CVE-2016-1287
Vulnerability from cvelistv5
Published
2016-02-11 18:00
Modified
2024-08-05 22:48
Severity ?
Summary
Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019.
References
ykramarz@cisco.comhttp://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.htmlExploit, Third Party Advisory, VDB Entry
ykramarz@cisco.comhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ikeVendor Advisory
ykramarz@cisco.comhttp://www.securitytracker.com/id/1034997Third Party Advisory, VDB Entry
ykramarz@cisco.comhttps://blog.exodusintel.com/2016/02/10/firewall-hacking/Exploit, Technical Description, Third Party Advisory
ykramarz@cisco.comhttps://www.exploit-db.com/exploits/39823/Exploit, Third Party Advisory, VDB Entry
ykramarz@cisco.comhttps://www.kb.cert.org/vuls/id/327976Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ikeVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034997Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://blog.exodusintel.com/2016/02/10/firewall-hacking/Exploit, Technical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/39823/Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/327976Third Party Advisory, US Government Resource
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.651Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20160210 Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html"
          },
          {
            "name": "1034997",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034997"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blog.exodusintel.com/2016/02/10/firewall-hacking/"
          },
          {
            "name": "VU#327976",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/327976"
          },
          {
            "name": "39823",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/39823/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-02-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-03T22:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20160210 Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html"
        },
        {
          "name": "1034997",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034997"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blog.exodusintel.com/2016/02/10/firewall-hacking/"
        },
        {
          "name": "VU#327976",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/327976"
        },
        {
          "name": "39823",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/39823/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2016-1287",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20160210 Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike"
            },
            {
              "name": "http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html"
            },
            {
              "name": "1034997",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034997"
            },
            {
              "name": "https://blog.exodusintel.com/2016/02/10/firewall-hacking/",
              "refsource": "MISC",
              "url": "https://blog.exodusintel.com/2016/02/10/firewall-hacking/"
            },
            {
              "name": "VU#327976",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/327976"
            },
            {
              "name": "39823",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/39823/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2016-1287",
    "datePublished": "2016-02-11T18:00:00",
    "dateReserved": "2016-01-04T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-1287\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2016-02-11T18:59:00.137\",\"lastModified\":\"2024-11-21T02:46:07.187\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer en las implementaciones IKEv1 y IKEv2 en Cisco ASA Software en versiones anteriores a 8.4(7.30), 8.7 en versiones anteriores a 8.7(1.18), 9.0 en versiones anteriores a 9.0(4.38), 9.1 en versiones anteriores a 9.1(7), 9.2 en versiones anteriores a 9.2(4.5), 9.3 en versiones anteriores a 9.3(3.7), 9.4 en versiones anteriores a 9.4(2.4) y 9.5 en versiones anteriores a 9.5(2.2) en dispositivos ASA 5500, dispositivos ASA 5500-X, ASA Services Module para dispositivos Cisco Catalyst 6500 y Cisco 7600, dispositivos ASA 1000V, Adaptive Security Virtual Appliance (tambi\u00e9n conocido como ASAv), dispositivos Firepower 9300 ASA Security Module y ISA 3000 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes UDP manipulados, tambi\u00e9n conocido como Bug IDs CSCux29978 y CSCux42019.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64ADB02B-E12A-49F7-84A5-981C51CBD85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE8E662-2772-4D98-B01C-694757D9D6C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1950D663-F0C9-4AE1-9595-FDCCDA1D83C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D6C582-4CCD-4BEA-8367-242CC3BADE0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95627941-30D8-452F-B6C8-76D2BEE93514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7C3B04-B4F2-442C-BB54-9F4F192FB80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECA50E1-B84C-46DD-AACE-513E9D4C383B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1E4830-C94A-4B7E-9CE1-63D0A747FBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C569D949-A2BE-4983-A5C3-14508676B464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF586164-82BC-4EA9-BE9D-4B6CDBFD7D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A338318-148E-4EB3-B406-29A55F6E0B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F3A543-ECF2-4672-B6B6-DC1AB7D96D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"364CA0EA-F85E-4C4B-96D8-A7256F413844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA148AD-604D-4284-AE41-4E279F616B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA4087CC-8B4D-42F5-9917-DA5EA2AA684C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CE8E7E-86CD-458C-AAB4-5901F66FC977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B943E75A-F816-473B-A458-9C6F3F702414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C016EF9-C98A-4877-8086-39EA92031FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E552CFA-627D-4CE5-9E73-E97A1DFCF40F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C47D6AE-7B30-422F-9F7F-2A95608AD3F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF918814-7EC6-4F46-AA7D-6AA52A42DB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B55084-8826-4FE1-B0C0-0132354D9CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC75098F-97F4-4E27-8602-4521048C144C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA3389C-86FE-45F7-97D7-E3386403944F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54C2EAD-3E0F-451D-8451-A5D29D005DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7025DA5B-2C48-4044-B11C-F45FF351311A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F9B862-1E61-477A-9ADF-8DCCDCB1C239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61FFB15-1E0C-4B7C-A506-BE69F1049D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E53EC396-87B2-46F2-B150-841804F10FAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19432EC8-2C08-4C07-80A1-36BD1A747C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E501CF3-86C1-4F37-8228-79A698236733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70158003-F6CA-4A5C-893C-BF885A388D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6297451E-196E-4C6D-9186-451BB42CAE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF399187-270F-4560-9C09-DF18132FA427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE7A928A-2CBA-43BC-B312-975EE9E24830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF721BA-25FF-485E-9102-5741AC9BC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34D78E-68C9-4372-85F2-E74A1C8C06F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05748A45-8423-42F4-8F95-7BA83548C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C15D1F6-997D-47FD-A654-AEF3332E6105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3E5F50-CBD1-4516-BC97-3AF59DB39A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B54134-5AC7-4D7E-A7F1-D4C2057FF146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFE499E-09BB-4C86-AC74-7568B2D3CA51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5BF7-18FB-4066-947E-7352B9951AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42DD43A-B6BD-4C2B-BA57-928501C62388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE65B75-4987-4E77-8814-F7BC9875924A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C890603E-6634-46E2-AFA9-ADE8ED1B9E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBAB79E-83BF-4AD1-875B-D015A18ECB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA41C5E-F854-4729-9498-C54FA5C00664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B08E743-488A-4F99-ABA6-98AD534B603B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978A0B9D-1B1D-4E22-893C-52DE75247BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD17927A-7AFA-4177-A34E-5FEB7A9400AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4B884F-EDE6-4055-83D8-609D2D1E518F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8570FBED-D38F-49ED-8C6A-E241BF7E1274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2889989-8D9C-4E06-8477-8BCF6DC7D84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E9724F-AD95-4572-BD8F-27B71F8EBC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990B883-0B5A-44F0-B4DC-8031ED0F2026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA74460-D26D-4C0A-B697-DF9003096065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90BEB7A8-B2DB-46EB-9265-AB88476B1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF80D39-35D2-447C-A809-E4C819FEEF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F417BC-5835-4F29-8DB6-03A62B7B2364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90599A3-F885-414E-94F9-B4AECEB34D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0185F882-E031-4B16-8DB3-62F76FBB78C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092FB46B-A4A4-40E5-B474-4FC36ADC427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB27EFB-BF82-493D-ADF2-7395B4E2A55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD84D98-1B98-454C-AF63-DE5E76E17C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D975A3B-0B3C-44E6-BE9C-AA73CF97AF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAF32AF-EF06-4663-BFBE-1334D491A212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FB85D8-B247-4921-AE49-C2A1C2FDEB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BA59C8-F3D0-4B94-824B-F3CDAB465D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF3C75D-751C-444F-A4AF-303409B22B1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CD6FE3-1B32-461E-9215-0F016798B61E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22552CF4-01F8-46A8-ADD4-7BABFA574330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1C5485-EAF4-4F4D-AFA1-E105F433665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989F9AC4-C2D1-49A0-95C3-79A4EB827E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B442C852-2465-4EA8-A977-1F10A4CE23AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DB6ED4-3095-46C1-9CB6-2975A7B05303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE68CD8E-B9CF-4519-8B0E-4C4488B34887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518D4826-06B0-4DDC-B082-A536418FD292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E343DE08-58FA-4C39-99F9-8CB5F57D0CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76363698-DB62-4D92-8EE4-069891A9F92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6159BEE3-D097-4E07-9962-06DB740E2AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD606591-F69A-47AD-9256-20B98CA16135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EF3895-F372-45D3-9C7D-15F5C4712D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC5960D-B917-4ABA-850F-A710676ACB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B746A138-6650-49A3-87C8-3728FE5CF215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50C2A13-5A8B-4FA5-ABB8-1157E560503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909F9D55-9276-4CF1-BC63-7CEEF8F25C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F383D276-D5EC-4335-AC09-9D30F6443AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2A7FF-6AC3-42B5-954A-9AA5950C523A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7F36A8-C291-423D-AF28-56AAD8D0F712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2009F4-F832-49D6-8346-54A7328BD93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9221DD4-498A-4867-B647-47E42299CE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B839A425-E08C-41B1-9270-E177E40B1E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F4DDF53-0995-4971-A980-30FD15A40C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3BD921-A58A-47EB-B90D-21C3A5D02D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800FE449-350D-4C4C-A8C2-D4C5A3B59F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49BF8F7-5ACE-4D90-8F17-1AA9D3A2FD7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE6D050-F186-492C-9813-895433B2612A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6157AA5C-8297-4A32-B0A8-1E7E801E9CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A13091-02C6-4D98-90C9-ED4C43BDAFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C3E0E1-C3F3-4D53-8116-7D1AF3CD53CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F3DB48-E1EE-44E9-85DE-9FD7D5C59B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E064BD-CBC0-4556-9BCF-87D808809237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D5DC14-187B-4808-8377-5FF44A11AA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64079FC4-53D8-4DBF-A2D5-2CED256F4939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF969BE-46BB-4AD7-85AB-8384426E9551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E618B3-DD03-4ECD-AB9B-97F1EDF95E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20424324-881A-496B-BC55-62AA75994249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67012F3-5153-400E-BD6F-EB0949875F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BA4B2D-187A-47EC-8BE1-7EA178549476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF52FB9-4EA9-41A7-AD29-E963C09FC98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B5CF41-7F01-4AE9-B54B-8DB6909504B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80EAFF-E577-414A-9DDE-D27A41CB3DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CC07CC-0C79-48ED-BEB6-4B576A0DBD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FA6817-C5B7-410F-9CF7-801CC958C12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576FC7F-B7DD-41DD-A95E-23B1F86E4B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3768E4B0-E457-47AB-99B0-7C1A0E0CBE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D142088-0265-4987-8F5C-029F3DD06A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EDEE39-865D-4DA3-B1C9-033F2FF1A56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7052D2-0789-4A4D-917D-FCD894B7280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956F0A8-7424-437C-AAD8-203183BEBFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F6504-9CD0-453E-8C25-02BB9EE818F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E842AF74-D1E3-4F71-80F9-197B38942405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1A48B1-112A-41C2-BC01-BCCF5794553D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6448B4B4-022D-4D4A-A6DE-0090CEA12595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42813600-3186-4D19-8AF2-F4F98D3C6740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC0969E6-151D-4298-8EC8-68D7880E994B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0091CE-3386-4CCC-A2A8-900842EA6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A450E0-09E4-44C5-B55C-78A4BDAADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285C95A-316D-4965-A34D-3BCB9AB83FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714F698-BBAE-47BB-99E8-F90D22415EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB55BC7E-0B3F-4202-8768-08F27B763926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB01683-C482-4A5B-90FA-B5266BEA452E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA16481A-4A47-4A8E-8C78-87B3A171280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0258ED-6ED0-49C7-A13A-368711649FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2049D602-54F1-4072-936E-0D7E337162B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0710D6C8-AD34-43E2-B72B-315FFF3DC34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F8F1D2-2196-44C4-B420-824F49BB4ACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E14B8D3-6D53-4E84-9B5D-24667B192C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05B2DFD-A0EF-42BE-B00B-334E78CA8C10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CC96C9-492F-49CB-BEFE-356581E96B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1F7D4-EC51-47D1-A71A-9EF98C51D388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5E93DE-06C0-401C-8062-1B2EB6EFDED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5EBFAB-25E2-4245-B748-92CAA943D4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BFB446-5747-42BB-98BC-B8DF250F1842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C31567-8AEB-49C6-AA60-4150411D62AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA140CB2-C17C-4164-A59A-8585906057BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468D98A7-92D5-4C01-9EDD-CB44B85EA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39330218-32FA-42FF-B5CA-288B7D140304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92D7CED-D036-414B-B9EB-DCAF7F425A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AAAB02-140D-46F2-A315-5791BF5A853F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB02DBE-6D60-4D0E-8E9D-7611C3C32748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B4370A-84E5-4766-9D9D-EA1C53D73B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2F3C77-89CD-4990-98FA-E896079B6C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D99395-D18D-458E-9880-19B7767F69D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7DD812-DC72-4816-8B0F-361C32B2CD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC41D4CD-D5EA-4678-B3AA-962C7C937118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996C9552-5743-4639-A077-5B057605DF21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5779CE0-7691-47DA-902C-4D32D6650C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C69BE69-7C19-4ED3-98D3-04B1D41E56FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D12EFD-71D6-480E-97D5-278CCE4A7118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE9F46B-DD74-4295-BB6A-9239E29F4416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F53875-D589-4C34-B863-67AC9945BED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B313B0E-4200-427F-A156-1EDA681F439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C49821-3BA5-4B44-84F5-113024FD030F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2011F264-53A5-4507-843B-46F66D285ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73FB7BAF-7B3E-4091-A90B-FB19B38FFE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2DA09B-CFBA-4FDE-A6D0-7C2CF202D72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29F95F5-6957-46F0-A0A2-CCACBBA14F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9EFD6D-A657-4102-982D-7634AC25E75E\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034997\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://blog.exodusintel.com/2016/02/10/firewall-hacking/\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/39823/\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/327976\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://packetstormsecurity.com/files/137100/Cisco-ASA-Software-IKEv1-IKEv2-Buffer-Overflow.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://blog.exodusintel.com/2016/02/10/firewall-hacking/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/39823/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/327976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.