CVE-2017-3849
Vulnerability from cvelistv5
Published
2017-03-21 16:00
Modified
2024-08-05 14:39
Severity ?
EPSS score ?
Summary
A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco IOS and IOS XE |
Version: Cisco IOS and IOS XE |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani" }, { "name": "96972", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96972" }, { "name": "1038064", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038064" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Denial of Service Vulnerability", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani" }, { "name": "96972", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96972" }, { "name": "1038064", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038064" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-3849", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Denial of Service Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani" }, { "name": "96972", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96972" }, { "name": "1038064", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038064" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-3849", "datePublished": "2017-03-21T16:00:00", "dateReserved": "2016-12-21T00:00:00", "dateUpdated": "2024-08-05T14:39:41.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"757000B2-A8EB-464A-9A2D-EC4D920A0569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B42618DF-F118-41A7-96E5-24C229DA020E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80114F8D-320D-41FF-ADD3-729E250A8CD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"879C4495-3B26-4370-8708-16F5002E37CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F112DE64-0042-4FB9-945D-3107468193E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E027FB12-862F-413E-AA2B-4BBD90AE3650\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A2EB46D-16E0-4C31-8634-C33D70B5381A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5b\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F29B2E6F-ED6C-4568-9042-7A1BD96A9E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB84CE04-F2D0-4A37-B2BA-25126D1824D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63ACFACC-23B7-4EAC-BDC0-E3C403642D88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F3A95D5-157D-4335-87B4-8DA080A496FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D54B325-22D5-4F21-BE28-BE28F6135FBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0444FAA1-6613-45DF-93E2-B19DF8FE157C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B1ED4F8-3B6C-452D-A3D0-D2F1A24AF994\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3836108-E847-4BB6-BFFE-7C81E9D94A10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"237D305E-016D-4E84-827C-44D04E3E0999\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E993A32E-D2AF-4519-B4C9-7F576649D20F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7260A66D-D477-440E-9A87-C05F9BD9E67C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31059ED1-4D82-43D7-8EF7-042125289CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B813F19-1B37-48F4-99EC-05E0CAA861FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37B550C9-B2E4-44EE-8E0B-54D150C69A0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEBBA614-74E7-43C7-8D33-ADF4BD79D477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7A852A3-7CAC-4D35-A583-556D17A0F7E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBF5D54D-4403-4C5E-AA65-9FD8661E283B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4408CD8-DC1D-4102-924B-E9E28FC5CECF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2A39749-3A95-41B6-850B-4D388E6242B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67B663F9-DBF4-4EEE-836D-C83BF99A682A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55E780F3-D378-4201-AC69-79C356EE9CE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28FE5158-FA37-476B-8289-11733BB9AFF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24AE7F08-FB39-4E35-81AD-0186F2A539D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"447FAF3B-8E93-4A2C-A8B1-1A2F7D958754\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9613EE90-A90A-4817-A5A1-F78A9F3BA571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87A96A92-02E7-440C-9E46-0FBE8CE75E44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03F1AEF3-08BD-4CC0-A36A-D26D550853E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DD9FF45-C8C2-42E2-B329-48C037A10521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36CBB93A-A8C8-477E-B530-B0058C3D15B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A259566-AA04-4DE8-900D-865384E56C8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CF70F3C-FAC8-4691-AF95-1B5B828A9D41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF08E7CE-DE01-43B2-A9F0-1CE657E79260\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC500D08-0DE1-4AA8-AE97-0CF17A706430\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1194A7BD-CB51-42CD-96E6-9ACF126DD8CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB52603C-CED4-4330-BB53-DDDFEA83882A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F40A87C1-5EDB-4B50-84CF-729F5037E870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42C9B84C-F9DC-4F9E-82F2-04004D539C36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E246B9E-F93F-4BB2-9BA4-438FCC4A711B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE884ADE-FD51-4F10-89A8-D871E7407C83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)sn:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C84498B4-7002-44D1-B2B7-B43F3081D258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F61B07A-7933-476F-951A-AD0019D2443D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41939712-5075-4924-ABF2-467430B37197\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7CBC8C7-E3B2-4659-9B47-C0F16817F46A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E25B3DC-B9A7-4DFC-8566-3F790F460DDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"679DCA8C-F64B-4716-BCC9-9C461A89CB29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF662E36-0831-4892-850F-844B0E0B54DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E71F49D-E405-4AB4-9188-DA7B338DFD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"700D0D31-138B-4F9A-8C76-3AF8B9D2C59C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B843CEE5-4D53-414D-95C7-4BA515818E87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)sn:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12D439A6-E8A8-4389-A7C8-2F4BCB7C3854\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)sp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E903D9F-530D-4597-ABA9-4C1CFB79814B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)sp1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BBF8B70-DFBE-4F6E-83F0-171F03E97606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA55D660-66C6-4278-8C27-25DB2712CC1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8320F23D-F6BE-405B-B645-1CEB984E8267\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7C5C705-6A8C-4834-9D24-CFE26A232C15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A56AE607-0AD0-487A-A266-C15EAF40F2CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"705971E9-7FB4-43EA-A1AE-C91865EADE16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F481A851-D607-4CEF-87C5-147FFBC97D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"355F4945-4FFA-469F-A799-815F371C637B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1432B59F-5A66-4A5A-B3F7-E297700ED9C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"013DD522-1561-4468-A350-C872B78FC291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6907E1FE-760E-4557-A472-1A1F0052B82B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62291CDD-A775-44B4-85F3-CE1D494F55FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"658EDFE2-6EC8-4DD3-AACA-C168F942712A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9EC727B-AF92-460D-B61D-F45ECEEE5D56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5604A84-8240-45B6-9027-B03AA549CD5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D9F45C-E71F-4425-A0C7-DFFEEC93C152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48B351B3-3A18-4068-A95D-68942955070E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A005E0C-A744-4AFA-A1D1-2E3228E093FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DED25B1B-C47A-45E9-8235-081550FB0AD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86B7EC67-B431-4284-8781-9090D134B781\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3598539F-0EEB-45D6-8BA5-A2A3F69D556C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CF349D4-BF1C-4127-B6FA-7AD379F62A3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6ABE123-BBA5-46CD-8578-4A1F3CB8BA08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD674BF9-16F6-4817-9ADE-564A402A5F06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DA3731-E719-4DB7-9783-1C00481141EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DAC081C-9A22-4CBC-A9D0-DD9995801791\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43F819E-3072-430F-8C52-B43FF28D4687\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09A930B7-7B9B-426E-A296-9F29F4A03F5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"309952D7-B220-4678-A16D-AA5FF005F782\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60C5FC5B-BE2E-4BAC-AC23-58666BDEB553\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"278ACF0A-949B-486D-8F6C-ADC2AF25FC17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37A30BA4-D760-4321-AAC8-04093AAAEA3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42616EA2-DDCF-4B57-BF2A-37968C82DDC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"246251E8-7D4E-4CD4-8D4F-BF360780FA36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09F35F75-75E8-4A20-94C4-5908E404C8CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C01C1D8-A191-45B7-A6C5-EE225F05A49E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16D7ACF1-6A30-4D6E-AA69-D2F365E2791C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E50FF89-8E71-4EA0-9AEC-2F800ED9D995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F6E9386-30B4-4E86-9676-E7E005274048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E70C455-E41C-4B17-847A-5F4281139252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DD0A60B-6848-4B9A-B11D-2C2952D2D48C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64A07329-3A7D-4483-AE69-4786FEB23D92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F84E4463-DB0F-4B06-B403-B3606B386F02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E61E0102-B9B6-41F4-9041-0A5F144D849A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A076E1F-3457-410A-8AB6-64416ECB20A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2972E680-5A19-4858-9B35-0B959ED319A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BFE916-916F-4936-A331-21A0E8193920\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C5484A4-D116-4B79-8369-47979E20AACA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5568EABF-8F43-4A87-8DE4-A03E9065BE53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51E1A64A-204D-4567-A2DC-EFEB2AE62B54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"970FD986-6D0E-441C-9BF3-C66A25763A7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EEFD3AD-EFA2-4808-801E-B98E4C63AA76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1826C997-6D5D-480E-A12E-3048B6C61216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D136C95-F837-49AD-82B3-81C25F68D0EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C35B3F96-B342-4AFC-A511-7A735B961ECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DED2D791-4142-4B9E-8401-6B63357536B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FBEF4B2-EA12-445A-823E-E0E5343A405E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"844E7CEC-5CB6-47AE-95F7-75693347C08E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AEF94C7-CEE6-4696-9F1D-549639A831C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"876767C7-0196-4226-92B1-DDE851B53655\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0141D67B-632F-48ED-8837-4CC799616C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE390091-D382-4436-BBB4-D4C33E4F6714\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C18E6308-7A34-43E3-9AD8-5FB52B31ACB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80EE163D-D9EC-46A1-826A-54F8F3A3FFBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06BBE88E-FEFB-4B90-91D1-4F053FA0EA47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD8CCA19-1D1C-45C0-A1A0-CED5885AD580\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA08C168-48BE-41ED-A3BD-87BAE27A1351\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la Autonomic Networking Infrastructure (ANI) registrar caracter\\u00edstica de software Cisco IOS (posiblemente 15.2 en versiones hasta 15.6) y software Cisco IOS XE (posiblemente 3.7 en versiones hasta 3.18 y 16) podr\\u00eda permitir a un atacante no autenticado y adyacente provocar una denegaci\\u00f3n de servicio (DoS). La vulnerabilidad se debe a la validaci\\u00f3n incompleta de entrada en ciertos paquetes creados. Un atacante podr\\u00eda explotar esta vulnerabilidad mediante el env\\u00edo de un paquete de descubrimiento de canal de red auton\\u00f3mico a un dispositivo que tiene todas las caracter\\u00edsticas siguientes: (1) funcionamiento a Cisco IOS Software o software Cisco IOS XE que admita la funci\\u00f3n ANI; (2) configurado como registrador auton\\u00f3mico; (3) tiene una lista blanca configurada. Un explotaci\\u00f3n podr\\u00eda permitir al atacante hacer que el dispositivo afectado se volviera a cargar. Nota: Las redes aut\\u00f3nomas deben configurarse con una lista blanca. No elimine la lista blanca como soluci\\u00f3n. Cisco Bug IDs: CSCvc42717.\"}]", "id": "CVE-2017-3849", "lastModified": "2024-11-21T03:26:14.290", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 6.1, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-03-21T16:59:00.227", "references": "[{\"url\": \"http://www.securityfocus.com/bid/96972\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038064\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/96972\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038064\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-3849\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2017-03-21T16:59:00.227\",\"lastModified\":\"2024-11-21T03:26:14.290\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la Autonomic Networking Infrastructure (ANI) registrar caracter\u00edstica de software Cisco IOS (posiblemente 15.2 en versiones hasta 15.6) y software Cisco IOS XE (posiblemente 3.7 en versiones hasta 3.18 y 16) podr\u00eda permitir a un atacante no autenticado y adyacente provocar una denegaci\u00f3n de servicio (DoS). La vulnerabilidad se debe a la validaci\u00f3n incompleta de entrada en ciertos paquetes creados. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete de descubrimiento de canal de red auton\u00f3mico a un dispositivo que tiene todas las caracter\u00edsticas siguientes: (1) funcionamiento a Cisco IOS Software o software Cisco IOS XE que admita la funci\u00f3n ANI; (2) configurado como registrador auton\u00f3mico; (3) tiene una lista blanca configurada. Un explotaci\u00f3n podr\u00eda permitir al atacante hacer que el dispositivo afectado se volviera a cargar. Nota: Las redes aut\u00f3nomas deben configurarse con una lista blanca. No elimine la lista blanca como soluci\u00f3n. Cisco Bug IDs: CSCvc42717.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80114F8D-320D-41FF-ADD3-729E250A8CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879C4495-3B26-4370-8708-16F5002E37CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2EB46D-16E0-4C31-8634-C33D70B5381A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29B2E6F-ED6C-4568-9042-7A1BD96A9E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB84CE04-F2D0-4A37-B2BA-25126D1824D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63ACFACC-23B7-4EAC-BDC0-E3C403642D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3A95D5-157D-4335-87B4-8DA080A496FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D54B325-22D5-4F21-BE28-BE28F6135FBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0444FAA1-6613-45DF-93E2-B19DF8FE157C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B1ED4F8-3B6C-452D-A3D0-D2F1A24AF994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3836108-E847-4BB6-BFFE-7C81E9D94A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237D305E-016D-4E84-827C-44D04E3E0999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993A32E-D2AF-4519-B4C9-7F576649D20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7260A66D-D477-440E-9A87-C05F9BD9E67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31059ED1-4D82-43D7-8EF7-042125289CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B813F19-1B37-48F4-99EC-05E0CAA861FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B550C9-B2E4-44EE-8E0B-54D150C69A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEBBA614-74E7-43C7-8D33-ADF4BD79D477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7A852A3-7CAC-4D35-A583-556D17A0F7E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBF5D54D-4403-4C5E-AA65-9FD8661E283B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4408CD8-DC1D-4102-924B-E9E28FC5CECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A39749-3A95-41B6-850B-4D388E6242B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B663F9-DBF4-4EEE-836D-C83BF99A682A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55E780F3-D378-4201-AC69-79C356EE9CE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28FE5158-FA37-476B-8289-11733BB9AFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24AE7F08-FB39-4E35-81AD-0186F2A539D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"447FAF3B-8E93-4A2C-A8B1-1A2F7D958754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9613EE90-A90A-4817-A5A1-F78A9F3BA571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A96A92-02E7-440C-9E46-0FBE8CE75E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F1AEF3-08BD-4CC0-A36A-D26D550853E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DD9FF45-C8C2-42E2-B329-48C037A10521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36CBB93A-A8C8-477E-B530-B0058C3D15B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A259566-AA04-4DE8-900D-865384E56C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CF70F3C-FAC8-4691-AF95-1B5B828A9D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF08E7CE-DE01-43B2-A9F0-1CE657E79260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC500D08-0DE1-4AA8-AE97-0CF17A706430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1194A7BD-CB51-42CD-96E6-9ACF126DD8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB52603C-CED4-4330-BB53-DDDFEA83882A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40A87C1-5EDB-4B50-84CF-729F5037E870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42C9B84C-F9DC-4F9E-82F2-04004D539C36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E246B9E-F93F-4BB2-9BA4-438FCC4A711B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE884ADE-FD51-4F10-89A8-D871E7407C83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)sn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84498B4-7002-44D1-B2B7-B43F3081D258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F61B07A-7933-476F-951A-AD0019D2443D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41939712-5075-4924-ABF2-467430B37197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CBC8C7-E3B2-4659-9B47-C0F16817F46A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E25B3DC-B9A7-4DFC-8566-3F790F460DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679DCA8C-F64B-4716-BCC9-9C461A89CB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF662E36-0831-4892-850F-844B0E0B54DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E71F49D-E405-4AB4-9188-DA7B338DFD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700D0D31-138B-4F9A-8C76-3AF8B9D2C59C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B843CEE5-4D53-414D-95C7-4BA515818E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)sn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D439A6-E8A8-4389-A7C8-2F4BCB7C3854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E903D9F-530D-4597-ABA9-4C1CFB79814B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)sp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBF8B70-DFBE-4F6E-83F0-171F03E97606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA55D660-66C6-4278-8C27-25DB2712CC1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8320F23D-F6BE-405B-B645-1CEB984E8267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C5C705-6A8C-4834-9D24-CFE26A232C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56AE607-0AD0-487A-A266-C15EAF40F2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"705971E9-7FB4-43EA-A1AE-C91865EADE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F481A851-D607-4CEF-87C5-147FFBC97D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355F4945-4FFA-469F-A799-815F371C637B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1432B59F-5A66-4A5A-B3F7-E297700ED9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"013DD522-1561-4468-A350-C872B78FC291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6907E1FE-760E-4557-A472-1A1F0052B82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62291CDD-A775-44B4-85F3-CE1D494F55FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658EDFE2-6EC8-4DD3-AACA-C168F942712A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9EC727B-AF92-460D-B61D-F45ECEEE5D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5604A84-8240-45B6-9027-B03AA549CD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D9F45C-E71F-4425-A0C7-DFFEEC93C152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B351B3-3A18-4068-A95D-68942955070E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A005E0C-A744-4AFA-A1D1-2E3228E093FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED25B1B-C47A-45E9-8235-081550FB0AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B7EC67-B431-4284-8781-9090D134B781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3598539F-0EEB-45D6-8BA5-A2A3F69D556C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF349D4-BF1C-4127-B6FA-7AD379F62A3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6ABE123-BBA5-46CD-8578-4A1F3CB8BA08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD674BF9-16F6-4817-9ADE-564A402A5F06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DA3731-E719-4DB7-9783-1C00481141EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAC081C-9A22-4CBC-A9D0-DD9995801791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43F819E-3072-430F-8C52-B43FF28D4687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09A930B7-7B9B-426E-A296-9F29F4A03F5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309952D7-B220-4678-A16D-AA5FF005F782\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60C5FC5B-BE2E-4BAC-AC23-58666BDEB553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"278ACF0A-949B-486D-8F6C-ADC2AF25FC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A30BA4-D760-4321-AAC8-04093AAAEA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42616EA2-DDCF-4B57-BF2A-37968C82DDC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246251E8-7D4E-4CD4-8D4F-BF360780FA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09F35F75-75E8-4A20-94C4-5908E404C8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C01C1D8-A191-45B7-A6C5-EE225F05A49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D7ACF1-6A30-4D6E-AA69-D2F365E2791C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E50FF89-8E71-4EA0-9AEC-2F800ED9D995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6E9386-30B4-4E86-9676-E7E005274048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E70C455-E41C-4B17-847A-5F4281139252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD0A60B-6848-4B9A-B11D-2C2952D2D48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A07329-3A7D-4483-AE69-4786FEB23D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84E4463-DB0F-4B06-B403-B3606B386F02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E0102-B9B6-41F4-9041-0A5F144D849A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A076E1F-3457-410A-8AB6-64416ECB20A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2972E680-5A19-4858-9B35-0B959ED319A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BFE916-916F-4936-A331-21A0E8193920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C5484A4-D116-4B79-8369-47979E20AACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5568EABF-8F43-4A87-8DE4-A03E9065BE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E1A64A-204D-4567-A2DC-EFEB2AE62B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970FD986-6D0E-441C-9BF3-C66A25763A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEFD3AD-EFA2-4808-801E-B98E4C63AA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1826C997-6D5D-480E-A12E-3048B6C61216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D136C95-F837-49AD-82B3-81C25F68D0EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B3F96-B342-4AFC-A511-7A735B961ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED2D791-4142-4B9E-8401-6B63357536B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBEF4B2-EA12-445A-823E-E0E5343A405E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844E7CEC-5CB6-47AE-95F7-75693347C08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEF94C7-CEE6-4696-9F1D-549639A831C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"876767C7-0196-4226-92B1-DDE851B53655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0141D67B-632F-48ED-8837-4CC799616C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE390091-D382-4436-BBB4-D4C33E4F6714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18E6308-7A34-43E3-9AD8-5FB52B31ACB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80EE163D-D9EC-46A1-826A-54F8F3A3FFBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06BBE88E-FEFB-4B90-91D1-4F053FA0EA47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8CCA19-1D1C-45C0-A1A0-CED5885AD580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA08C168-48BE-41ED-A3BD-87BAE27A1351\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/96972\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038064\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96972\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038064\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.