0 ap363666"
},
{
"status": "affected",
"version": "22.0 ap363568"
},
{
"status": "affected",
"version": "22.0 ap367974"
},
{
"status": "affected",
"version": "22.0 ap364278"
},
{
"status": "affected",
"version": "22.0 ap363824"
},
{
"status": "affected",
"version": "22.0 ap368067"
},
{
"status": "affected",
"version": "22.0 ap363976"
},
{
"status": "affected",
"version": "22.0 ap364213"
},
{
"status": "affected",
"version": "22.0 ap364275"
},
{
"status": "affected",
"version": "22.0 ap366397"
},
{
"status": "affected",
"version": "22.0 ap366624"
},
{
"status": "affected",
"version": "22.0 ap363582"
},
{
"status": "affected",
"version": "22.0 ap364125"
},
{
"status": "affected",
"version": "22.0 ap366252"
},
{
"status": "affected",
"version": "22.0 ap363408"
},
{
"status": "affected",
"version": "22.0 ap366715"
},
{
"status": "affected",
"version": "22.0 ap364214"
},
{
"status": "affected",
"version": "22.0 ap364258"
},
{
"status": "affected",
"version": "22.0 ap366784"
},
{
"status": "affected",
"version": "22.0 ap366358"
},
{
"status": "affected",
"version": "22.0 ap366180"
},
{
"status": "affected",
"version": "22.0 ap365172"
},
{
"status": "affected",
"version": "22.0 ap366430"
},
{
"status": "affected",
"version": "22.0 ap364778"
},
{
"status": "affected",
"version": "22.0 ap364834"
},
{
"status": "affected",
"version": "22.0 ap364521"
},
{
"status": "affected",
"version": "22.0 ap364905"
},
{
"status": "affected",
"version": "22.0 ap364844"
},
{
"status": "affected",
"version": "22.0 ap364635"
},
{
"status": "affected",
"version": "22.0 ap367298"
},
{
"status": "affected",
"version": "22.0 ap365171"
},
{
"status": "affected",
"version": "22.0 ap364924"
},
{
"status": "affected",
"version": "22.0 ap365905"
},
{
"status": "affected",
"version": "22.0 ap365515"
},
{
"status": "affected",
"version": "22.0 ap367001"
},
{
"status": "affected",
"version": "22.0 ap365577"
},
{
"status": "affected",
"version": "22.0 ap365759"
},
{
"status": "affected",
"version": "22.0 ap365758"
},
{
"status": "affected",
"version": "22.0 ap367290"
},
{
"status": "affected",
"version": "22.0 ap367183"
},
{
"status": "affected",
"version": "22.0 ap371654"
},
{
"status": "affected",
"version": "22.0 ap371703"
},
{
"status": "affected",
"version": "22.0 ap365511"
},
{
"status": "affected",
"version": "22.0 ap365576"
},
{
"status": "affected",
"version": "22.0 ap370802"
},
{
"status": "affected",
"version": "22.0 ap365944"
},
{
"status": "affected",
"version": "22.0 ap366959"
},
{
"status": "affected",
"version": "22.0 ap371202"
},
{
"status": "affected",
"version": "22.0 ap365858"
},
{
"status": "affected",
"version": "22.0 ap371919"
},
{
"status": "affected",
"version": "22.0 ap367294"
},
{
"status": "affected",
"version": "22.0 ap371343"
},
{
"status": "affected",
"version": "22.0 ap367206"
},
{
"status": "affected",
"version": "22.0 ap371134"
},
{
"status": "affected",
"version": "22.0 ap372178"
},
{
"status": "affected",
"version": "22.0 ap371926"
},
{
"status": "affected",
"version": "22.0 ap372017"
},
{
"status": "affected",
"version": "22.0 ap371681"
},
{
"status": "affected",
"version": "22.0 ap372192"
},
{
"status": "affected",
"version": "22.0 ap371610"
},
{
"status": "affected",
"version": "22.0 ap371546"
},
{
"status": "affected",
"version": "22.0 ap371281"
},
{
"status": "affected",
"version": "22.0 ap371770"
},
{
"status": "affected",
"version": "22.0 ap370908"
},
{
"status": "affected",
"version": "22.0 ap368308"
},
{
"status": "affected",
"version": "22.0 ap371195"
},
{
"status": "affected",
"version": "22.0 ap371366"
},
{
"status": "affected",
"version": "22.0 ap368140"
},
{
"status": "affected",
"version": "22.0 ap371977"
},
{
"status": "affected",
"version": "22.0 ap371682"
},
{
"status": "affected",
"version": "22.0 ap371627"
},
{
"status": "affected",
"version": "22.0 ap369641"
},
{
"status": "affected",
"version": "22.0 ap369855"
},
{
"status": "affected",
"version": "22.0 ap368195"
},
{
"status": "affected",
"version": "22.0 ap368957"
},
{
"status": "affected",
"version": "22.0 ap368612"
},
{
"status": "affected",
"version": "22.0 ap368568"
},
{
"status": "affected",
"version": "22.0 ap368217"
},
{
"status": "affected",
"version": "22.0 ap369529"
},
{
"status": "affected",
"version": "22.0 ap368096"
},
{
"status": "affected",
"version": "22.0 ap368601"
},
{
"status": "affected",
"version": "22.0 ap368970"
},
{
"status": "affected",
"version": "22.0 ap369881"
},
{
"status": "affected",
"version": "22.0 ap369550"
},
{
"status": "affected",
"version": "22.0 ap369295"
},
{
"status": "affected",
"version": "22.0 ap369473"
},
{
"status": "affected",
"version": "22.0 ap369065"
},
{
"status": "affected",
"version": "22.0 ap372433"
},
{
"status": "affected",
"version": "22.0 ap372567"
},
{
"status": "affected",
"version": "22.0 ap372522"
},
{
"status": "affected",
"version": "22.0 ap369800"
},
{
"status": "affected",
"version": "22.0 ap372389"
},
{
"status": "affected",
"version": "22.0 ap372560"
},
{
"status": "affected",
"version": "22.0 ap370563"
},
{
"status": "affected",
"version": "22.0 ap370344"
},
{
"status": "affected",
"version": "22.0 ap372623"
},
{
"status": "affected",
"version": "22.0 ap370424"
},
{
"status": "affected",
"version": "22.0 ap370170"
},
{
"status": "affected",
"version": "22.0 ap374680"
},
{
"status": "affected",
"version": "22.0 ap374169"
},
{
"status": "affected",
"version": "22.0 ap374799"
},
{
"status": "affected",
"version": "22.0 ap370437"
},
{
"status": "affected",
"version": "22.0 ap374430"
},
{
"status": "affected",
"version": "22.0 ap374677"
},
{
"status": "affected",
"version": "22.0 ap372968"
},
{
"status": "affected",
"version": "22.0 ap373118"
},
{
"status": "affected",
"version": "22.0 ap373855"
},
{
"status": "affected",
"version": "22.0 ap373438"
},
{
"status": "affected",
"version": "22.0 ap374660"
},
{
"status": "affected",
"version": "22.0 ap373391"
},
{
"status": "affected",
"version": "22.0 ap373196"
},
{
"status": "affected",
"version": "22.0 ap373732"
},
{
"status": "affected",
"version": "22.0 ap374113"
},
{
"status": "affected",
"version": "22.0 ap373034"
},
{
"status": "affected",
"version": "22.0 ap373189"
},
{
"status": "affected",
"version": "22.0 ap374488"
},
{
"status": "affected",
"version": "22.0 ap374354"
},
{
"status": "affected",
"version": "22.0 ap373285"
},
{
"status": "affected",
"version": "22.0 ap373108"
},
{
"status": "affected",
"version": "22.0 ap374238"
},
{
"status": "affected",
"version": "22.0 ap373315"
},
{
"status": "affected",
"version": "22.0 ap373299"
},
{
"status": "affected",
"version": "22.0 ap373137"
},
{
"status": "affected",
"version": "22.0 ap373482"
},
{
"status": "affected",
"version": "22.0 ap375734"
},
{
"status": "affected",
"version": "22.0 ap375625"
},
{
"status": "affected",
"version": "22.0 ap375862"
},
{
"status": "affected",
"version": "22.0 ap373318"
},
{
"status": "affected",
"version": "22.0 ap375441"
},
{
"status": "affected",
"version": "22.0 ap375200"
},
{
"status": "affected",
"version": "22.0 ap374131"
},
{
"status": "affected",
"version": "22.0 ap373008"
},
{
"status": "affected",
"version": "22.0 ap376504"
},
{
"status": "affected",
"version": "22.0 ap376355"
},
{
"status": "affected",
"version": "22.0 ap372799"
},
{
"status": "affected",
"version": "22.0 ap376577"
},
{
"status": "affected",
"version": "22.0 ap374977"
},
{
"status": "affected",
"version": "22.0 ap375206"
},
{
"status": "affected",
"version": "22.0 ap375309"
},
{
"status": "affected",
"version": "22.0 ap375937"
},
{
"status": "affected",
"version": "22.0 ap375465"
},
{
"status": "affected",
"version": "22.0 ap375464"
},
{
"status": "affected",
"version": "22.0 ap375865"
},
{
"status": "affected",
"version": "22.0 ap375672"
},
{
"status": "affected",
"version": "22.0 ap375793"
},
{
"status": "affected",
"version": "22.0 ap374891"
},
{
"status": "affected",
"version": "22.0 ap376100"
},
{
"status": "affected",
"version": "22.0 ap375382"
},
{
"status": "affected",
"version": "22.0 ap375383"
},
{
"status": "affected",
"version": "22.0 ap375661"
},
{
"status": "affected",
"version": "22.0 ap375709"
},
{
"status": "affected",
"version": "22.0 ap375984"
},
{
"status": "affected",
"version": "22.0 ap375719"
},
{
"status": "affected",
"version": "22.0 ap376117"
},
{
"status": "affected",
"version": "22.0 ap376535"
},
{
"status": "affected",
"version": "22.0 ap375654"
},
{
"status": "affected",
"version": "22.0 ap375133"
},
{
"status": "affected",
"version": "22.0 ap375413"
},
{
"status": "affected",
"version": "22.0 ap379838"
},
{
"status": "affected",
"version": "22.0 ap375797"
},
{
"status": "affected",
"version": "22.0 ap379775"
},
{
"status": "affected",
"version": "22.0 ap380446"
},
{
"status": "affected",
"version": "22.0 ap379752"
},
{
"status": "affected",
"version": "22.0 ap376261"
},
{
"status": "affected",
"version": "22.0 ap380232"
},
{
"status": "affected",
"version": "22.0 ap375720"
},
{
"status": "affected",
"version": "22.0 ap380506"
},
{
"status": "affected",
"version": "22.0 ap380108"
},
{
"status": "affected",
"version": "22.0 ap376633"
},
{
"status": "affected",
"version": "22.0 ap379917"
},
{
"status": "affected",
"version": "22.0 ap380201"
},
{
"status": "affected",
"version": "22.0 ap379951"
},
{
"status": "affected",
"version": "22.0 ap380507"
},
{
"status": "affected",
"version": "22.0 ap380449"
},
{
"status": "affected",
"version": "22.0 ap380137"
},
{
"status": "affected",
"version": "22.0 ap376988"
},
{
"status": "affected",
"version": "22.0 ap376989"
},
{
"status": "affected",
"version": "22.0 ap376752"
},
{
"status": "affected",
"version": "22.0 ap376642"
},
{
"status": "affected",
"version": "22.0 ap377225"
},
{
"status": "affected",
"version": "22.0 ap376953"
},
{
"status": "affected",
"version": "22.0 ap376935"
},
{
"status": "affected",
"version": "22.0 ap377497"
},
{
"status": "affected",
"version": "22.0 ap376652"
},
{
"status": "affected",
"version": "22.0 ap380130"
},
{
"status": "affected",
"version": "22.0 ap376762"
},
{
"status": "affected",
"version": "22.0 ap377982"
},
{
"status": "affected",
"version": "22.0 ap376844"
},
{
"status": "affected",
"version": "22.0 ap377625"
},
{
"status": "affected",
"version": "22.0 ap377483"
},
{
"status": "affected",
"version": "22.0 ap377042"
},
{
"status": "affected",
"version": "22.0 ap378334"
},
{
"status": "affected",
"version": "22.0 ap377389"
},
{
"status": "affected",
"version": "22.0 ap378055"
},
{
"status": "affected",
"version": "22.0 ap378485"
},
{
"status": "affected",
"version": "22.0 ap378257"
},
{
"status": "affected",
"version": "22.0 ap377164"
},
{
"status": "affected",
"version": "22.0 ap378393"
},
{
"status": "affected",
"version": "22.0 ap378025"
},
{
"status": "affected",
"version": "22.0 ap377409"
},
{
"status": "affected",
"version": "22.0 ap378419"
},
{
"status": "affected",
"version": "22.0 ap377327"
},
{
"status": "affected",
"version": "22.0 ap378161"
},
{
"status": "affected",
"version": "22.0 ap377045"
},
{
"status": "affected",
"version": "22.0 ap378866"
},
{
"status": "affected",
"version": "22.0 ap379461"
},
{
"status": "affected",
"version": "22.0 ap379326"
},
{
"status": "affected",
"version": "22.0 ap378079"
},
{
"status": "affected",
"version": "22.0 ap377715"
},
{
"status": "affected",
"version": "22.0 ap379151"
},
{
"status": "affected",
"version": "22.0 ap379350"
},
{
"status": "affected",
"version": "22.0 ap379427"
},
{
"status": "affected",
"version": "22.0 ap379493"
},
{
"status": "affected",
"version": "22.0 ap379556"
},
{
"status": "affected",
"version": "22.0 ap379153"
},
{
"status": "affected",
"version": "22.0 ap382225"
},
{
"status": "affected",
"version": "22.0 ap380555"
},
{
"status": "affected",
"version": "22.0 ap381137"
},
{
"status": "affected",
"version": "22.0 ap382032"
},
{
"status": "affected",
"version": "22.0 ap382362"
},
{
"status": "affected",
"version": "22.0 ap381275"
},
{
"status": "affected",
"version": "22.0 ap381622"
},
{
"status": "affected",
"version": "22.0 ap380970"
},
{
"status": "affected",
"version": "22.0 ap382251"
},
{
"status": "affected",
"version": "22.0 ap382372"
},
{
"status": "affected",
"version": "22.0 ap381009"
},
{
"status": "affected",
"version": "22.0 ap381140"
},
{
"status": "affected",
"version": "22.0 ap381504"
},
{
"status": "affected",
"version": "22.0 ap382409"
},
{
"status": "affected",
"version": "22.0 ap382993"
},
{
"status": "affected",
"version": "22.0 ap382951"
},
{
"status": "affected",
"version": "22.0 ap383655"
},
{
"status": "affected",
"version": "22.0 ap382615"
},
{
"status": "affected",
"version": "22.0 ap382903"
},
{
"status": "affected",
"version": "22.0 ap382838"
},
{
"status": "affected",
"version": "22.0 ap382476"
},
{
"status": "affected",
"version": "22.0 ap354180"
},
{
"status": "affected",
"version": "22.0 ap359429"
},
{
"status": "affected",
"version": "RI.2021.02"
},
{
"status": "affected",
"version": "RI.2021.08"
},
{
"status": "affected",
"version": "RI.2021.09"
},
{
"status": "affected",
"version": "RI.2021.10"
},
{
"status": "affected",
"version": "RI.2021.11"
},
{
"status": "affected",
"version": "RI.2021.12"
},
{
"status": "affected",
"version": "RI.2022.02"
},
{
"status": "affected",
"version": "RI.2022.03"
},
{
"status": "affected",
"version": "RI.2022.04"
},
{
"status": "affected",
"version": "RI.2022.07"
},
{
"status": "affected",
"version": "RI.2022.06"
},
{
"status": "affected",
"version": "RI.2022.05"
},
{
"status": "affected",
"version": "RI.2022.09"
},
{
"status": "affected",
"version": "RI.2022.10"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-835",
"description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:57:33.176Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-bw-dos-HpkeYzp",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-dos-HpkeYzp"
}
],
"source": {
"advisory": "cisco-sa-bw-dos-HpkeYzp",
"defects": [
"CSCwd50136"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20020",
"datePublished": "2023-01-19T01:35:09.650Z",
"dateReserved": "2022-10-27T18:47:50.308Z",
"dateUpdated": "2024-08-02T08:57:35.651Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20025 (GCVE-0-2023-20025)
Vulnerability from cvelistv5 – Published: 2023-01-19 01:33 – Updated: 2025-03-12 16:18
VLAI?
EPSS
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass authentication and gain root access on the underlying operating system.
Severity ?
9 (Critical)
CWE
- CWE-293 - Using Referer Field for Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business RV Series Router Firmware |
Affected:
2.0.0.19-tm
Affected: 2.0.2.01-tm Affected: 1.3.12.19-tm Affected: 1.3.12.6-tm Affected: 1.3.13.02-tm Affected: 1.3.9.8-tm Affected: 4.0.0.7 Affected: 4.0.2.08-tm Affected: 4.0.3.03-tm Affected: 4.0.4.02-tm Affected: 4.2.1.02 Affected: 4.2.2.08 Affected: 4.2.3.03 Affected: 4.2.3.06 Affected: 4.2.3.07 Affected: 4.2.3.08 Affected: 4.2.3.09 Affected: 4.2.3.10 Affected: 4.2.3.14 Affected: 3.0.0.1-tm Affected: 3.0.0.19-tm Affected: 3.0.2.01-tm Affected: 4.1.1.01 Affected: 4.1.0.02-tm |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:57:35.838Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20025",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T16:19:30.025204Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T16:41:32.942Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business RV Series Router Firmware",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "2.0.0.19-tm"
},
{
"status": "affected",
"version": "2.0.2.01-tm"
},
{
"status": "affected",
"version": "1.3.12.19-tm"
},
{
"status": "affected",
"version": "1.3.12.6-tm"
},
{
"status": "affected",
"version": "1.3.13.02-tm"
},
{
"status": "affected",
"version": "1.3.9.8-tm"
},
{
"status": "affected",
"version": "4.0.0.7"
},
{
"status": "affected",
"version": "4.0.2.08-tm"
},
{
"status": "affected",
"version": "4.0.3.03-tm"
},
{
"status": "affected",
"version": "4.0.4.02-tm"
},
{
"status": "affected",
"version": "4.2.1.02"
},
{
"status": "affected",
"version": "4.2.2.08"
},
{
"status": "affected",
"version": "4.2.3.03"
},
{
"status": "affected",
"version": "4.2.3.06"
},
{
"status": "affected",
"version": "4.2.3.07"
},
{
"status": "affected",
"version": "4.2.3.08"
},
{
"status": "affected",
"version": "4.2.3.09"
},
{
"status": "affected",
"version": "4.2.3.10"
},
{
"status": "affected",
"version": "4.2.3.14"
},
{
"status": "affected",
"version": "3.0.0.1-tm"
},
{
"status": "affected",
"version": "3.0.0.19-tm"
},
{
"status": "affected",
"version": "3.0.2.01-tm"
},
{
"status": "affected",
"version": "4.1.1.01"
},
{
"status": "affected",
"version": "4.1.0.02-tm"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass authentication and gain root access on the underlying operating system."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for vulnerabilities CVE-2023-20025 and CVE-2023-20026 that are described in this advisory.\r\n\r\nIn March 2025, the Cisco PSIRT became aware of additional attempted exploitation of some of these vulnerabilities in the wild. Cisco continues to strongly recommend that customers upgrade their hardware to Meraki or Cisco 1000 Series Integrated Services Routers to remediate these vulnerabilities."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-293",
"description": "Using Referer Field for Authentication",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:18:58.629Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5"
}
],
"source": {
"advisory": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
"defects": [
"CSCwd47551"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20025",
"datePublished": "2023-01-19T01:33:39.023Z",
"dateReserved": "2022-10-27T18:47:50.309Z",
"dateUpdated": "2025-03-12T16:18:58.629Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20018 (GCVE-0-2023-20018)
Vulnerability from cvelistv5 – Published: 2023-01-19 01:35 – Updated: 2024-08-02 08:57
VLAI?
EPSS
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
Severity ?
8.6 (High)
CWE
- CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Session Initiation Protocol (SIP) Software |
Affected:
9.3(4) 3rd Party
Affected: 9.3(4)SR3 3rd Party Affected: 9.3(4)SR1 3rd Party Affected: 9.3(4)SR2 3rd Party Affected: 11.0(3)SR3 Affected: 11.0(2)SR1 Affected: 11.5(1) Affected: 11.0(5)SR2 Affected: 11.0(2) Affected: 11.7(1) Affected: 11.0(4)SR3 Affected: 11.0(0.7) MPP Affected: 11.0(4)SR2 Affected: 11.0(3)SR5 Affected: 11.0(3)SR6 Affected: 11.0(3) Affected: 11.0(4)SR1 Affected: 11.0(1) MPP Affected: 11.0(4) Affected: 11.0(3)SR4 Affected: 11.0(5) Affected: 11.0(3)SR1 Affected: 11.0(5)SR1 Affected: 11.0(3)SR2 Affected: 11.0(2)SR2 Affected: 11.0(1) Affected: 11.5(1)SR1 Affected: 11-0-1MSR1-1 Affected: 10.4(1) 3rd Party Affected: 10.3(1.11) 3rd Party Affected: 10.2(2) Affected: 10.2(1)SR1 Affected: 10.1(1.9) Affected: 10.1(1)SR2 Affected: 10.2(1) Affected: 10.1(1)SR1 Affected: 10.4(1)SR2 3rd Party Affected: 10.3(1) Affected: 10.3(1)SR4b Affected: 10.3(1)SR5 Affected: 10.3(1.9) 3rd Party Affected: 10.3(2) Affected: 10.3(1)SR4 Affected: 10.3(1)SR2 Affected: 10.3(1)SR3 Affected: 10.3(1)SR1 Affected: 12.6(1) Affected: 12.1(1) Affected: 12.5(1)SR1 Affected: 12.5(1)SR2 Affected: 12.5(1) Affected: 12.5(1)SR3 Affected: 12.6(1)SR1 Affected: 12.7(1) Affected: 12.1(1)SR1 Affected: 12.0(1) Affected: 12.0(1)SR2 Affected: 12.0(1)SR1 Affected: 12.0(1)SR3 Affected: 12.8(1) Affected: 12.8(1)SR1 Affected: 12.8(1)SR2 Affected: 11.0(5)SR3 Affected: 11.0(6) Affected: 11.0(6)SR1 Affected: 11.0(6)SR2 Affected: 10.3(1)SR6 Affected: 10.3(1)SR7 Affected: 12.7(1)SR1 Affected: 14.0(1)SR1 Affected: 14.0(1) Affected: 14.0(1)SR2 Affected: 14.0(1)SR3 Affected: 14.1(1) Affected: 14.1(1)SR1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:57:35.086Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-ip-phone-auth-bypass-pSqxZRPR",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Session Initiation Protocol (SIP) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "9.3(4) 3rd Party"
},
{
"status": "affected",
"version": "9.3(4)SR3 3rd Party"
},
{
"status": "affected",
"version": "9.3(4)SR1 3rd Party"
},
{
"status": "affected",
"version": "9.3(4)SR2 3rd Party"
},
{
"status": "affected",
"version": "11.0(3)SR3"
},
{
"status": "affected",
"version": "11.0(2)SR1"
},
{
"status": "affected",
"version": "11.5(1)"
},
{
"status": "affected",
"version": "11.0(5)SR2"
},
{
"status": "affected",
"version": "11.0(2)"
},
{
"status": "affected",
"version": "11.7(1)"
},
{
"status": "affected",
"version": "11.0(4)SR3"
},
{
"status": "affected",
"version": "11.0(0.7) MPP"
},
{
"status": "affected",
"version": "11.0(4)SR2"
},
{
"status": "affected",
"version": "11.0(3)SR5"
},
{
"status": "affected",
"version": "11.0(3)SR6"
},
{
"status": "affected",
"version": "11.0(3)"
},
{
"status": "affected",
"version": "11.0(4)SR1"
},
{
"status": "affected",
"version": "11.0(1) MPP"
},
{
"status": "affected",
"version": "11.0(4)"
},
{
"status": "affected",
"version": "11.0(3)SR4"
},
{
"status": "affected",
"version": "11.0(5)"
},
{
"status": "affected",
"version": "11.0(3)SR1"
},
{
"status": "affected",
"version": "11.0(5)SR1"
},
{
"status": "affected",
"version": "11.0(3)SR2"
},
{
"status": "affected",
"version": "11.0(2)SR2"
},
{
"status": "affected",
"version": "11.0(1)"
},
{
"status": "affected",
"version": "11.5(1)SR1"
},
{
"status": "affected",
"version": "11-0-1MSR1-1"
},
{
"status": "affected",
"version": "10.4(1) 3rd Party"
},
{
"status": "affected",
"version": "10.3(1.11) 3rd Party"
},
{
"status": "affected",
"version": "10.2(2)"
},
{
"status": "affected",
"version": "10.2(1)SR1"
},
{
"status": "affected",
"version": "10.1(1.9)"
},
{
"status": "affected",
"version": "10.1(1)SR2"
},
{
"status": "affected",
"version": "10.2(1)"
},
{
"status": "affected",
"version": "10.1(1)SR1"
},
{
"status": "affected",
"version": "10.4(1)SR2 3rd Party"
},
{
"status": "affected",
"version": "10.3(1)"
},
{
"status": "affected",
"version": "10.3(1)SR4b"
},
{
"status": "affected",
"version": "10.3(1)SR5"
},
{
"status": "affected",
"version": "10.3(1.9) 3rd Party"
},
{
"status": "affected",
"version": "10.3(2)"
},
{
"status": "affected",
"version": "10.3(1)SR4"
},
{
"status": "affected",
"version": "10.3(1)SR2"
},
{
"status": "affected",
"version": "10.3(1)SR3"
},
{
"status": "affected",
"version": "10.3(1)SR1"
},
{
"status": "affected",
"version": "12.6(1)"
},
{
"status": "affected",
"version": "12.1(1)"
},
{
"status": "affected",
"version": "12.5(1)SR1"
},
{
"status": "affected",
"version": "12.5(1)SR2"
},
{
"status": "affected",
"version": "12.5(1)"
},
{
"status": "affected",
"version": "12.5(1)SR3"
},
{
"status": "affected",
"version": "12.6(1)SR1"
},
{
"status": "affected",
"version": "12.7(1)"
},
{
"status": "affected",
"version": "12.1(1)SR1"
},
{
"status": "affected",
"version": "12.0(1)"
},
{
"status": "affected",
"version": "12.0(1)SR2"
},
{
"status": "affected",
"version": "12.0(1)SR1"
},
{
"status": "affected",
"version": "12.0(1)SR3"
},
{
"status": "affected",
"version": "12.8(1)"
},
{
"status": "affected",
"version": "12.8(1)SR1"
},
{
"status": "affected",
"version": "12.8(1)SR2"
},
{
"status": "affected",
"version": "11.0(5)SR3"
},
{
"status": "affected",
"version": "11.0(6)"
},
{
"status": "affected",
"version": "11.0(6)SR1"
},
{
"status": "affected",
"version": "11.0(6)SR2"
},
{
"status": "affected",
"version": "10.3(1)SR6"
},
{
"status": "affected",
"version": "10.3(1)SR7"
},
{
"status": "affected",
"version": "12.7(1)SR1"
},
{
"status": "affected",
"version": "14.0(1)SR1"
},
{
"status": "affected",
"version": "14.0(1)"
},
{
"status": "affected",
"version": "14.0(1)SR2"
},
{
"status": "affected",
"version": "14.0(1)SR3"
},
{
"status": "affected",
"version": "14.1(1)"
},
{
"status": "affected",
"version": "14.1(1)SR1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:57:31.975Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ip-phone-auth-bypass-pSqxZRPR",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR"
}
],
"source": {
"advisory": "cisco-sa-ip-phone-auth-bypass-pSqxZRPR",
"defects": [
"CSCwc37223",
"CSCwc37234"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20018",
"datePublished": "2023-01-19T01:35:41.006Z",
"dateReserved": "2022-10-27T18:47:50.308Z",
"dateUpdated": "2024-08-02T08:57:35.086Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20037 (GCVE-0-2023-20037)
Vulnerability from cvelistv5 – Published: 2023-01-19 01:34 – Updated: 2024-08-02 08:57
VLAI?
EPSS
Summary
A vulnerability in Cisco Industrial Network Director could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks.
The vulnerability is due to improper validation of content submitted to the affected application. An attacker could exploit this vulnerability by sending requests containing malicious values to the affected system. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Industrial Network Director |
Affected:
1.5.0
Affected: 1.5.1 Affected: 1.4.0 Affected: 1.0.0 Affected: 1.6.0 Affected: 1.6.1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:57:35.842Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-ind-fZyVjJtG",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Industrial Network Director",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "1.5.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.0.0"
},
{
"status": "affected",
"version": "1.6.0"
},
{
"status": "affected",
"version": "1.6.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Industrial Network Director could allow an authenticated, remote attacker to conduct stored cross-site scripting (XSS) attacks.\r\n\r The vulnerability is due to improper validation of content submitted to the affected application. An attacker could exploit this vulnerability by sending requests containing malicious values to the affected system. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:57:35.483Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ind-fZyVjJtG",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG"
}
],
"source": {
"advisory": "cisco-sa-ind-fZyVjJtG",
"defects": [
"CSCwc29356"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20037",
"datePublished": "2023-01-19T01:34:01.022Z",
"dateReserved": "2022-10-27T18:47:50.316Z",
"dateUpdated": "2024-08-02T08:57:35.842Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20026 (GCVE-0-2023-20026)
Vulnerability from cvelistv5 – Published: 2023-01-19 01:33 – Updated: 2025-03-12 16:20
VLAI?
EPSS
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320 and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
Severity ?
6.5 (Medium)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Small Business RV Series Router Firmware |
Affected:
1.0.00.29
Affected: 1.0.00.33 Affected: 1.0.01.16 Affected: 1.0.01.17 Affected: 1.0.01.18 Affected: 1.0.01.20 Affected: 1.0.02.16 Affected: 1.0.03.15 Affected: 1.0.03.16 Affected: 1.0.03.17 Affected: 1.0.03.18 Affected: 1.0.03.19 Affected: 1.0.03.20 Affected: 1.0.03.21 Affected: 1.0.03.22 Affected: 1.0.03.24 Affected: 1.0.03.26 Affected: 1.0.03.27 Affected: 1.0.03.28 Affected: 1.0.03.29 Affected: 2.0.0.19-tm Affected: 2.0.2.01-tm Affected: 1.3.12.19-tm Affected: 1.3.12.6-tm Affected: 1.3.13.02-tm Affected: 1.3.9.8-tm Affected: 4.0.0.7 Affected: 4.0.2.08-tm Affected: 4.0.3.03-tm Affected: 4.0.4.02-tm Affected: 4.2.1.02 Affected: 4.2.2.08 Affected: 4.2.3.03 Affected: 4.2.3.06 Affected: 4.2.3.07 Affected: 4.2.3.08 Affected: 4.2.3.09 Affected: 4.2.3.10 Affected: 4.2.3.14 Affected: 3.0.0.1-tm Affected: 3.0.0.19-tm Affected: 3.0.2.01-tm Affected: 4.1.1.01 Affected: 4.1.0.02-tm |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:57:35.554Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Small Business RV Series Router Firmware",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "1.0.00.29"
},
{
"status": "affected",
"version": "1.0.00.33"
},
{
"status": "affected",
"version": "1.0.01.16"
},
{
"status": "affected",
"version": "1.0.01.17"
},
{
"status": "affected",
"version": "1.0.01.18"
},
{
"status": "affected",
"version": "1.0.01.20"
},
{
"status": "affected",
"version": "1.0.02.16"
},
{
"status": "affected",
"version": "1.0.03.15"
},
{
"status": "affected",
"version": "1.0.03.16"
},
{
"status": "affected",
"version": "1.0.03.17"
},
{
"status": "affected",
"version": "1.0.03.18"
},
{
"status": "affected",
"version": "1.0.03.19"
},
{
"status": "affected",
"version": "1.0.03.20"
},
{
"status": "affected",
"version": "1.0.03.21"
},
{
"status": "affected",
"version": "1.0.03.22"
},
{
"status": "affected",
"version": "1.0.03.24"
},
{
"status": "affected",
"version": "1.0.03.26"
},
{
"status": "affected",
"version": "1.0.03.27"
},
{
"status": "affected",
"version": "1.0.03.28"
},
{
"status": "affected",
"version": "1.0.03.29"
},
{
"status": "affected",
"version": "2.0.0.19-tm"
},
{
"status": "affected",
"version": "2.0.2.01-tm"
},
{
"status": "affected",
"version": "1.3.12.19-tm"
},
{
"status": "affected",
"version": "1.3.12.6-tm"
},
{
"status": "affected",
"version": "1.3.13.02-tm"
},
{
"status": "affected",
"version": "1.3.9.8-tm"
},
{
"status": "affected",
"version": "4.0.0.7"
},
{
"status": "affected",
"version": "4.0.2.08-tm"
},
{
"status": "affected",
"version": "4.0.3.03-tm"
},
{
"status": "affected",
"version": "4.0.4.02-tm"
},
{
"status": "affected",
"version": "4.2.1.02"
},
{
"status": "affected",
"version": "4.2.2.08"
},
{
"status": "affected",
"version": "4.2.3.03"
},
{
"status": "affected",
"version": "4.2.3.06"
},
{
"status": "affected",
"version": "4.2.3.07"
},
{
"status": "affected",
"version": "4.2.3.08"
},
{
"status": "affected",
"version": "4.2.3.09"
},
{
"status": "affected",
"version": "4.2.3.10"
},
{
"status": "affected",
"version": "4.2.3.14"
},
{
"status": "affected",
"version": "3.0.0.1-tm"
},
{
"status": "affected",
"version": "3.0.0.19-tm"
},
{
"status": "affected",
"version": "3.0.2.01-tm"
},
{
"status": "affected",
"version": "4.1.1.01"
},
{
"status": "affected",
"version": "4.1.0.02-tm"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320 and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.\r\n\r This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for vulnerabilities CVE-2023-20025 and CVE-2023-20026 that are described in this advisory.\r\n\r\nIn March 2025, the Cisco PSIRT became aware of additional attempted exploitation of some of these vulnerabilities in the wild. Cisco continues to strongly recommend that customers upgrade their hardware to Meraki or Cisco 1000 Series Integrated Services Routers to remediate these vulnerabilities."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:20:12.515Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5"
}
],
"source": {
"advisory": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
"defects": [
"CSCwd60199"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20026",
"datePublished": "2023-01-19T01:33:26.928Z",
"dateReserved": "2022-10-27T18:47:50.309Z",
"dateUpdated": "2025-03-12T16:20:12.515Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20038 (GCVE-0-2023-20038)
Vulnerability from cvelistv5 – Published: 2023-01-19 01:34 – Updated: 2024-10-28 16:34
VLAI?
EPSS
Summary
A vulnerability in the monitoring application of Cisco Industrial Network Director could allow an authenticated, local attacker to access a static secret key used to store both local data and credentials for accessing remote systems.
This vulnerability is due to a static key value stored in the application used to encrypt application data and remote credentials. An attacker could exploit this vulnerability by gaining local access to the server Cisco Industrial Network Director is installed on. A successful exploit could allow the attacker to decrypt data allowing the attacker to access remote systems monitored by Cisco Industrial Network Director.
Severity ?
8.8 (High)
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Industrial Network Director |
Affected:
1.5.0
Affected: 1.5.1 Affected: 1.4.0 Affected: 1.0.0 Affected: 1.0.1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:57:35.624Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-ind-fZyVjJtG",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20038",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T16:19:28.780949Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T16:34:24.962Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Industrial Network Director",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "1.5.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.0.0"
},
{
"status": "affected",
"version": "1.0.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the monitoring application of Cisco Industrial Network Director could allow an authenticated, local attacker to access a static secret key used to store both local data and credentials for accessing remote systems.\r\n\r This vulnerability is due to a static key value stored in the application used to encrypt application data and remote credentials. An attacker could exploit this vulnerability by gaining local access to the server Cisco Industrial Network Director is installed on. A successful exploit could allow the attacker to decrypt data allowing the attacker to access remote systems monitored by Cisco Industrial Network Director."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-321",
"description": "Use of Hard-coded Cryptographic Key",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:57:35.790Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ind-fZyVjJtG",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG"
}
],
"source": {
"advisory": "cisco-sa-ind-fZyVjJtG",
"defects": [
"CSCwc29341"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20038",
"datePublished": "2023-01-19T01:34:24.311Z",
"dateReserved": "2022-10-27T18:47:50.316Z",
"dateUpdated": "2024-10-28T16:34:24.962Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…