CVE-2017-3807
Vulnerability from cvelistv5
Published
2017-02-09 17:00
Modified
2024-08-05 14:39
Severity ?
Summary
A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:39:40.554Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa"
          },
          {
            "name": "41369",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41369/"
          },
          {
            "name": "1037797",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037797"
          },
          {
            "name": "96161",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/96161"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6"
            }
          ]
        }
      ],
      "datePublic": "2017-02-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-31T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa"
        },
        {
          "name": "41369",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41369/"
        },
        {
          "name": "1037797",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037797"
        },
        {
          "name": "96161",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/96161"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2017-3807",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco ASA Software with Clientless SSL VPN portal is enabled Major Releases 9.0-9.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa"
            },
            {
              "name": "41369",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41369/"
            },
            {
              "name": "1037797",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037797"
            },
            {
              "name": "96161",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/96161"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2017-3807",
    "datePublished": "2017-02-09T17:00:00",
    "dateReserved": "2016-12-21T00:00:00",
    "dateUpdated": "2024-08-05T14:39:40.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-3807\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2017-02-09T17:59:00.137\",\"lastModified\":\"2024-11-21T03:26:09.250\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de Common Internet Filesystem (CIFS) en la funcionalidad Clientless SSL VPN de Cisco ASA Software, Major Releases 9.0-9.6, podr\u00eda permitir a un atacante remoto autenticado provocar un desbordamiento de la memoria din\u00e1mica. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada suministrada por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una URL manipulada al sistema afectado. Una explotaci\u00f3n podr\u00eda permitir al atacante remoto provocar una recarga del sistema afectado o potencialmente ejecutar c\u00f3digo. Nota: Solo tr\u00e1fico dirigido al sistema afectado puede ser usado para explotar esta vulnerabilidad. Esta vulnerabilidad solo afecta a sistemas configurados en modo firewall enrutado y modo de contexto individual o m\u00faltiple. Esta vulnerabilidad puede desencadenarse por tr\u00e1fico IPv4 o IPv6. Se necesita una conexi\u00f3n TCP v\u00e1lida para llevar a cabo el ataque. El atacante necesita tener credenciales v\u00e1lidas para iniciar sesi\u00f3n en el portal Clientless SSL VPN. El software Cisco ASA vulnerable que se ejecuta en los siguientes productos puede verse afectado por esta vulnerabilidad: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA para Firepower 9300 Series, Cisco ASA para Firepower 4100 Series. Cisco Bug IDs: CSCvc23838.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:C\",\"baseScore\":8.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":8.5,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA0DDDD-C987-4DA6-ADEE-77B387C26A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84099EB-2535-4A9F-8355-FF937CFBD122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CBC03FE-3A54-450E-A8CE-844C4A6E54B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C599F894-DAD2-4231-8BB8-1427E7C02D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5123875E-2726-4AD3-A767-04D4F3C15DD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F60C12-71C9-47C6-B43F-A0374419D736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBC6451-C5CE-4A84-8FAD-A0B6DBF67D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C853CD9-F451-406E-A515-3BDC34E55639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE4D6D0E-03FD-4C3C-9F6F-0BCE4B9F5D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B296BB10-E740-4EFC-A9FE-5E8C6D9BA0D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41173D04-CD92-429A-A201-094C324435ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96FB6BAE-322B-48F1-A26D-0ADC86ECCAF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF3A418-EF33-4BEF-8508-DA573885AE2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929BF200-619E-4F35-9DDC-8DBFA7728CDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AEBB18A-F33C-4A07-8C3F-5042F5C5B66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C28DC-B15F-486B-96F1-D08529B7374A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E00BE3-089B-48DB-8626-F5F655271CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89373AD0-3CC4-4BD0-BA5C-352322BD371C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"240E8B28-9CC1-4995-91D4-B41ACC96C44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DB3077B-59B9-4B33-AE6F-A0AF84EB69EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03A1408-A55A-4482-B239-B13094B13BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABBFB9E-C009-42B6-A7D7-D897843F9A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FCA9A3-94DF-4A5C-84D8-A1E95BC9A8A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9776E3A4-8F5D-4579-992D-EC00F0F7AEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4400D917-0BEB-49AE-80C9-0F607818EEB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B53107-BCD0-4D3E-B090-91D6BD6139C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0430DD9-E36F-4911-ABB3-5B1043AE9EBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3639AA-0F7B-403E-83F9-538A770008E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A929090-A536-44B3-9371-A827FD0BEEFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB1837E-A87E-435A-8C89-AA6BB55FE9E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF45DF2C-54FF-48FE-A72B-9416CD5A582B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27FAEFB-6129-44D5-A836-867B24C6A980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3845853-C6C5-464D-8BEA-4F3D6B53AEDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C6B77C-1AD1-48E5-9279-B9F388066082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52E87DA1-3BD9-46E3-ADDB-DF7F5B958009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CDAE653-39BC-443F-B2B0-06BEE9A66E6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43EB0487-CF1F-4314-BD0D-2F31E4252431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D147236F-7871-4879-86E1-CDD49E9C4C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA8708CA-EA75-40EB-A868-BA78B5753516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64ADB02B-E12A-49F7-84A5-981C51CBD85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE8E662-2772-4D98-B01C-694757D9D6C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1950D663-F0C9-4AE1-9595-FDCCDA1D83C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D6C582-4CCD-4BEA-8367-242CC3BADE0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95627941-30D8-452F-B6C8-76D2BEE93514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7C3B04-B4F2-442C-BB54-9F4F192FB80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECA50E1-B84C-46DD-AACE-513E9D4C383B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1E4830-C94A-4B7E-9CE1-63D0A747FBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C569D949-A2BE-4983-A5C3-14508676B464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF586164-82BC-4EA9-BE9D-4B6CDBFD7D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A338318-148E-4EB3-B406-29A55F6E0B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F3A543-ECF2-4672-B6B6-DC1AB7D96D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"364CA0EA-F85E-4C4B-96D8-A7256F413844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA148AD-604D-4284-AE41-4E279F616B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA4087CC-8B4D-42F5-9917-DA5EA2AA684C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CE8E7E-86CD-458C-AAB4-5901F66FC977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B943E75A-F816-473B-A458-9C6F3F702414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C016EF9-C98A-4877-8086-39EA92031FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E552CFA-627D-4CE5-9E73-E97A1DFCF40F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C47D6AE-7B30-422F-9F7F-2A95608AD3F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF918814-7EC6-4F46-AA7D-6AA52A42DB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B55084-8826-4FE1-B0C0-0132354D9CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC75098F-97F4-4E27-8602-4521048C144C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA3389C-86FE-45F7-97D7-E3386403944F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54C2EAD-3E0F-451D-8451-A5D29D005DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7025DA5B-2C48-4044-B11C-F45FF351311A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F9B862-1E61-477A-9ADF-8DCCDCB1C239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61FFB15-1E0C-4B7C-A506-BE69F1049D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E53EC396-87B2-46F2-B150-841804F10FAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19432EC8-2C08-4C07-80A1-36BD1A747C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E501CF3-86C1-4F37-8228-79A698236733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730F28DB-DFAC-4D9D-AB4A-42C158F3D88B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D49C2-4F2E-4369-8933-FF74A3CD51EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D2A272-5B6A-426C-B95C-03F1CF92A556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1AD5614-6AA5-4607-9B4D-7F40E174B51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C68E73D6-A207-4276-A972-52B859CD958A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743B9EEB-8A00-4EDD-A10D-4FC0A8C2E6A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA384B7-938A-48F7-8154-442E46FB1400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0250AEA5-7613-4F64-B90D-D600745F2403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C93F75-E046-4E09-A269-49A55EFF2978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CFD97E-113C-4F56-9BF1-D57C81BCA589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"880058C4-556B-42FF-98AF-4428CB8CB94A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D6D5C-1DA2-407A-BE75-2189E04BC9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D61007E-55D6-4E10-A9CF-B4B5227AC909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A862D259-40EE-45AE-B896-7F68AC06272C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D33210F-0FA8-4089-AA05-C7AA80C12460\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2D6C8E-2E0F-4328-8BE5-8E6845B75513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"313EF49F-4F50-4205-93D8-38B0B18EB7E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E406214-2776-42C2-B777-92E6420FBFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"837D743B-CCCB-4D30-9B2E-24CBC4F9F9D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B44024A-4500-4ACD-9C92-8EA996188B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C2A72E-C42C-456B-B712-D04860CE1A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC7F030-18CA-4F56-8F97-69E038319E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"911DC415-971F-46C1-B804-F8E87A0FD60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756BFBA7-D2D1-45D7-B225-A12B4FB82949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.0.104:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200F740F-9D7D-4A64-AE1F-276CF58241C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4B9D86-8EEB-4A5E-824C-4D7EBD64877A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD242CAB-9DB6-42F3-B649-A963C386C05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9251926E-96A3-4160-BADB-2DF5CB662B64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2B9487-9749-4271-8112-C4FA21611312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E478D1ED-C5AF-46C2-B49B-515A62B653B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAAB258C-5D97-489B-8B4E-0511B00BE506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CF28B6-627D-4E25-BB61-32956239963D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E91C88B-7DF8-4ED5-B4BD-8C252C6EF0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"519C99B8-E222-4FA3-8C8F-0DA6019CD6A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E26DFA-B023-44B9-80D1-A5E391B571AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F07BA4-A069-4CD5-B0D9-156320CBB5AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CDDEAF-C62D-4364-ACA8-14F14BBFB150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.2.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D140D4-1AE3-4D46-9B13-3EC78EBC4FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70158003-F6CA-4A5C-893C-BF885A388D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6297451E-196E-4C6D-9186-451BB42CAE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF399187-270F-4560-9C09-DF18132FA427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE7A928A-2CBA-43BC-B312-975EE9E24830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF721BA-25FF-485E-9102-5741AC9BC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34D78E-68C9-4372-85F2-E74A1C8C06F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05748A45-8423-42F4-8F95-7BA83548C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C15D1F6-997D-47FD-A654-AEF3332E6105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3E5F50-CBD1-4516-BC97-3AF59DB39A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B54134-5AC7-4D7E-A7F1-D4C2057FF146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFE499E-09BB-4C86-AC74-7568B2D3CA51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5BF7-18FB-4066-947E-7352B9951AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42DD43A-B6BD-4C2B-BA57-928501C62388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE65B75-4987-4E77-8814-F7BC9875924A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C890603E-6634-46E2-AFA9-ADE8ED1B9E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBAB79E-83BF-4AD1-875B-D015A18ECB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA41C5E-F854-4729-9498-C54FA5C00664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B08E743-488A-4F99-ABA6-98AD534B603B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978A0B9D-1B1D-4E22-893C-52DE75247BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD17927A-7AFA-4177-A34E-5FEB7A9400AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4B884F-EDE6-4055-83D8-609D2D1E518F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8570FBED-D38F-49ED-8C6A-E241BF7E1274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2889989-8D9C-4E06-8477-8BCF6DC7D84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E9724F-AD95-4572-BD8F-27B71F8EBC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA7A0DD-9826-4AD8-B7C8-AD750BD87E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990B883-0B5A-44F0-B4DC-8031ED0F2026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA74460-D26D-4C0A-B697-DF9003096065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90BEB7A8-B2DB-46EB-9265-AB88476B1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF80D39-35D2-447C-A809-E4C819FEEF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F417BC-5835-4F29-8DB6-03A62B7B2364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90599A3-F885-414E-94F9-B4AECEB34D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0185F882-E031-4B16-8DB3-62F76FBB78C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092FB46B-A4A4-40E5-B474-4FC36ADC427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB27EFB-BF82-493D-ADF2-7395B4E2A55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD84D98-1B98-454C-AF63-DE5E76E17C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D975A3B-0B3C-44E6-BE9C-AA73CF97AF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAF32AF-EF06-4663-BFBE-1334D491A212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FB85D8-B247-4921-AE49-C2A1C2FDEB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BA59C8-F3D0-4B94-824B-F3CDAB465D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF3C75D-751C-444F-A4AF-303409B22B1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CD6FE3-1B32-461E-9215-0F016798B61E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22552CF4-01F8-46A8-ADD4-7BABFA574330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1C5485-EAF4-4F4D-AFA1-E105F433665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989F9AC4-C2D1-49A0-95C3-79A4EB827E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B442C852-2465-4EA8-A977-1F10A4CE23AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DB6ED4-3095-46C1-9CB6-2975A7B05303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE68CD8E-B9CF-4519-8B0E-4C4488B34887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518D4826-06B0-4DDC-B082-A536418FD292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E343DE08-58FA-4C39-99F9-8CB5F57D0CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76363698-DB62-4D92-8EE4-069891A9F92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6159BEE3-D097-4E07-9962-06DB740E2AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD606591-F69A-47AD-9256-20B98CA16135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EF3895-F372-45D3-9C7D-15F5C4712D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC5960D-B917-4ABA-850F-A710676ACB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B746A138-6650-49A3-87C8-3728FE5CF215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50C2A13-5A8B-4FA5-ABB8-1157E560503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909F9D55-9276-4CF1-BC63-7CEEF8F25C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F383D276-D5EC-4335-AC09-9D30F6443AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2A7FF-6AC3-42B5-954A-9AA5950C523A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7F36A8-C291-423D-AF28-56AAD8D0F712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2009F4-F832-49D6-8346-54A7328BD93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9221DD4-498A-4867-B647-47E42299CE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B839A425-E08C-41B1-9270-E177E40B1E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F4DDF53-0995-4971-A980-30FD15A40C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3BD921-A58A-47EB-B90D-21C3A5D02D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800FE449-350D-4C4C-A8C2-D4C5A3B59F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49BF8F7-5ACE-4D90-8F17-1AA9D3A2FD7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE6D050-F186-492C-9813-895433B2612A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6157AA5C-8297-4A32-B0A8-1E7E801E9CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A13091-02C6-4D98-90C9-ED4C43BDAFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C3E0E1-C3F3-4D53-8116-7D1AF3CD53CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F3DB48-E1EE-44E9-85DE-9FD7D5C59B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E064BD-CBC0-4556-9BCF-87D808809237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D5DC14-187B-4808-8377-5FF44A11AA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64079FC4-53D8-4DBF-A2D5-2CED256F4939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF969BE-46BB-4AD7-85AB-8384426E9551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E618B3-DD03-4ECD-AB9B-97F1EDF95E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20424324-881A-496B-BC55-62AA75994249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67012F3-5153-400E-BD6F-EB0949875F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BA4B2D-187A-47EC-8BE1-7EA178549476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF52FB9-4EA9-41A7-AD29-E963C09FC98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B5CF41-7F01-4AE9-B54B-8DB6909504B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80EAFF-E577-414A-9DDE-D27A41CB3DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CC07CC-0C79-48ED-BEB6-4B576A0DBD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FA6817-C5B7-410F-9CF7-801CC958C12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576FC7F-B7DD-41DD-A95E-23B1F86E4B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3768E4B0-E457-47AB-99B0-7C1A0E0CBE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D142088-0265-4987-8F5C-029F3DD06A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EDEE39-865D-4DA3-B1C9-033F2FF1A56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7052D2-0789-4A4D-917D-FCD894B7280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956F0A8-7424-437C-AAD8-203183BEBFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F6504-9CD0-453E-8C25-02BB9EE818F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E842AF74-D1E3-4F71-80F9-197B38942405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1A48B1-112A-41C2-BC01-BCCF5794553D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6448B4B4-022D-4D4A-A6DE-0090CEA12595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42813600-3186-4D19-8AF2-F4F98D3C6740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC0969E6-151D-4298-8EC8-68D7880E994B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0091CE-3386-4CCC-A2A8-900842EA6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A450E0-09E4-44C5-B55C-78A4BDAADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285C95A-316D-4965-A34D-3BCB9AB83FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213F0A66-A71E-4B64-A66F-EA7B9C0D9151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D33B43A-1836-4402-AEAC-59CA8F44E3D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07BC9E2D-0B86-4A82-8CB4-A31FFBF322CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B7B477-15FD-4198-B0D9-0F9A8A2E4C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6887033-E697-47D0-B6E0-61B64E9D3AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C1AB6D-F2C5-4726-8792-581E8DCB9EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA1216C-903C-469D-8615-ECFB3AA29BC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0707169B-34B9-4666-8EBD-F5967059D6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714F698-BBAE-47BB-99E8-F90D22415EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB55BC7E-0B3F-4202-8768-08F27B763926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB01683-C482-4A5B-90FA-B5266BEA452E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA16481A-4A47-4A8E-8C78-87B3A171280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0258ED-6ED0-49C7-A13A-368711649FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2049D602-54F1-4072-936E-0D7E337162B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0710D6C8-AD34-43E2-B72B-315FFF3DC34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F8F1D2-2196-44C4-B420-824F49BB4ACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E14B8D3-6D53-4E84-9B5D-24667B192C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05B2DFD-A0EF-42BE-B00B-334E78CA8C10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CC96C9-492F-49CB-BEFE-356581E96B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1F7D4-EC51-47D1-A71A-9EF98C51D388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5E93DE-06C0-401C-8062-1B2EB6EFDED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5EBFAB-25E2-4245-B748-92CAA943D4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BFB446-5747-42BB-98BC-B8DF250F1842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A13A9C-5387-4670-8E20-FE878946D091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.104\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7C7DA3-C24B-41BB-BDBE-7DC58EEAC4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(3.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC39DA3-8171-4344-A946-7965873C56F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C31567-8AEB-49C6-AA60-4150411D62AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA140CB2-C17C-4164-A59A-8585906057BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468D98A7-92D5-4C01-9EDD-CB44B85EA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39330218-32FA-42FF-B5CA-288B7D140304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92D7CED-D036-414B-B9EB-DCAF7F425A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AAAB02-140D-46F2-A315-5791BF5A853F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB02DBE-6D60-4D0E-8E9D-7611C3C32748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B4370A-84E5-4766-9D9D-EA1C53D73B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2F3C77-89CD-4990-98FA-E896079B6C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D03293-9765-46DB-B53D-1B23D5C14373\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0286DAF0-FACA-4F94-82E9-EAED8750DB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E77826-1208-4582-A94C-242B601BD456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD617A59-2A4C-4264-BB5D-0126EF292079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5B9FC85-13B8-488C-80C4-C29C0E244601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E7582A-835E-4A84-B197-EB40EE7985C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C489F4-4501-48D1-830F-169382343B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7C150D-8C79-4CF4-A6B6-AA46A94A3B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.50\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E044883-9952-477A-B2AA-3E0BB90C96A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.105\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E26A1B0-D61C-4A25-8E10-02A2E3E7A02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4A28B7-87A2-464A-92A8-644E3F7D13D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.243\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D83ED80-972A-4548-9AB0-10F9A23DF749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D99395-D18D-458E-9880-19B7767F69D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7DD812-DC72-4816-8B0F-361C32B2CD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC41D4CD-D5EA-4678-B3AA-962C7C937118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996C9552-5743-4639-A077-5B057605DF21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5779CE0-7691-47DA-902C-4D32D6650C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C69BE69-7C19-4ED3-98D3-04B1D41E56FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D12EFD-71D6-480E-97D5-278CCE4A7118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56AE55AB-8170-4E3A-AF89-A8F79599901A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B10653A-0E7C-4014-825D-76B5B438D378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77642A96-EF7F-4138-97BC-B3793EE0FB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE9F46B-DD74-4295-BB6A-9239E29F4416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F53875-D589-4C34-B863-67AC9945BED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B313B0E-4200-427F-A156-1EDA681F439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C49821-3BA5-4B44-84F5-113024FD030F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2011F264-53A5-4507-843B-46F66D285ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73FB7BAF-7B3E-4091-A90B-FB19B38FFE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2DA09B-CFBA-4FDE-A6D0-7C2CF202D72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE2EE9B-D44E-430D-8469-1DF0ADC322B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6B45EB-97BB-4683-9092-95E560B2585F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3AA854-0F4D-4B08-A249-B3C19C056D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29F95F5-6957-46F0-A0A2-CCACBBA14F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9EFD6D-A657-4102-982D-7634AC25E75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59593836-990A-4CF1-AFBC-516C4A318641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5479676D-6B3F-4154-B0D4-D2C81E6C941F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F062A64B-7184-49C6-BDF5-8A413B0A85F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574E7C0-95AA-4A24-9470-FA282192D85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F5B88C0-F809-4A58-9708-60C56129142C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF8738F-8D49-47D3-B60D-3145218C9C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D146E0E-59DD-48BD-9A74-4E4823590E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4FB5698-3AEA-4246-A677-7DB3DE73605D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56190201-887B-4157-9323-AAAA1CD86F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7AA7A9-F4DB-4BC1-9233-F72B66191F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D8C893-BA42-4EE5-A790-13614A6B436F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"339ACF13-0E1F-48D6-9939-96B16AE857CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"074A5E58-A066-470B-840A-1148A8979DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF2C556-48E6-4572-8FD9-4DC8BAD90B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAD792D-70DB-4123-8BCC-B6890A9BCAA8\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/96161\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1037797\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41369/\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securityfocus.com/bid/96161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1037797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41369/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.