Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0159 (GCVE-0-2018-0159)
Vulnerability from cvelistv5 – Published: 2018-03-28 22:00 – Updated: 2026-01-12 21:55| URL | Tags |
|---|---|
| http://www.securityfocus.com/bid/103562 | vdb-entryx_refsource_BID |
| http://www.securitytracker.com/id/1040595 | vdb-entryx_refsource_SECTRACK |
| https://tools.cisco.com/security/center/content/C… | x_refsource_CONFIRM |
| Vendor | Product | Version | |
|---|---|---|---|
| n/a | Cisco IOS and IOS XE |
Affected:
Cisco IOS and IOS XE
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-20 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | IOS Software and Cisco IOS XE Software |
| Due Date | 2022-03-17 |
| Date Added | 2022-03-03 |
| Vendorproject | Cisco |
| Vulnerabilityname | Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:14:16.871Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "103562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103562"
},
{
"name": "1040595",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040595"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2018-0159",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T17:26:39.180557Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-03-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-12T21:55:25.443Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS and IOS XE",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco IOS and IOS XE"
}
]
}
],
"datePublic": "2018-03-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-04T09:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "103562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103562"
},
{
"name": "1040595",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040595"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0159",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS and IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103562"
},
{
"name": "1040595",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040595"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-0159",
"datePublished": "2018-03-28T22:00:00.000Z",
"dateReserved": "2017-11-27T00:00:00.000Z",
"dateUpdated": "2026-01-12T21:55:25.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2018-0159",
"cwes": "[\"CWE-20\"]",
"dateAdded": "2022-03-03",
"dueDate": "2022-03-17",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2018-0159",
"product": "IOS Software and Cisco IOS XE Software",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial-of-service (DoS) condition.",
"vendorProject": "Cisco",
"vulnerabilityName": "Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability"
},
"epss": {
"cve": "CVE-2018-0159",
"date": "2026-05-14",
"epss": "0.06968",
"percentile": "0.91528"
},
"fkie_nvd": {
"cisaActionDue": "2022-03-17",
"cisaExploitAdd": "2022-03-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability",
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB84CE04-F2D0-4A37-B2BA-25126D1824D8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6279A69-2F9D-4CD9-9C19-62E701C3C4F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDB1A95C-8513-4CC7-8CDF-012B212FF02F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2A515C-797D-47EE-8051-F3FBE417BCE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E673A75F-EFF8-4591-8E0F-A21083563DBA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C03D362E-8431-46D9-A214-9BF421299095\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D49393A-23B1-4B8A-8057-BA08745C9764\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FD4E0EA-5F54-4916-B379-5FDA231BC6A7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA69BC08-9866-4B72-8491-A8E3FFCEF541\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABE8D4E6-7906-4680-A1DF-71FF3D43716F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6279A69-2F9D-4CD9-9C19-62E701C3C4F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDB1A95C-8513-4CC7-8CDF-012B212FF02F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2A515C-797D-47EE-8051-F3FBE417BCE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E673A75F-EFF8-4591-8E0F-A21083563DBA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C03D362E-8431-46D9-A214-9BF421299095\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D49393A-23B1-4B8A-8057-BA08745C9764\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FD4E0EA-5F54-4916-B379-5FDA231BC6A7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA69BC08-9866-4B72-8491-A8E3FFCEF541\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la implementaci\\u00f3n de la funcionalidad Internet Key Exchange Version 1 (IKEv1) de Cisco IOS Software y Cisco IOS XE Software podr\\u00eda permitir que un atacante remoto no autenticado provoque el reinicio de un dispositivo afectado, lo que da como resultado una denegaci\\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la validaci\\u00f3n incorrecta de paquetes IKEv1 espec\\u00edficos. Un atacante podr\\u00eda explotar esta vulnerabilidad enviando paquetes IKEv1 manipulados al dispositivo afectado durante una negociaci\\u00f3n IKE. Un exploit con \\u00e9xito, podr\\u00eda permitir que el atacante consiga que el dispositivo afectado se reinicie, lo que provoca una denegaci\\u00f3n de servicio. Cisco Bug IDs: CSCuj73916.\"}]",
"id": "CVE-2018-0159",
"lastModified": "2024-11-21T03:37:38.063",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-03-28T22:29:00.593",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/103562\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1040595\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/103562\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1040595\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-0159\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2018-03-28T22:29:00.593\",\"lastModified\":\"2026-01-14T18:44:13.093\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la implementaci\u00f3n de la funcionalidad Internet Key Exchange Version 1 (IKEv1) de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado provoque el reinicio de un dispositivo afectado, lo que da como resultado una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la validaci\u00f3n incorrecta de paquetes IKEv1 espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes IKEv1 manipulados al dispositivo afectado durante una negociaci\u00f3n IKE. Un exploit con \u00e9xito, podr\u00eda permitir que el atacante consiga que el dispositivo afectado se reinicie, lo que provoca una denegaci\u00f3n de servicio. Cisco Bug IDs: CSCuj73916.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-03-03\",\"cisaActionDue\":\"2022-03-17\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability\",\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB84CE04-F2D0-4A37-B2BA-25126D1824D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6279A69-2F9D-4CD9-9C19-62E701C3C4F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB1A95C-8513-4CC7-8CDF-012B212FF02F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2A515C-797D-47EE-8051-F3FBE417BCE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E673A75F-EFF8-4591-8E0F-A21083563DBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03D362E-8431-46D9-A214-9BF421299095\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D49393A-23B1-4B8A-8057-BA08745C9764\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD4E0EA-5F54-4916-B379-5FDA231BC6A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA69BC08-9866-4B72-8491-A8E3FFCEF541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE8D4E6-7906-4680-A1DF-71FF3D43716F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6279A69-2F9D-4CD9-9C19-62E701C3C4F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB1A95C-8513-4CC7-8CDF-012B212FF02F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2A515C-797D-47EE-8051-F3FBE417BCE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E673A75F-EFF8-4591-8E0F-A21083563DBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03D362E-8431-46D9-A214-9BF421299095\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D49393A-23B1-4B8A-8057-BA08745C9764\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD4E0EA-5F54-4916-B379-5FDA231BC6A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA69BC08-9866-4B72-8491-A8E3FFCEF541\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103562\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040595\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.securityfocus.com/bid/103562\", \"name\": \"103562\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1040595\", \"name\": \"1040595\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T03:14:16.871Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2018-0159\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T17:26:39.180557Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-03-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159\"}}}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159\", \"tags\": [\"government-resource\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T16:06:35.527Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Cisco IOS and IOS XE\", \"versions\": [{\"status\": \"affected\", \"version\": \"Cisco IOS and IOS XE\"}]}], \"datePublic\": \"2018-03-28T00:00:00.000Z\", \"references\": [{\"url\": \"http://www.securityfocus.com/bid/103562\", \"name\": \"103562\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://www.securitytracker.com/id/1040595\", \"name\": \"1040595\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2018-04-04T09:57:01.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Cisco IOS and IOS XE\"}]}, \"product_name\": \"Cisco IOS and IOS XE\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.securityfocus.com/bid/103562\", \"name\": \"103562\", \"refsource\": \"BID\"}, {\"url\": \"http://www.securitytracker.com/id/1040595\", \"name\": \"1040595\", \"refsource\": \"SECTRACK\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\", \"name\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2018-0159\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2018-0159\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-12T21:55:25.443Z\", \"dateReserved\": \"2017-11-27T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2018-03-28T22:00:00.000Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CISCO-SA-20180328-IKE-DOS
Vulnerability from csaf_cisco - Published: 2018-03-28 16:00 - Updated: 2022-12-15 22:19| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
15.1(2)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YF2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(21a)M1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XY4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25e)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(18b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XK3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XY5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(18e)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XO1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T15
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)MD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10b)JDE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XW2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)TPC11b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XJ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(16)MR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25g)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XJ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YU1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI10a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3i)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)JA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XS2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T5b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3j)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI3e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XZ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(19)MR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)MRB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3h)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)YE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YT1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)XB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10b)JDD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XS1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI2c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)SW1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T5f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7h)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(19)MR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XZ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XW3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23e)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(16)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XK1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX2d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YC3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(19)MR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XQ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)MR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YK1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YK2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XH1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YS1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)XB3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8g
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YI2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10b)JDA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX2b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(19)MR3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(18d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(19)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13e)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XU5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI1b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3g)JMC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI7a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI10b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YS2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12)MR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)JA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T5e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)GC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XU2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI7b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI3d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(21)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI1c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)MR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)XB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI2b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)TPC11a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XW1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YI3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(33)STE0
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(16b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(19b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)XB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(16)MR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)JX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)ZA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(16a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YI1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI3a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T13b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)SW3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XK4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX2e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XT1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7f)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YF3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)MR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ2c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)SW2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XN1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(18)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)XL1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XN2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YL2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(21a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX2c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T5c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XV1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YF4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI3b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12)MR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XK
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XW1b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10b)JDC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XU4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13f)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(25f)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(18c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(5c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YK3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T14
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XU3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MDA6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XW1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YL1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ2b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XA5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T16
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YZ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(8d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)XL3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XK2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)MD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)TO3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)ZB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)XL2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3g)JMB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YF1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(17a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XT2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(18a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(17b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)ZB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7g)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3g)JMA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)MRB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23b)M1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3g)JMC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3g)JMC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(5a)M0
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(21a)JHC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)MR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XR10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S3a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)GC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)GC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M0b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)S4a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T3e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(23c)JY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(22)XR12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XQ2d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MD7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T17
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)GC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)GC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW8a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)GC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M3a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T3f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)SW9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)GC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)XB8a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)GC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4g
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4h
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)GC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4i
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4j
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)S
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)GC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4k
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB14
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4l
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(1)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)GC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB15
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4m
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDA13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S3a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EJ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4n
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SC1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB16
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)GC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)JN
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T4o
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(2)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB17
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S4a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EK
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)XB12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)CG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB18
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EK1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EJ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)S1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)GC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)GC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)MDB19
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)S2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)S7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)CG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)JAZ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M6b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)GC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS8a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)S3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG1b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YS10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)GC3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2b)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2a)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY4a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2a)EX5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG1c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SY6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2a)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3a)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SY0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(1)S4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3m)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SY1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)S8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)M11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2a)SE9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3m)E7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(4)M12a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)M8a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)S8a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3m)E8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE10a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E5b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SY11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)MD1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)YG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)JAA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)MR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH4a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI31a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI31b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI3b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI3c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVJ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVJ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG11a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVS
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVS1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVW1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU20
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU21
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(9)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)T4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3e)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(8)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)JX4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)JX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YZ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)T10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(5b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)ZB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)ZA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XP
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XH
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XQ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XS
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)XX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YH
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YI
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(33)ZW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)XL
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YK
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YQ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YT
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(14)YU
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(2)XF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)YE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(4)XN
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XI
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XJ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XL
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(7)XM
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)YD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(8)JK
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(1)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(1a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(1b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(1c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)SW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)MR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(2)XB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3f)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(4)XD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(5)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(5a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(8a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(8b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YL
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.3(11)YS
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XJ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12)MR
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(14)XK
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(6)XT
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7d)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(3g)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(8c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)XF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(10b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(11)XV
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(12b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13a)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13b)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(13c)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(15)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(7e)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(20)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(17)
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)M1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.4(24)T3
Cisco / IOS
|
— |
Vendor Fix
fix
|
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r\nThe vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos\"]\r\n\r\nThis advisory is part of the March 28, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 20 Cisco Security Advisories that describe 22 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-66682\"].",
"title": "Summary"
},
{
"category": "general",
"text": "This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS Software or Cisco IOS XE Software and have the Internet Security Association and Key Management Protocol (ISAKMP) enabled.\r\n\r\nFor information about which Cisco IOS and IOS XE Software releases are vulnerable, see the Fixed Software [\"#fixed\"] section of this advisory.\r\n\r\nAlthough only IKEv1 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable if ISAKMP is enabled. A device configured with IKEv1 or IKEv2 is vulnerable because either configuration will process the malformed packet.\r\n\r\nMany features use IKE, including different types of VPNs such as the following:\r\n\r\nLAN-to-LAN VPN\r\nRemote-access VPN, excluding SSL VPN\r\nDynamic Multipoint VPN (DMVPN)\r\nFlexVPN\r\nGroup Encrypted Transport VPN (GET VPN)\r\n Determining Whether IKE Is Enabled\r\nTo determine whether a device is configured for IKE, administrators can use the show ip sockets or show udp EXEC command in the CLI. If UDP port 500, UDP port 848, UDP port 4500, or UDP port 4848 is open on a device, the device is processing IKE packets.\r\n\r\nThe following example shows the output of the show udp command on a device that is processing IKE packets on UDP port 500 and UDP port 4500, using either IP Version 4 (IPv4) or IP Version 6 (IPv6):\r\n\r\n\r\nrouter# show udp\r\n Proto Remote Port Local Port In Out Stat TTY OutputIF 17 --listen-- 192.168.130.21 500 0 0 1001011 0 17(v6) --listen-- UNKNOWN 500 0 0 1020011 0 17 --listen-- 192.168.130.21 4500 0 0 1001011 0 17(v6) --listen-- UNKNOWN 4500 0 0 1020011 0 . . . router#\r\n\r\nDetermining the Cisco IOS Software Release\r\nTo determine which Cisco IOS Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software. The banner also displays the installed image name in parentheses, followed by the Cisco IOS Software release number and release name. Some Cisco devices do not support the show version command or may provide different output.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS Software Release 15.5(2)T1 and has an installed image name of C2951-UNIVERSALK9-M:\r\n\r\n\r\nRouter\u003e show version\r\n Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2015 by Cisco Systems, Inc. Compiled Mon 22-Jun-15 09:32 by prod_rel_team . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS Software releases, see the Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].\r\n Determining the Cisco IOS XE Software Release\r\nTo determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M:\r\n\r\n\r\nios-xe-device# show version\r\n Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2016 by Cisco Systems, Inc. Compiled Sun 27-Mar-16 21:47 by mcpre . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS XE Software releases, see the Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "No other Cisco products are currently known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco IOS XR Software or Cisco NX-OS Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Cisco IOS Software and Cisco IOS XE Software support IKE for IPv4 and IPv6 communications. IKE communications can use the following UDP ports:\r\n\r\nUDP port 500\r\nUDP port 848, Group Domain of Interpretation (GDOI)\r\nUDP port 4500, Network Address Translation Traversal (NAT-T)\r\nUDP port 4848, GDOI NAT-T\r\n\r\nAn attacker could exploit this vulnerability by using IPv4 or IPv6 on any of the UDP ports in the preceding list.",
"title": "Details"
},
{
"category": "general",
"text": "A successful exploit of this vulnerability will cause an affected device to reload and generate a crashinfo file. Contact the Cisco Technical Assistance Center (TAC) to review the crashinfo file and determine whether the device has been compromised by exploitation of this vulnerability.\r\n\r\nA successful exploit of this vulnerability may be confirmed by decoding the stack trace for the device and determining whether the stack trace correlates with this vulnerability.",
"title": "Indicators of Compromise"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n\r\nCustomers Without Service Contracts\r\n\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides a tool, the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"], that identifies any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use this tool to perform the following tasks:\r\n\r\nInitiate a search by choosing one or more releases from a drop-down list or uploading a file from a local system for the tool to parse\r\nEnter the output of the show version command for the tool to parse\r\nCreate a custom search by including all previously published Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication\r\n\r\nTo determine whether a release is affected by any published Cisco Security Advisory, use the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] on Cisco.com or enter a Cisco IOS Software or Cisco IOS XE Software release-for example, 15.1(4)M2 or 3.13.8S-in the following field:\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "In March 2022, the Cisco Product Security Incident Response Team (PSIRT) became aware of additional attempted exploitation of this vulnerability in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"category": "external",
"summary": "Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-66682"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"category": "external",
"summary": "Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-66682"
},
{
"category": "external",
"summary": "Cisco IOS and NX-OS Software Reference Guide",
"url": "https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html"
},
{
"category": "external",
"summary": "Cisco IOS and NX-OS Software Reference Guide",
"url": "https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco IOS Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco IOS Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco IOS XE 2 Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"
},
{
"category": "external",
"summary": "Cisco IOS XE 3S Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"
},
{
"category": "external",
"summary": "Cisco IOS XE 3SG Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability",
"tracking": {
"current_release_date": "2022-12-15T22:19:56+00:00",
"generator": {
"date": "2022-12-15T22:20:36+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-20180328-ike-dos",
"initial_release_date": "2018-03-28T16:00:00+00:00",
"revision_history": [
{
"date": "2018-03-28T14:42:51+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2022-12-15T22:19:56+00:00",
"number": "1.1.0",
"summary": "Updated exploitation information."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)T",
"product": {
"name": "12.3(11)T",
"product_id": "CSAFPID-58331"
}
},
{
"category": "service_pack",
"name": "12.3(7)T12",
"product": {
"name": "12.3(7)T12",
"product_id": "CSAFPID-62555"
}
},
{
"category": "service_pack",
"name": "12.3(11)T11",
"product": {
"name": "12.3(11)T11",
"product_id": "CSAFPID-62570"
}
},
{
"category": "service_pack",
"name": "12.3(11)T10",
"product": {
"name": "12.3(11)T10",
"product_id": "CSAFPID-62622"
}
},
{
"category": "service_pack",
"name": "12.3(14)T7",
"product": {
"name": "12.3(14)T7",
"product_id": "CSAFPID-62623"
}
},
{
"category": "service_pack",
"name": "12.3(14)T",
"product": {
"name": "12.3(14)T",
"product_id": "CSAFPID-63197"
}
},
{
"category": "service_pack",
"name": "12.3(8)T",
"product": {
"name": "12.3(8)T",
"product_id": "CSAFPID-63378"
}
},
{
"category": "service_pack",
"name": "12.3(4)T",
"product": {
"name": "12.3(4)T",
"product_id": "CSAFPID-63498"
}
},
{
"category": "service_pack",
"name": "12.3(7)T",
"product": {
"name": "12.3(7)T",
"product_id": "CSAFPID-65513"
}
},
{
"category": "service_pack",
"name": "12.3(8)T9",
"product": {
"name": "12.3(8)T9",
"product_id": "CSAFPID-103573"
}
},
{
"category": "service_pack",
"name": "12.3(11)T2a",
"product": {
"name": "12.3(11)T2a",
"product_id": "CSAFPID-103638"
}
},
{
"category": "service_pack",
"name": "12.3(8)T6",
"product": {
"name": "12.3(8)T6",
"product_id": "CSAFPID-103777"
}
},
{
"category": "service_pack",
"name": "12.3(4)T2a",
"product": {
"name": "12.3(4)T2a",
"product_id": "CSAFPID-103824"
}
},
{
"category": "service_pack",
"name": "12.3(4)T9",
"product": {
"name": "12.3(4)T9",
"product_id": "CSAFPID-103893"
}
},
{
"category": "service_pack",
"name": "12.3(14)T4",
"product": {
"name": "12.3(14)T4",
"product_id": "CSAFPID-104136"
}
},
{
"category": "service_pack",
"name": "12.3(4)T4",
"product": {
"name": "12.3(4)T4",
"product_id": "CSAFPID-104146"
}
},
{
"category": "service_pack",
"name": "12.3(8)T2",
"product": {
"name": "12.3(8)T2",
"product_id": "CSAFPID-104266"
}
},
{
"category": "service_pack",
"name": "12.3(11)T5",
"product": {
"name": "12.3(11)T5",
"product_id": "CSAFPID-104381"
}
},
{
"category": "service_pack",
"name": "12.3(7)T3",
"product": {
"name": "12.3(7)T3",
"product_id": "CSAFPID-104448"
}
},
{
"category": "service_pack",
"name": "12.3(8)T3",
"product": {
"name": "12.3(8)T3",
"product_id": "CSAFPID-104481"
}
},
{
"category": "service_pack",
"name": "12.3(4)T7",
"product": {
"name": "12.3(4)T7",
"product_id": "CSAFPID-104486"
}
},
{
"category": "service_pack",
"name": "12.3(8)T7",
"product": {
"name": "12.3(8)T7",
"product_id": "CSAFPID-104500"
}
},
{
"category": "service_pack",
"name": "12.3(11)T8",
"product": {
"name": "12.3(11)T8",
"product_id": "CSAFPID-104612"
}
},
{
"category": "service_pack",
"name": "12.3(7)T2",
"product": {
"name": "12.3(7)T2",
"product_id": "CSAFPID-104657"
}
},
{
"category": "service_pack",
"name": "12.3(8)T4",
"product": {
"name": "12.3(8)T4",
"product_id": "CSAFPID-104802"
}
},
{
"category": "service_pack",
"name": "12.3(8)T8",
"product": {
"name": "12.3(8)T8",
"product_id": "CSAFPID-104854"
}
},
{
"category": "service_pack",
"name": "12.3(14)T5",
"product": {
"name": "12.3(14)T5",
"product_id": "CSAFPID-104979"
}
},
{
"category": "service_pack",
"name": "12.3(11)T3",
"product": {
"name": "12.3(11)T3",
"product_id": "CSAFPID-104980"
}
},
{
"category": "service_pack",
"name": "12.3(4)T10",
"product": {
"name": "12.3(4)T10",
"product_id": "CSAFPID-104996"
}
},
{
"category": "service_pack",
"name": "12.3(8)T10",
"product": {
"name": "12.3(8)T10",
"product_id": "CSAFPID-105116"
}
},
{
"category": "service_pack",
"name": "12.3(14)T2",
"product": {
"name": "12.3(14)T2",
"product_id": "CSAFPID-105272"
}
},
{
"category": "service_pack",
"name": "12.3(4)T2",
"product": {
"name": "12.3(4)T2",
"product_id": "CSAFPID-105274"
}
},
{
"category": "service_pack",
"name": "12.3(7)T7",
"product": {
"name": "12.3(7)T7",
"product_id": "CSAFPID-105369"
}
},
{
"category": "service_pack",
"name": "12.3(7)T10",
"product": {
"name": "12.3(7)T10",
"product_id": "CSAFPID-105523"
}
},
{
"category": "service_pack",
"name": "12.3(7)T4",
"product": {
"name": "12.3(7)T4",
"product_id": "CSAFPID-105720"
}
},
{
"category": "service_pack",
"name": "12.3(11)T6",
"product": {
"name": "12.3(11)T6",
"product_id": "CSAFPID-105748"
}
},
{
"category": "service_pack",
"name": "12.3(7)T11",
"product": {
"name": "12.3(7)T11",
"product_id": "CSAFPID-105808"
}
},
{
"category": "service_pack",
"name": "12.3(4)T6",
"product": {
"name": "12.3(4)T6",
"product_id": "CSAFPID-105888"
}
},
{
"category": "service_pack",
"name": "12.3(4)T3",
"product": {
"name": "12.3(4)T3",
"product_id": "CSAFPID-106064"
}
},
{
"category": "service_pack",
"name": "12.3(14)T3",
"product": {
"name": "12.3(14)T3",
"product_id": "CSAFPID-106094"
}
},
{
"category": "service_pack",
"name": "12.3(11)T4",
"product": {
"name": "12.3(11)T4",
"product_id": "CSAFPID-106304"
}
},
{
"category": "service_pack",
"name": "12.3(7)T9",
"product": {
"name": "12.3(7)T9",
"product_id": "CSAFPID-106391"
}
},
{
"category": "service_pack",
"name": "12.3(8)T11",
"product": {
"name": "12.3(8)T11",
"product_id": "CSAFPID-106421"
}
},
{
"category": "service_pack",
"name": "12.3(8)T0a",
"product": {
"name": "12.3(8)T0a",
"product_id": "CSAFPID-106794"
}
},
{
"category": "service_pack",
"name": "12.3(11)T9",
"product": {
"name": "12.3(11)T9",
"product_id": "CSAFPID-106983"
}
},
{
"category": "service_pack",
"name": "12.3(7)T8",
"product": {
"name": "12.3(7)T8",
"product_id": "CSAFPID-107066"
}
},
{
"category": "service_pack",
"name": "12.3(4)T1",
"product": {
"name": "12.3(4)T1",
"product_id": "CSAFPID-107131"
}
},
{
"category": "service_pack",
"name": "12.3(8)T5",
"product": {
"name": "12.3(8)T5",
"product_id": "CSAFPID-107238"
}
},
{
"category": "service_pack",
"name": "12.3(4)T11",
"product": {
"name": "12.3(4)T11",
"product_id": "CSAFPID-107350"
}
},
{
"category": "service_pack",
"name": "12.3(4)T8",
"product": {
"name": "12.3(4)T8",
"product_id": "CSAFPID-107354"
}
},
{
"category": "service_pack",
"name": "12.3(14)T1",
"product": {
"name": "12.3(14)T1",
"product_id": "CSAFPID-107367"
}
},
{
"category": "service_pack",
"name": "12.3(11)T2",
"product": {
"name": "12.3(11)T2",
"product_id": "CSAFPID-107382"
}
},
{
"category": "service_pack",
"name": "12.3(7)T6",
"product": {
"name": "12.3(7)T6",
"product_id": "CSAFPID-107392"
}
},
{
"category": "service_pack",
"name": "12.3(11)T7",
"product": {
"name": "12.3(11)T7",
"product_id": "CSAFPID-107596"
}
},
{
"category": "service_pack",
"name": "12.3(7)T1",
"product": {
"name": "12.3(7)T1",
"product_id": "CSAFPID-107603"
}
},
{
"category": "service_pack",
"name": "12.3(14)T6",
"product": {
"name": "12.3(14)T6",
"product_id": "CSAFPID-107608"
}
},
{
"category": "service_pack",
"name": "12.3(11)T12",
"product": {
"name": "12.3(11)T12",
"product_id": "CSAFPID-107640"
}
},
{
"category": "service_pack",
"name": "12.3(8)T1",
"product": {
"name": "12.3(8)T1",
"product_id": "CSAFPID-107764"
}
}
],
"category": "product_version",
"name": "12.3T"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)XQ",
"product": {
"name": "12.3(4)XQ",
"product_id": "CSAFPID-63380"
}
},
{
"category": "service_pack",
"name": "12.3(4)XQ1",
"product": {
"name": "12.3(4)XQ1",
"product_id": "CSAFPID-105067"
}
}
],
"category": "product_version",
"name": "12.3XQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)XN",
"product": {
"name": "12.3(4)XN",
"product_id": "CSAFPID-65491"
}
},
{
"category": "service_pack",
"name": "12.3(4)XN1",
"product": {
"name": "12.3(4)XN1",
"product_id": "CSAFPID-106465"
}
},
{
"category": "service_pack",
"name": "12.3(4)XN2",
"product": {
"name": "12.3(4)XN2",
"product_id": "CSAFPID-106667"
}
}
],
"category": "product_version",
"name": "12.3XN"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)XL",
"product": {
"name": "12.3(11)XL",
"product_id": "CSAFPID-65434"
}
},
{
"category": "service_pack",
"name": "12.3(7)XL",
"product": {
"name": "12.3(7)XL",
"product_id": "CSAFPID-65511"
}
},
{
"category": "service_pack",
"name": "12.3(11)XL1",
"product": {
"name": "12.3(11)XL1",
"product_id": "CSAFPID-106612"
}
},
{
"category": "service_pack",
"name": "12.3(11)XL3",
"product": {
"name": "12.3(11)XL3",
"product_id": "CSAFPID-107307"
}
},
{
"category": "service_pack",
"name": "12.3(11)XL2",
"product": {
"name": "12.3(11)XL2",
"product_id": "CSAFPID-107394"
}
}
],
"category": "product_version",
"name": "12.3XL"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)XK3",
"product": {
"name": "12.3(4)XK3",
"product_id": "CSAFPID-103862"
}
},
{
"category": "service_pack",
"name": "12.3(4)XK1",
"product": {
"name": "12.3(4)XK1",
"product_id": "CSAFPID-104909"
}
},
{
"category": "service_pack",
"name": "12.3(4)XK4",
"product": {
"name": "12.3(4)XK4",
"product_id": "CSAFPID-106312"
}
},
{
"category": "service_pack",
"name": "12.3(4)XK",
"product": {
"name": "12.3(4)XK",
"product_id": "CSAFPID-106872"
}
},
{
"category": "service_pack",
"name": "12.3(4)XK2",
"product": {
"name": "12.3(4)XK2",
"product_id": "CSAFPID-107314"
}
}
],
"category": "product_version",
"name": "12.3XK"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(7)XJ",
"product": {
"name": "12.3(7)XJ",
"product_id": "CSAFPID-65510"
}
},
{
"category": "service_pack",
"name": "12.3(7)XJ1",
"product": {
"name": "12.3(7)XJ1",
"product_id": "CSAFPID-104083"
}
},
{
"category": "service_pack",
"name": "12.3(7)XJ2",
"product": {
"name": "12.3(7)XJ2",
"product_id": "CSAFPID-104179"
}
}
],
"category": "product_version",
"name": "12.3XJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(7)XI8",
"product": {
"name": "12.3(7)XI8",
"product_id": "CSAFPID-62585"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI",
"product": {
"name": "12.3(7)XI",
"product_id": "CSAFPID-65509"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI7",
"product": {
"name": "12.3(7)XI7",
"product_id": "CSAFPID-103650"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI8d",
"product": {
"name": "12.3(7)XI8d",
"product_id": "CSAFPID-103692"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI10a",
"product": {
"name": "12.3(7)XI10a",
"product_id": "CSAFPID-104230"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI3e",
"product": {
"name": "12.3(7)XI3e",
"product_id": "CSAFPID-104400"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI8a",
"product": {
"name": "12.3(7)XI8a",
"product_id": "CSAFPID-104540"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI2c",
"product": {
"name": "12.3(7)XI2c",
"product_id": "CSAFPID-104651"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI1a",
"product": {
"name": "12.3(7)XI1a",
"product_id": "CSAFPID-104678"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI4",
"product": {
"name": "12.3(7)XI4",
"product_id": "CSAFPID-105225"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI8g",
"product": {
"name": "12.3(7)XI8g",
"product_id": "CSAFPID-105275"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI1",
"product": {
"name": "12.3(7)XI1",
"product_id": "CSAFPID-105434"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI1b",
"product": {
"name": "12.3(7)XI1b",
"product_id": "CSAFPID-105562"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI7a",
"product": {
"name": "12.3(7)XI7a",
"product_id": "CSAFPID-105571"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI10b",
"product": {
"name": "12.3(7)XI10b",
"product_id": "CSAFPID-105575"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI2a",
"product": {
"name": "12.3(7)XI2a",
"product_id": "CSAFPID-105715"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI10",
"product": {
"name": "12.3(7)XI10",
"product_id": "CSAFPID-105753"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI7b",
"product": {
"name": "12.3(7)XI7b",
"product_id": "CSAFPID-105830"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI3d",
"product": {
"name": "12.3(7)XI3d",
"product_id": "CSAFPID-105831"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI1c",
"product": {
"name": "12.3(7)XI1c",
"product_id": "CSAFPID-105857"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI2b",
"product": {
"name": "12.3(7)XI2b",
"product_id": "CSAFPID-105911"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI8f",
"product": {
"name": "12.3(7)XI8f",
"product_id": "CSAFPID-106085"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI3a",
"product": {
"name": "12.3(7)XI3a",
"product_id": "CSAFPID-106141"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI9",
"product": {
"name": "12.3(7)XI9",
"product_id": "CSAFPID-106380"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI3",
"product": {
"name": "12.3(7)XI3",
"product_id": "CSAFPID-106531"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI6",
"product": {
"name": "12.3(7)XI6",
"product_id": "CSAFPID-106582"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI8c",
"product": {
"name": "12.3(7)XI8c",
"product_id": "CSAFPID-106650"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI2",
"product": {
"name": "12.3(7)XI2",
"product_id": "CSAFPID-106751"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI5",
"product": {
"name": "12.3(7)XI5",
"product_id": "CSAFPID-106793"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI3b",
"product": {
"name": "12.3(7)XI3b",
"product_id": "CSAFPID-106854"
}
},
{
"category": "service_pack",
"name": "12.3(7)XI8e",
"product": {
"name": "12.3(7)XI8e",
"product_id": "CSAFPID-107715"
}
}
],
"category": "product_version",
"name": "12.3XI"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)XH",
"product": {
"name": "12.3(4)XH",
"product_id": "CSAFPID-63379"
}
},
{
"category": "service_pack",
"name": "12.3(4)XH1",
"product": {
"name": "12.3(4)XH1",
"product_id": "CSAFPID-105193"
}
}
],
"category": "product_version",
"name": "12.3XH"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)XG",
"product": {
"name": "12.3(4)XG",
"product_id": "CSAFPID-65490"
}
},
{
"category": "service_pack",
"name": "12.3(4)XG3",
"product": {
"name": "12.3(4)XG3",
"product_id": "CSAFPID-104208"
}
},
{
"category": "service_pack",
"name": "12.3(4)XG1",
"product": {
"name": "12.3(4)XG1",
"product_id": "CSAFPID-105348"
}
},
{
"category": "service_pack",
"name": "12.3(4)XG4",
"product": {
"name": "12.3(4)XG4",
"product_id": "CSAFPID-105964"
}
},
{
"category": "service_pack",
"name": "12.3(4)XG2",
"product": {
"name": "12.3(4)XG2",
"product_id": "CSAFPID-106147"
}
},
{
"category": "service_pack",
"name": "12.3(4)XG5",
"product": {
"name": "12.3(4)XG5",
"product_id": "CSAFPID-106745"
}
}
],
"category": "product_version",
"name": "12.3XG"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(2)XF",
"product": {
"name": "12.3(2)XF",
"product_id": "CSAFPID-65471"
}
}
],
"category": "product_version",
"name": "12.3XF"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(2)XE",
"product": {
"name": "12.3(2)XE",
"product_id": "CSAFPID-65470"
}
},
{
"category": "service_pack",
"name": "12.3(2)XE5",
"product": {
"name": "12.3(2)XE5",
"product_id": "CSAFPID-104249"
}
},
{
"category": "service_pack",
"name": "12.3(2)XE2",
"product": {
"name": "12.3(2)XE2",
"product_id": "CSAFPID-104989"
}
},
{
"category": "service_pack",
"name": "12.3(2)XE1",
"product": {
"name": "12.3(2)XE1",
"product_id": "CSAFPID-105834"
}
},
{
"category": "service_pack",
"name": "12.3(2)XE4",
"product": {
"name": "12.3(2)XE4",
"product_id": "CSAFPID-106104"
}
},
{
"category": "service_pack",
"name": "12.3(2)XE3",
"product": {
"name": "12.3(2)XE3",
"product_id": "CSAFPID-107447"
}
}
],
"category": "product_version",
"name": "12.3XE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)XD",
"product": {
"name": "12.3(4)XD",
"product_id": "CSAFPID-63501"
}
},
{
"category": "service_pack",
"name": "12.3(4)XD4",
"product": {
"name": "12.3(4)XD4",
"product_id": "CSAFPID-103502"
}
},
{
"category": "service_pack",
"name": "12.3(4)XD1",
"product": {
"name": "12.3(4)XD1",
"product_id": "CSAFPID-103953"
}
},
{
"category": "service_pack",
"name": "12.3(4)XD3",
"product": {
"name": "12.3(4)XD3",
"product_id": "CSAFPID-106469"
}
},
{
"category": "service_pack",
"name": "12.3(4)XD2",
"product": {
"name": "12.3(4)XD2",
"product_id": "CSAFPID-106716"
}
}
],
"category": "product_version",
"name": "12.3XD"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SE2",
"product": {
"name": "12.2(25)SE2",
"product_id": "CSAFPID-103774"
}
}
],
"category": "product_version",
"name": "12.2SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(7)XM",
"product": {
"name": "12.3(7)XM",
"product_id": "CSAFPID-65514"
}
}
],
"category": "product_version",
"name": "12.3XM"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(7)XR",
"product": {
"name": "12.3(7)XR",
"product_id": "CSAFPID-63381"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR4",
"product": {
"name": "12.3(7)XR4",
"product_id": "CSAFPID-105271"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR3",
"product": {
"name": "12.3(7)XR3",
"product_id": "CSAFPID-105585"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR5",
"product": {
"name": "12.3(7)XR5",
"product_id": "CSAFPID-106081"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR6",
"product": {
"name": "12.3(7)XR6",
"product_id": "CSAFPID-106296"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR1",
"product": {
"name": "12.3(7)XR1",
"product_id": "CSAFPID-106430"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR2",
"product": {
"name": "12.3(7)XR2",
"product_id": "CSAFPID-106853"
}
},
{
"category": "service_pack",
"name": "12.3(7)XR7",
"product": {
"name": "12.3(7)XR7",
"product_id": "CSAFPID-107075"
}
}
],
"category": "product_version",
"name": "12.3XR"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(7)XS",
"product": {
"name": "12.3(7)XS",
"product_id": "CSAFPID-63382"
}
},
{
"category": "service_pack",
"name": "12.3(7)XS2",
"product": {
"name": "12.3(7)XS2",
"product_id": "CSAFPID-104319"
}
},
{
"category": "service_pack",
"name": "12.3(7)XS1",
"product": {
"name": "12.3(7)XS1",
"product_id": "CSAFPID-104577"
}
}
],
"category": "product_version",
"name": "12.3XS"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)XU5",
"product": {
"name": "12.3(8)XU5",
"product_id": "CSAFPID-105503"
}
},
{
"category": "service_pack",
"name": "12.3(8)XU2",
"product": {
"name": "12.3(8)XU2",
"product_id": "CSAFPID-105797"
}
},
{
"category": "service_pack",
"name": "12.3(8)XU4",
"product": {
"name": "12.3(8)XU4",
"product_id": "CSAFPID-106924"
}
},
{
"category": "service_pack",
"name": "12.3(8)XU3",
"product": {
"name": "12.3(8)XU3",
"product_id": "CSAFPID-107104"
}
}
],
"category": "product_version",
"name": "12.3XU"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)XX",
"product": {
"name": "12.3(8)XX",
"product_id": "CSAFPID-63385"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX2a",
"product": {
"name": "12.3(8)XX2a",
"product_id": "CSAFPID-103602"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX2",
"product": {
"name": "12.3(8)XX2",
"product_id": "CSAFPID-103615"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX1",
"product": {
"name": "12.3(8)XX1",
"product_id": "CSAFPID-104533"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX2d",
"product": {
"name": "12.3(8)XX2d",
"product_id": "CSAFPID-104953"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX2b",
"product": {
"name": "12.3(8)XX2b",
"product_id": "CSAFPID-105462"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX2e",
"product": {
"name": "12.3(8)XX2e",
"product_id": "CSAFPID-106351"
}
},
{
"category": "service_pack",
"name": "12.3(8)XX2c",
"product": {
"name": "12.3(8)XX2c",
"product_id": "CSAFPID-106693"
}
}
],
"category": "product_version",
"name": "12.3XX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)XW",
"product": {
"name": "12.3(8)XW",
"product_id": "CSAFPID-63384"
}
},
{
"category": "service_pack",
"name": "12.3(8)XW2",
"product": {
"name": "12.3(8)XW2",
"product_id": "CSAFPID-104048"
}
},
{
"category": "service_pack",
"name": "12.3(8)XW3",
"product": {
"name": "12.3(8)XW3",
"product_id": "CSAFPID-104844"
}
},
{
"category": "service_pack",
"name": "12.3(8)XW1",
"product": {
"name": "12.3(8)XW1",
"product_id": "CSAFPID-105933"
}
},
{
"category": "service_pack",
"name": "12.3(8)XW1b",
"product": {
"name": "12.3(8)XW1b",
"product_id": "CSAFPID-106895"
}
},
{
"category": "service_pack",
"name": "12.3(8)XW1a",
"product": {
"name": "12.3(8)XW1a",
"product_id": "CSAFPID-107157"
}
}
],
"category": "product_version",
"name": "12.3XW"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)YA",
"product": {
"name": "12.3(8)YA",
"product_id": "CSAFPID-63387"
}
},
{
"category": "service_pack",
"name": "12.3(8)YA1",
"product": {
"name": "12.3(8)YA1",
"product_id": "CSAFPID-105482"
}
}
],
"category": "product_version",
"name": "12.3YA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)YD",
"product": {
"name": "12.3(8)YD",
"product_id": "CSAFPID-65518"
}
},
{
"category": "service_pack",
"name": "12.3(8)YD1",
"product": {
"name": "12.3(8)YD1",
"product_id": "CSAFPID-105256"
}
}
],
"category": "product_version",
"name": "12.3YD"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)YE",
"product": {
"name": "12.3(4)YE",
"product_id": "CSAFPID-65488"
}
},
{
"category": "service_pack",
"name": "12.3(4)YE1",
"product": {
"name": "12.3(4)YE1",
"product_id": "CSAFPID-104491"
}
}
],
"category": "product_version",
"name": "12.3YE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)YF",
"product": {
"name": "12.3(11)YF",
"product_id": "CSAFPID-65435"
}
},
{
"category": "service_pack",
"name": "12.3(11)YF2",
"product": {
"name": "12.3(11)YF2",
"product_id": "CSAFPID-103503"
}
},
{
"category": "service_pack",
"name": "12.3(11)YF3",
"product": {
"name": "12.3(11)YF3",
"product_id": "CSAFPID-106437"
}
},
{
"category": "service_pack",
"name": "12.3(11)YF4",
"product": {
"name": "12.3(11)YF4",
"product_id": "CSAFPID-106773"
}
},
{
"category": "service_pack",
"name": "12.3(11)YF1",
"product": {
"name": "12.3(11)YF1",
"product_id": "CSAFPID-107542"
}
}
],
"category": "product_version",
"name": "12.3YF"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)YH",
"product": {
"name": "12.3(8)YH",
"product_id": "CSAFPID-63388"
}
}
],
"category": "product_version",
"name": "12.3YH"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)YG",
"product": {
"name": "12.3(8)YG",
"product_id": "CSAFPID-63204"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG7",
"product": {
"name": "12.3(8)YG7",
"product_id": "CSAFPID-103553"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG5",
"product": {
"name": "12.3(8)YG5",
"product_id": "CSAFPID-104584"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG3",
"product": {
"name": "12.3(8)YG3",
"product_id": "CSAFPID-106324"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG6",
"product": {
"name": "12.3(8)YG6",
"product_id": "CSAFPID-106523"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG2",
"product": {
"name": "12.3(8)YG2",
"product_id": "CSAFPID-107099"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG1",
"product": {
"name": "12.3(8)YG1",
"product_id": "CSAFPID-107335"
}
},
{
"category": "service_pack",
"name": "12.3(8)YG4",
"product": {
"name": "12.3(8)YG4",
"product_id": "CSAFPID-107559"
}
}
],
"category": "product_version",
"name": "12.3YG"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)YC",
"product": {
"name": "12.3(8)YC",
"product_id": "CSAFPID-65517"
}
},
{
"category": "service_pack",
"name": "12.3(8)YC2",
"product": {
"name": "12.3(8)YC2",
"product_id": "CSAFPID-104788"
}
},
{
"category": "service_pack",
"name": "12.3(8)YC3",
"product": {
"name": "12.3(8)YC3",
"product_id": "CSAFPID-104955"
}
},
{
"category": "service_pack",
"name": "12.3(8)YC1",
"product": {
"name": "12.3(8)YC1",
"product_id": "CSAFPID-107671"
}
}
],
"category": "product_version",
"name": "12.3YC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)YL",
"product": {
"name": "12.3(11)YL",
"product_id": "CSAFPID-65899"
}
},
{
"category": "service_pack",
"name": "12.3(11)YL2",
"product": {
"name": "12.3(11)YL2",
"product_id": "CSAFPID-106672"
}
},
{
"category": "service_pack",
"name": "12.3(11)YL1",
"product": {
"name": "12.3(11)YL1",
"product_id": "CSAFPID-107160"
}
}
],
"category": "product_version",
"name": "12.3YL"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)YI",
"product": {
"name": "12.3(8)YI",
"product_id": "CSAFPID-63389"
}
},
{
"category": "service_pack",
"name": "12.3(8)YI2",
"product": {
"name": "12.3(8)YI2",
"product_id": "CSAFPID-105307"
}
},
{
"category": "service_pack",
"name": "12.3(8)YI3",
"product": {
"name": "12.3(8)YI3",
"product_id": "CSAFPID-105967"
}
},
{
"category": "service_pack",
"name": "12.3(8)YI1",
"product": {
"name": "12.3(8)YI1",
"product_id": "CSAFPID-106128"
}
}
],
"category": "product_version",
"name": "12.3YI"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)YK",
"product": {
"name": "12.3(11)YK",
"product_id": "CSAFPID-65437"
}
},
{
"category": "service_pack",
"name": "12.3(11)YK1",
"product": {
"name": "12.3(11)YK1",
"product_id": "CSAFPID-105113"
}
},
{
"category": "service_pack",
"name": "12.3(11)YK2",
"product": {
"name": "12.3(11)YK2",
"product_id": "CSAFPID-105174"
}
},
{
"category": "service_pack",
"name": "12.3(11)YK3",
"product": {
"name": "12.3(11)YK3",
"product_id": "CSAFPID-107016"
}
}
],
"category": "product_version",
"name": "12.3YK"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)JA3",
"product": {
"name": "12.3(11)JA3",
"product_id": "CSAFPID-104280"
}
},
{
"category": "service_pack",
"name": "12.3(11)JA2",
"product": {
"name": "12.3(11)JA2",
"product_id": "CSAFPID-105637"
}
}
],
"category": "product_version",
"name": "12.3JA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(14)YQ8",
"product": {
"name": "12.3(14)YQ8",
"product_id": "CSAFPID-62616"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ",
"product": {
"name": "12.3(14)YQ",
"product_id": "CSAFPID-65453"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ5",
"product": {
"name": "12.3(14)YQ5",
"product_id": "CSAFPID-103494"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ4",
"product": {
"name": "12.3(14)YQ4",
"product_id": "CSAFPID-103773"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ7",
"product": {
"name": "12.3(14)YQ7",
"product_id": "CSAFPID-104386"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ1",
"product": {
"name": "12.3(14)YQ1",
"product_id": "CSAFPID-106385"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ6",
"product": {
"name": "12.3(14)YQ6",
"product_id": "CSAFPID-106433"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ3",
"product": {
"name": "12.3(14)YQ3",
"product_id": "CSAFPID-106713"
}
},
{
"category": "service_pack",
"name": "12.3(14)YQ2",
"product": {
"name": "12.3(14)YQ2",
"product_id": "CSAFPID-107136"
}
}
],
"category": "product_version",
"name": "12.3YQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)YR",
"product": {
"name": "12.3(11)YR",
"product_id": "CSAFPID-65439"
}
},
{
"category": "service_pack",
"name": "12.3(11)YR1",
"product": {
"name": "12.3(11)YR1",
"product_id": "CSAFPID-105391"
}
}
],
"category": "product_version",
"name": "12.3YR"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)YS",
"product": {
"name": "12.3(11)YS",
"product_id": "CSAFPID-65900"
}
},
{
"category": "service_pack",
"name": "12.3(11)YS1",
"product": {
"name": "12.3(11)YS1",
"product_id": "CSAFPID-105234"
}
},
{
"category": "service_pack",
"name": "12.3(11)YS2",
"product": {
"name": "12.3(11)YS2",
"product_id": "CSAFPID-105588"
}
}
],
"category": "product_version",
"name": "12.3YS"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(3e)",
"product": {
"name": "12.4(3e)",
"product_id": "CSAFPID-62573"
}
},
{
"category": "service_pack",
"name": "12.4(7b)",
"product": {
"name": "12.4(7b)",
"product_id": "CSAFPID-62574"
}
},
{
"category": "service_pack",
"name": "12.4(8)",
"product": {
"name": "12.4(8)",
"product_id": "CSAFPID-62603"
}
},
{
"category": "service_pack",
"name": "12.4(5b)",
"product": {
"name": "12.4(5b)",
"product_id": "CSAFPID-62625"
}
},
{
"category": "service_pack",
"name": "12.4(7a)",
"product": {
"name": "12.4(7a)",
"product_id": "CSAFPID-62626"
}
},
{
"category": "service_pack",
"name": "12.4(3d)",
"product": {
"name": "12.4(3d)",
"product_id": "CSAFPID-63198"
}
},
{
"category": "service_pack",
"name": "12.4(1)",
"product": {
"name": "12.4(1)",
"product_id": "CSAFPID-65527"
}
},
{
"category": "service_pack",
"name": "12.4(1a)",
"product": {
"name": "12.4(1a)",
"product_id": "CSAFPID-65528"
}
},
{
"category": "service_pack",
"name": "12.4(1b)",
"product": {
"name": "12.4(1b)",
"product_id": "CSAFPID-65529"
}
},
{
"category": "service_pack",
"name": "12.4(1c)",
"product": {
"name": "12.4(1c)",
"product_id": "CSAFPID-65530"
}
},
{
"category": "service_pack",
"name": "12.4(10)",
"product": {
"name": "12.4(10)",
"product_id": "CSAFPID-65532"
}
},
{
"category": "service_pack",
"name": "12.4(3)",
"product": {
"name": "12.4(3)",
"product_id": "CSAFPID-65542"
}
},
{
"category": "service_pack",
"name": "12.4(3a)",
"product": {
"name": "12.4(3a)",
"product_id": "CSAFPID-65543"
}
},
{
"category": "service_pack",
"name": "12.4(3b)",
"product": {
"name": "12.4(3b)",
"product_id": "CSAFPID-65544"
}
},
{
"category": "service_pack",
"name": "12.4(3c)",
"product": {
"name": "12.4(3c)",
"product_id": "CSAFPID-65545"
}
},
{
"category": "service_pack",
"name": "12.4(3f)",
"product": {
"name": "12.4(3f)",
"product_id": "CSAFPID-65546"
}
},
{
"category": "service_pack",
"name": "12.4(5)",
"product": {
"name": "12.4(5)",
"product_id": "CSAFPID-65552"
}
},
{
"category": "service_pack",
"name": "12.4(5a)",
"product": {
"name": "12.4(5a)",
"product_id": "CSAFPID-65554"
}
},
{
"category": "service_pack",
"name": "12.4(7c)",
"product": {
"name": "12.4(7c)",
"product_id": "CSAFPID-65559"
}
},
{
"category": "service_pack",
"name": "12.4(7)",
"product": {
"name": "12.4(7)",
"product_id": "CSAFPID-65560"
}
},
{
"category": "service_pack",
"name": "12.4(8a)",
"product": {
"name": "12.4(8a)",
"product_id": "CSAFPID-65561"
}
},
{
"category": "service_pack",
"name": "12.4(8b)",
"product": {
"name": "12.4(8b)",
"product_id": "CSAFPID-65562"
}
},
{
"category": "service_pack",
"name": "12.4(7d)",
"product": {
"name": "12.4(7d)",
"product_id": "CSAFPID-66207"
}
},
{
"category": "service_pack",
"name": "12.4(3g)",
"product": {
"name": "12.4(3g)",
"product_id": "CSAFPID-66213"
}
},
{
"category": "service_pack",
"name": "12.4(8c)",
"product": {
"name": "12.4(8c)",
"product_id": "CSAFPID-66328"
}
},
{
"category": "service_pack",
"name": "12.4(10b)",
"product": {
"name": "12.4(10b)",
"product_id": "CSAFPID-69755"
}
},
{
"category": "service_pack",
"name": "12.4(12)",
"product": {
"name": "12.4(12)",
"product_id": "CSAFPID-69757"
}
},
{
"category": "service_pack",
"name": "12.4(12a)",
"product": {
"name": "12.4(12a)",
"product_id": "CSAFPID-69758"
}
},
{
"category": "service_pack",
"name": "12.4(12b)",
"product": {
"name": "12.4(12b)",
"product_id": "CSAFPID-69759"
}
},
{
"category": "service_pack",
"name": "12.4(13)",
"product": {
"name": "12.4(13)",
"product_id": "CSAFPID-69760"
}
},
{
"category": "service_pack",
"name": "12.4(13a)",
"product": {
"name": "12.4(13a)",
"product_id": "CSAFPID-69761"
}
},
{
"category": "service_pack",
"name": "12.4(13b)",
"product": {
"name": "12.4(13b)",
"product_id": "CSAFPID-69762"
}
},
{
"category": "service_pack",
"name": "12.4(13c)",
"product": {
"name": "12.4(13c)",
"product_id": "CSAFPID-69763"
}
},
{
"category": "service_pack",
"name": "12.4(7e)",
"product": {
"name": "12.4(7e)",
"product_id": "CSAFPID-69776"
}
},
{
"category": "service_pack",
"name": "12.4(17)",
"product": {
"name": "12.4(17)",
"product_id": "CSAFPID-83376"
}
},
{
"category": "service_pack",
"name": "12.4(25e)",
"product": {
"name": "12.4(25e)",
"product_id": "CSAFPID-103756"
}
},
{
"category": "service_pack",
"name": "12.4(18b)",
"product": {
"name": "12.4(18b)",
"product_id": "CSAFPID-103815"
}
},
{
"category": "service_pack",
"name": "12.4(18e)",
"product": {
"name": "12.4(18e)",
"product_id": "CSAFPID-103886"
}
},
{
"category": "service_pack",
"name": "12.4(25g)",
"product": {
"name": "12.4(25g)",
"product_id": "CSAFPID-104155"
}
},
{
"category": "service_pack",
"name": "12.4(3i)",
"product": {
"name": "12.4(3i)",
"product_id": "CSAFPID-104248"
}
},
{
"category": "service_pack",
"name": "12.4(3j)",
"product": {
"name": "12.4(3j)",
"product_id": "CSAFPID-104369"
}
},
{
"category": "service_pack",
"name": "12.4(23b)",
"product": {
"name": "12.4(23b)",
"product_id": "CSAFPID-104474"
}
},
{
"category": "service_pack",
"name": "12.4(3h)",
"product": {
"name": "12.4(3h)",
"product_id": "CSAFPID-104487"
}
},
{
"category": "service_pack",
"name": "12.4(7h)",
"product": {
"name": "12.4(7h)",
"product_id": "CSAFPID-104670"
}
},
{
"category": "service_pack",
"name": "12.4(25a)",
"product": {
"name": "12.4(25a)",
"product_id": "CSAFPID-104692"
}
},
{
"category": "service_pack",
"name": "12.4(23d)",
"product": {
"name": "12.4(23d)",
"product_id": "CSAFPID-104758"
}
},
{
"category": "service_pack",
"name": "12.4(23e)",
"product": {
"name": "12.4(23e)",
"product_id": "CSAFPID-104846"
}
},
{
"category": "service_pack",
"name": "12.4(16)",
"product": {
"name": "12.4(16)",
"product_id": "CSAFPID-104878"
}
},
{
"category": "service_pack",
"name": "12.4(13d)",
"product": {
"name": "12.4(13d)",
"product_id": "CSAFPID-105034"
}
},
{
"category": "service_pack",
"name": "12.4(25)",
"product": {
"name": "12.4(25)",
"product_id": "CSAFPID-105205"
}
},
{
"category": "service_pack",
"name": "12.4(25c)",
"product": {
"name": "12.4(25c)",
"product_id": "CSAFPID-105393"
}
},
{
"category": "service_pack",
"name": "12.4(18d)",
"product": {
"name": "12.4(18d)",
"product_id": "CSAFPID-105480"
}
},
{
"category": "service_pack",
"name": "12.4(19)",
"product": {
"name": "12.4(19)",
"product_id": "CSAFPID-105484"
}
},
{
"category": "service_pack",
"name": "12.4(13e)",
"product": {
"name": "12.4(13e)",
"product_id": "CSAFPID-105497"
}
},
{
"category": "service_pack",
"name": "12.4(25b)",
"product": {
"name": "12.4(25b)",
"product_id": "CSAFPID-105594"
}
},
{
"category": "service_pack",
"name": "12.4(23)",
"product": {
"name": "12.4(23)",
"product_id": "CSAFPID-105763"
}
},
{
"category": "service_pack",
"name": "12.4(10c)",
"product": {
"name": "12.4(10c)",
"product_id": "CSAFPID-105843"
}
},
{
"category": "service_pack",
"name": "12.4(21)",
"product": {
"name": "12.4(21)",
"product_id": "CSAFPID-105844"
}
},
{
"category": "service_pack",
"name": "12.4(16b)",
"product": {
"name": "12.4(16b)",
"product_id": "CSAFPID-106011"
}
},
{
"category": "service_pack",
"name": "12.4(19b)",
"product": {
"name": "12.4(19b)",
"product_id": "CSAFPID-106056"
}
},
{
"category": "service_pack",
"name": "12.4(16a)",
"product": {
"name": "12.4(16a)",
"product_id": "CSAFPID-106125"
}
},
{
"category": "service_pack",
"name": "12.4(23a)",
"product": {
"name": "12.4(23a)",
"product_id": "CSAFPID-106148"
}
},
{
"category": "service_pack",
"name": "12.4(25d)",
"product": {
"name": "12.4(25d)",
"product_id": "CSAFPID-106357"
}
},
{
"category": "service_pack",
"name": "12.4(23c)",
"product": {
"name": "12.4(23c)",
"product_id": "CSAFPID-106419"
}
},
{
"category": "service_pack",
"name": "12.4(7f)",
"product": {
"name": "12.4(7f)",
"product_id": "CSAFPID-106434"
}
},
{
"category": "service_pack",
"name": "12.4(18)",
"product": {
"name": "12.4(18)",
"product_id": "CSAFPID-106569"
}
},
{
"category": "service_pack",
"name": "12.4(21a)",
"product": {
"name": "12.4(21a)",
"product_id": "CSAFPID-106680"
}
},
{
"category": "service_pack",
"name": "12.4(13f)",
"product": {
"name": "12.4(13f)",
"product_id": "CSAFPID-106945"
}
},
{
"category": "service_pack",
"name": "12.4(25f)",
"product": {
"name": "12.4(25f)",
"product_id": "CSAFPID-106986"
}
},
{
"category": "service_pack",
"name": "12.4(18c)",
"product": {
"name": "12.4(18c)",
"product_id": "CSAFPID-106998"
}
},
{
"category": "service_pack",
"name": "12.4(5c)",
"product": {
"name": "12.4(5c)",
"product_id": "CSAFPID-107012"
}
},
{
"category": "service_pack",
"name": "12.4(8d)",
"product": {
"name": "12.4(8d)",
"product_id": "CSAFPID-107299"
}
},
{
"category": "service_pack",
"name": "12.4(12c)",
"product": {
"name": "12.4(12c)",
"product_id": "CSAFPID-107464"
}
},
{
"category": "service_pack",
"name": "12.4(17a)",
"product": {
"name": "12.4(17a)",
"product_id": "CSAFPID-107558"
}
},
{
"category": "service_pack",
"name": "12.4(18a)",
"product": {
"name": "12.4(18a)",
"product_id": "CSAFPID-107575"
}
},
{
"category": "service_pack",
"name": "12.4(17b)",
"product": {
"name": "12.4(17b)",
"product_id": "CSAFPID-107597"
}
},
{
"category": "service_pack",
"name": "12.4(7g)",
"product": {
"name": "12.4(7g)",
"product_id": "CSAFPID-107747"
}
}
],
"category": "product_version",
"name": "12.4"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)JK",
"product": {
"name": "12.3(8)JK",
"product_id": "CSAFPID-65520"
}
}
],
"category": "product_version",
"name": "12.3JK"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(14)YU",
"product": {
"name": "12.3(14)YU",
"product_id": "CSAFPID-65455"
}
},
{
"category": "service_pack",
"name": "12.3(14)YU1",
"product": {
"name": "12.3(14)YU1",
"product_id": "CSAFPID-104198"
}
}
],
"category": "product_version",
"name": "12.3YU"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(11)MR",
"product": {
"name": "12.4(11)MR",
"product_id": "CSAFPID-65536"
}
},
{
"category": "service_pack",
"name": "12.4(12)MR",
"product": {
"name": "12.4(12)MR",
"product_id": "CSAFPID-66058"
}
},
{
"category": "service_pack",
"name": "12.4(16)MR1",
"product": {
"name": "12.4(16)MR1",
"product_id": "CSAFPID-104138"
}
},
{
"category": "service_pack",
"name": "12.4(19)MR2",
"product": {
"name": "12.4(19)MR2",
"product_id": "CSAFPID-104445"
}
},
{
"category": "service_pack",
"name": "12.4(19)MR1",
"product": {
"name": "12.4(19)MR1",
"product_id": "CSAFPID-104677"
}
},
{
"category": "service_pack",
"name": "12.4(19)MR",
"product": {
"name": "12.4(19)MR",
"product_id": "CSAFPID-105060"
}
},
{
"category": "service_pack",
"name": "12.4(20)MR",
"product": {
"name": "12.4(20)MR",
"product_id": "CSAFPID-105069"
}
},
{
"category": "service_pack",
"name": "12.4(19)MR3",
"product": {
"name": "12.4(19)MR3",
"product_id": "CSAFPID-105463"
}
},
{
"category": "service_pack",
"name": "12.4(12)MR1",
"product": {
"name": "12.4(12)MR1",
"product_id": "CSAFPID-105595"
}
},
{
"category": "service_pack",
"name": "12.4(20)MR2",
"product": {
"name": "12.4(20)MR2",
"product_id": "CSAFPID-105889"
}
},
{
"category": "service_pack",
"name": "12.4(16)MR2",
"product": {
"name": "12.4(16)MR2",
"product_id": "CSAFPID-106096"
}
},
{
"category": "service_pack",
"name": "12.4(12)MR2",
"product": {
"name": "12.4(12)MR2",
"product_id": "CSAFPID-106867"
}
},
{
"category": "service_pack",
"name": "12.4(20)MR1",
"product": {
"name": "12.4(20)MR1",
"product_id": "CSAFPID-230964"
}
}
],
"category": "product_version",
"name": "12.4MR"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(4)T",
"product": {
"name": "12.4(4)T",
"product_id": "CSAFPID-59292"
}
},
{
"category": "service_pack",
"name": "12.4(4)T1",
"product": {
"name": "12.4(4)T1",
"product_id": "CSAFPID-59293"
}
},
{
"category": "service_pack",
"name": "12.4(4)T2",
"product": {
"name": "12.4(4)T2",
"product_id": "CSAFPID-59294"
}
},
{
"category": "service_pack",
"name": "12.4(4)T3",
"product": {
"name": "12.4(4)T3",
"product_id": "CSAFPID-59295"
}
},
{
"category": "service_pack",
"name": "12.4(6)T",
"product": {
"name": "12.4(6)T",
"product_id": "CSAFPID-59296"
}
},
{
"category": "service_pack",
"name": "12.4(6)T1",
"product": {
"name": "12.4(6)T1",
"product_id": "CSAFPID-59297"
}
},
{
"category": "service_pack",
"name": "12.4(6)T2",
"product": {
"name": "12.4(6)T2",
"product_id": "CSAFPID-59298"
}
},
{
"category": "service_pack",
"name": "12.4(9)T",
"product": {
"name": "12.4(9)T",
"product_id": "CSAFPID-59299"
}
},
{
"category": "service_pack",
"name": "12.4(4)T4",
"product": {
"name": "12.4(4)T4",
"product_id": "CSAFPID-62571"
}
},
{
"category": "service_pack",
"name": "12.4(2)T5",
"product": {
"name": "12.4(2)T5",
"product_id": "CSAFPID-62575"
}
},
{
"category": "service_pack",
"name": "12.4(6)T3",
"product": {
"name": "12.4(6)T3",
"product_id": "CSAFPID-62576"
}
},
{
"category": "service_pack",
"name": "12.4(2)T",
"product": {
"name": "12.4(2)T",
"product_id": "CSAFPID-63499"
}
},
{
"category": "service_pack",
"name": "12.4(11)T",
"product": {
"name": "12.4(11)T",
"product_id": "CSAFPID-66054"
}
},
{
"category": "service_pack",
"name": "12.4(15)T",
"product": {
"name": "12.4(15)T",
"product_id": "CSAFPID-69764"
}
},
{
"category": "service_pack",
"name": "12.4(20)T",
"product": {
"name": "12.4(20)T",
"product_id": "CSAFPID-81746"
}
},
{
"category": "service_pack",
"name": "12.4(24)T",
"product": {
"name": "12.4(24)T",
"product_id": "CSAFPID-92384"
}
},
{
"category": "service_pack",
"name": "12.4(24)T3",
"product": {
"name": "12.4(24)T3",
"product_id": "CSAFPID-99647"
}
},
{
"category": "service_pack",
"name": "12.4(4)T8",
"product": {
"name": "12.4(4)T8",
"product_id": "CSAFPID-103531"
}
},
{
"category": "service_pack",
"name": "12.4(20)T1",
"product": {
"name": "12.4(20)T1",
"product_id": "CSAFPID-103543"
}
},
{
"category": "service_pack",
"name": "12.4(22)T1",
"product": {
"name": "12.4(22)T1",
"product_id": "CSAFPID-103595"
}
},
{
"category": "service_pack",
"name": "12.4(15)T9",
"product": {
"name": "12.4(15)T9",
"product_id": "CSAFPID-103631"
}
},
{
"category": "service_pack",
"name": "12.4(11)T4",
"product": {
"name": "12.4(11)T4",
"product_id": "CSAFPID-103735"
}
},
{
"category": "service_pack",
"name": "12.4(15)T8",
"product": {
"name": "12.4(15)T8",
"product_id": "CSAFPID-103946"
}
},
{
"category": "service_pack",
"name": "12.4(6)T5",
"product": {
"name": "12.4(6)T5",
"product_id": "CSAFPID-103968"
}
},
{
"category": "service_pack",
"name": "12.4(15)T15",
"product": {
"name": "12.4(15)T15",
"product_id": "CSAFPID-104005"
}
},
{
"category": "service_pack",
"name": "12.4(24)T5",
"product": {
"name": "12.4(24)T5",
"product_id": "CSAFPID-104167"
}
},
{
"category": "service_pack",
"name": "12.4(15)T2",
"product": {
"name": "12.4(15)T2",
"product_id": "CSAFPID-104190"
}
},
{
"category": "service_pack",
"name": "12.4(6)T8",
"product": {
"name": "12.4(6)T8",
"product_id": "CSAFPID-104247"
}
},
{
"category": "service_pack",
"name": "12.4(6)T5b",
"product": {
"name": "12.4(6)T5b",
"product_id": "CSAFPID-104322"
}
},
{
"category": "service_pack",
"name": "12.4(15)T12",
"product": {
"name": "12.4(15)T12",
"product_id": "CSAFPID-104345"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4",
"product": {
"name": "12.4(24)T4",
"product_id": "CSAFPID-104379"
}
},
{
"category": "service_pack",
"name": "12.4(6)T11",
"product": {
"name": "12.4(6)T11",
"product_id": "CSAFPID-104523"
}
},
{
"category": "service_pack",
"name": "12.4(9)T5",
"product": {
"name": "12.4(9)T5",
"product_id": "CSAFPID-104534"
}
},
{
"category": "service_pack",
"name": "12.4(20)T3",
"product": {
"name": "12.4(20)T3",
"product_id": "CSAFPID-104570"
}
},
{
"category": "service_pack",
"name": "12.4(6)T4",
"product": {
"name": "12.4(6)T4",
"product_id": "CSAFPID-104587"
}
},
{
"category": "service_pack",
"name": "12.4(6)T5f",
"product": {
"name": "12.4(6)T5f",
"product_id": "CSAFPID-104666"
}
},
{
"category": "service_pack",
"name": "12.4(4)T6",
"product": {
"name": "12.4(4)T6",
"product_id": "CSAFPID-104777"
}
},
{
"category": "service_pack",
"name": "12.4(22)T",
"product": {
"name": "12.4(22)T",
"product_id": "CSAFPID-104810"
}
},
{
"category": "service_pack",
"name": "12.4(15)T6a",
"product": {
"name": "12.4(15)T6a",
"product_id": "CSAFPID-104851"
}
},
{
"category": "service_pack",
"name": "12.4(20)T6",
"product": {
"name": "12.4(20)T6",
"product_id": "CSAFPID-104852"
}
},
{
"category": "service_pack",
"name": "12.4(9)T3",
"product": {
"name": "12.4(9)T3",
"product_id": "CSAFPID-104916"
}
},
{
"category": "service_pack",
"name": "12.4(24)T8",
"product": {
"name": "12.4(24)T8",
"product_id": "CSAFPID-105013"
}
},
{
"category": "service_pack",
"name": "12.4(6)T7",
"product": {
"name": "12.4(6)T7",
"product_id": "CSAFPID-105092"
}
},
{
"category": "service_pack",
"name": "12.4(15)T13",
"product": {
"name": "12.4(15)T13",
"product_id": "CSAFPID-105203"
}
},
{
"category": "service_pack",
"name": "12.4(6)T10",
"product": {
"name": "12.4(6)T10",
"product_id": "CSAFPID-105337"
}
},
{
"category": "service_pack",
"name": "12.4(15)T3",
"product": {
"name": "12.4(15)T3",
"product_id": "CSAFPID-105358"
}
},
{
"category": "service_pack",
"name": "12.4(24)T2",
"product": {
"name": "12.4(24)T2",
"product_id": "CSAFPID-105388"
}
},
{
"category": "service_pack",
"name": "12.4(22)T5",
"product": {
"name": "12.4(22)T5",
"product_id": "CSAFPID-105401"
}
},
{
"category": "service_pack",
"name": "12.4(2)T3",
"product": {
"name": "12.4(2)T3",
"product_id": "CSAFPID-105532"
}
},
{
"category": "service_pack",
"name": "12.4(15)T10",
"product": {
"name": "12.4(15)T10",
"product_id": "CSAFPID-105554"
}
},
{
"category": "service_pack",
"name": "12.4(22)T4",
"product": {
"name": "12.4(22)T4",
"product_id": "CSAFPID-105631"
}
},
{
"category": "service_pack",
"name": "12.4(20)T5",
"product": {
"name": "12.4(20)T5",
"product_id": "CSAFPID-105638"
}
},
{
"category": "service_pack",
"name": "12.4(9)T6",
"product": {
"name": "12.4(9)T6",
"product_id": "CSAFPID-105647"
}
},
{
"category": "service_pack",
"name": "12.4(15)T4",
"product": {
"name": "12.4(15)T4",
"product_id": "CSAFPID-105662"
}
},
{
"category": "service_pack",
"name": "12.4(6)T5e",
"product": {
"name": "12.4(6)T5e",
"product_id": "CSAFPID-105683"
}
},
{
"category": "service_pack",
"name": "12.4(2)T4",
"product": {
"name": "12.4(2)T4",
"product_id": "CSAFPID-105716"
}
},
{
"category": "service_pack",
"name": "12.4(24)T1",
"product": {
"name": "12.4(24)T1",
"product_id": "CSAFPID-105745"
}
},
{
"category": "service_pack",
"name": "12.4(9)T4",
"product": {
"name": "12.4(9)T4",
"product_id": "CSAFPID-105754"
}
},
{
"category": "service_pack",
"name": "12.4(24)T7",
"product": {
"name": "12.4(24)T7",
"product_id": "CSAFPID-105773"
}
},
{
"category": "service_pack",
"name": "12.4(22)T3",
"product": {
"name": "12.4(22)T3",
"product_id": "CSAFPID-105848"
}
},
{
"category": "service_pack",
"name": "12.4(20)T9",
"product": {
"name": "12.4(20)T9",
"product_id": "CSAFPID-105850"
}
},
{
"category": "service_pack",
"name": "12.4(9)T1",
"product": {
"name": "12.4(9)T1",
"product_id": "CSAFPID-105958"
}
},
{
"category": "service_pack",
"name": "12.4(24)T6",
"product": {
"name": "12.4(24)T6",
"product_id": "CSAFPID-105983"
}
},
{
"category": "service_pack",
"name": "12.4(6)T9",
"product": {
"name": "12.4(6)T9",
"product_id": "CSAFPID-106062"
}
},
{
"category": "service_pack",
"name": "12.4(6)T12",
"product": {
"name": "12.4(6)T12",
"product_id": "CSAFPID-106091"
}
},
{
"category": "service_pack",
"name": "12.4(15)T13b",
"product": {
"name": "12.4(15)T13b",
"product_id": "CSAFPID-106241"
}
},
{
"category": "service_pack",
"name": "12.4(20)T5a",
"product": {
"name": "12.4(20)T5a",
"product_id": "CSAFPID-106271"
}
},
{
"category": "service_pack",
"name": "12.4(15)T5",
"product": {
"name": "12.4(15)T5",
"product_id": "CSAFPID-106387"
}
},
{
"category": "service_pack",
"name": "12.4(4)T7",
"product": {
"name": "12.4(4)T7",
"product_id": "CSAFPID-106428"
}
},
{
"category": "service_pack",
"name": "12.4(20)T2",
"product": {
"name": "12.4(20)T2",
"product_id": "CSAFPID-106510"
}
},
{
"category": "service_pack",
"name": "12.4(2)T1",
"product": {
"name": "12.4(2)T1",
"product_id": "CSAFPID-106553"
}
},
{
"category": "service_pack",
"name": "12.4(11)T1",
"product": {
"name": "12.4(11)T1",
"product_id": "CSAFPID-106630"
}
},
{
"category": "service_pack",
"name": "12.4(15)T11",
"product": {
"name": "12.4(15)T11",
"product_id": "CSAFPID-106730"
}
},
{
"category": "service_pack",
"name": "12.4(6)T5c",
"product": {
"name": "12.4(6)T5c",
"product_id": "CSAFPID-106735"
}
},
{
"category": "service_pack",
"name": "12.4(2)T6",
"product": {
"name": "12.4(2)T6",
"product_id": "CSAFPID-106756"
}
},
{
"category": "service_pack",
"name": "12.4(9)T0a",
"product": {
"name": "12.4(9)T0a",
"product_id": "CSAFPID-106786"
}
},
{
"category": "service_pack",
"name": "12.4(2)T2",
"product": {
"name": "12.4(2)T2",
"product_id": "CSAFPID-106835"
}
},
{
"category": "service_pack",
"name": "12.4(15)T7",
"product": {
"name": "12.4(15)T7",
"product_id": "CSAFPID-106839"
}
},
{
"category": "service_pack",
"name": "12.4(11)T2",
"product": {
"name": "12.4(11)T2",
"product_id": "CSAFPID-106884"
}
},
{
"category": "service_pack",
"name": "12.4(9)T7",
"product": {
"name": "12.4(9)T7",
"product_id": "CSAFPID-106962"
}
},
{
"category": "service_pack",
"name": "12.4(15)T14",
"product": {
"name": "12.4(15)T14",
"product_id": "CSAFPID-107044"
}
},
{
"category": "service_pack",
"name": "12.4(11)T3",
"product": {
"name": "12.4(11)T3",
"product_id": "CSAFPID-107169"
}
},
{
"category": "service_pack",
"name": "12.4(15)T6",
"product": {
"name": "12.4(15)T6",
"product_id": "CSAFPID-107173"
}
},
{
"category": "service_pack",
"name": "12.4(15)T16",
"product": {
"name": "12.4(15)T16",
"product_id": "CSAFPID-107211"
}
},
{
"category": "service_pack",
"name": "12.4(15)T1",
"product": {
"name": "12.4(15)T1",
"product_id": "CSAFPID-107277"
}
},
{
"category": "service_pack",
"name": "12.4(9)T2",
"product": {
"name": "12.4(9)T2",
"product_id": "CSAFPID-107295"
}
},
{
"category": "service_pack",
"name": "12.4(6)T6",
"product": {
"name": "12.4(6)T6",
"product_id": "CSAFPID-107438"
}
},
{
"category": "service_pack",
"name": "12.4(6)T5a",
"product": {
"name": "12.4(6)T5a",
"product_id": "CSAFPID-107475"
}
},
{
"category": "service_pack",
"name": "12.4(22)T2",
"product": {
"name": "12.4(22)T2",
"product_id": "CSAFPID-107524"
}
},
{
"category": "service_pack",
"name": "12.4(4)T5",
"product": {
"name": "12.4(4)T5",
"product_id": "CSAFPID-107536"
}
},
{
"category": "service_pack",
"name": "12.4(20)T4",
"product": {
"name": "12.4(20)T4",
"product_id": "CSAFPID-107550"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4a",
"product": {
"name": "12.4(24)T4a",
"product_id": "CSAFPID-108177"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4b",
"product": {
"name": "12.4(24)T4b",
"product_id": "CSAFPID-111033"
}
},
{
"category": "service_pack",
"name": "12.4(24)T3e",
"product": {
"name": "12.4(24)T3e",
"product_id": "CSAFPID-111162"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4c",
"product": {
"name": "12.4(24)T4c",
"product_id": "CSAFPID-112247"
}
},
{
"category": "service_pack",
"name": "12.4(15)T17",
"product": {
"name": "12.4(15)T17",
"product_id": "CSAFPID-112564"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4d",
"product": {
"name": "12.4(24)T4d",
"product_id": "CSAFPID-113960"
}
},
{
"category": "service_pack",
"name": "12.4(24)T9",
"product": {
"name": "12.4(24)T9",
"product_id": "CSAFPID-115281"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4e",
"product": {
"name": "12.4(24)T4e",
"product_id": "CSAFPID-115302"
}
},
{
"category": "service_pack",
"name": "12.4(24)T3f",
"product": {
"name": "12.4(24)T3f",
"product_id": "CSAFPID-115340"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4f",
"product": {
"name": "12.4(24)T4f",
"product_id": "CSAFPID-115636"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4g",
"product": {
"name": "12.4(24)T4g",
"product_id": "CSAFPID-116838"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4h",
"product": {
"name": "12.4(24)T4h",
"product_id": "CSAFPID-184092"
}
},
{
"category": "service_pack",
"name": "12.4(24)T10",
"product": {
"name": "12.4(24)T10",
"product_id": "CSAFPID-184887"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4i",
"product": {
"name": "12.4(24)T4i",
"product_id": "CSAFPID-185642"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4j",
"product": {
"name": "12.4(24)T4j",
"product_id": "CSAFPID-186998"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4k",
"product": {
"name": "12.4(24)T4k",
"product_id": "CSAFPID-188501"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4l",
"product": {
"name": "12.4(24)T4l",
"product_id": "CSAFPID-189457"
}
},
{
"category": "service_pack",
"name": "12.4(24)T11",
"product": {
"name": "12.4(24)T11",
"product_id": "CSAFPID-190638"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4m",
"product": {
"name": "12.4(24)T4m",
"product_id": "CSAFPID-190639"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4n",
"product": {
"name": "12.4(24)T4n",
"product_id": "CSAFPID-192041"
}
},
{
"category": "service_pack",
"name": "12.4(24)T12",
"product": {
"name": "12.4(24)T12",
"product_id": "CSAFPID-194509"
}
},
{
"category": "service_pack",
"name": "12.4(24)T4o",
"product": {
"name": "12.4(24)T4o",
"product_id": "CSAFPID-194585"
}
}
],
"category": "product_version",
"name": "12.4T"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(14)YT",
"product": {
"name": "12.3(14)YT",
"product_id": "CSAFPID-65454"
}
},
{
"category": "service_pack",
"name": "12.3(14)YT1",
"product": {
"name": "12.3(14)YT1",
"product_id": "CSAFPID-104514"
}
}
],
"category": "product_version",
"name": "12.3YT"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(7)JX2",
"product": {
"name": "12.3(7)JX2",
"product_id": "CSAFPID-56052"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX",
"product": {
"name": "12.3(7)JX",
"product_id": "CSAFPID-56055"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX1",
"product": {
"name": "12.3(7)JX1",
"product_id": "CSAFPID-56056"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX4",
"product": {
"name": "12.3(7)JX4",
"product_id": "CSAFPID-62613"
}
},
{
"category": "service_pack",
"name": "12.3(11)JX",
"product": {
"name": "12.3(11)JX",
"product_id": "CSAFPID-62614"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX7",
"product": {
"name": "12.3(7)JX7",
"product_id": "CSAFPID-103698"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX12",
"product": {
"name": "12.3(7)JX12",
"product_id": "CSAFPID-104139"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX9",
"product": {
"name": "12.3(7)JX9",
"product_id": "CSAFPID-104378"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX10",
"product": {
"name": "12.3(7)JX10",
"product_id": "CSAFPID-104715"
}
},
{
"category": "service_pack",
"name": "12.3(11)JX1",
"product": {
"name": "12.3(11)JX1",
"product_id": "CSAFPID-106100"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX6",
"product": {
"name": "12.3(7)JX6",
"product_id": "CSAFPID-106594"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX5",
"product": {
"name": "12.3(7)JX5",
"product_id": "CSAFPID-106845"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX3",
"product": {
"name": "12.3(7)JX3",
"product_id": "CSAFPID-107245"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX11",
"product": {
"name": "12.3(7)JX11",
"product_id": "CSAFPID-107661"
}
},
{
"category": "service_pack",
"name": "12.3(7)JX8",
"product": {
"name": "12.3(7)JX8",
"product_id": "CSAFPID-107727"
}
}
],
"category": "product_version",
"name": "12.3JX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(4)TPC11b",
"product": {
"name": "12.3(4)TPC11b",
"product_id": "CSAFPID-104054"
}
},
{
"category": "service_pack",
"name": "12.3(4)TPC11a",
"product": {
"name": "12.3(4)TPC11a",
"product_id": "CSAFPID-105912"
}
}
],
"category": "product_version",
"name": "12.3TPC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(2)XB",
"product": {
"name": "12.4(2)XB",
"product_id": "CSAFPID-65539"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB1",
"product": {
"name": "12.4(2)XB1",
"product_id": "CSAFPID-103843"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB6",
"product": {
"name": "12.4(2)XB6",
"product_id": "CSAFPID-103889"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB7",
"product": {
"name": "12.4(2)XB7",
"product_id": "CSAFPID-104212"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB11",
"product": {
"name": "12.4(2)XB11",
"product_id": "CSAFPID-104304"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB3",
"product": {
"name": "12.4(2)XB3",
"product_id": "CSAFPID-104673"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB9",
"product": {
"name": "12.4(2)XB9",
"product_id": "CSAFPID-104807"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB8",
"product": {
"name": "12.4(2)XB8",
"product_id": "CSAFPID-105022"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB2",
"product": {
"name": "12.4(2)XB2",
"product_id": "CSAFPID-106250"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB10",
"product": {
"name": "12.4(2)XB10",
"product_id": "CSAFPID-106696"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB4",
"product": {
"name": "12.4(2)XB4",
"product_id": "CSAFPID-107329"
}
},
{
"category": "service_pack",
"name": "12.4(2)XB5",
"product": {
"name": "12.4(2)XB5",
"product_id": "CSAFPID-107393"
}
}
],
"category": "product_version",
"name": "12.4XB"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(2)XA",
"product": {
"name": "12.4(2)XA",
"product_id": "CSAFPID-65538"
}
},
{
"category": "service_pack",
"name": "12.4(2)XA1",
"product": {
"name": "12.4(2)XA1",
"product_id": "CSAFPID-103949"
}
},
{
"category": "service_pack",
"name": "12.4(2)XA2",
"product": {
"name": "12.4(2)XA2",
"product_id": "CSAFPID-106896"
}
}
],
"category": "product_version",
"name": "12.4XA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(33)ZW",
"product": {
"name": "12.2(33)ZW",
"product_id": "CSAFPID-63937"
}
}
],
"category": "product_version",
"name": "12.2ZW"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(4)XC",
"product": {
"name": "12.4(4)XC",
"product_id": "CSAFPID-65549"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC1",
"product": {
"name": "12.4(4)XC1",
"product_id": "CSAFPID-103674"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC5",
"product": {
"name": "12.4(4)XC5",
"product_id": "CSAFPID-103715"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC7",
"product": {
"name": "12.4(4)XC7",
"product_id": "CSAFPID-105305"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC3",
"product": {
"name": "12.4(4)XC3",
"product_id": "CSAFPID-105402"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC4",
"product": {
"name": "12.4(4)XC4",
"product_id": "CSAFPID-105635"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC2",
"product": {
"name": "12.4(4)XC2",
"product_id": "CSAFPID-106214"
}
},
{
"category": "service_pack",
"name": "12.4(4)XC6",
"product": {
"name": "12.4(4)XC6",
"product_id": "CSAFPID-107163"
}
}
],
"category": "product_version",
"name": "12.4XC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(4)XD",
"product": {
"name": "12.4(4)XD",
"product_id": "CSAFPID-65551"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD4",
"product": {
"name": "12.4(4)XD4",
"product_id": "CSAFPID-104006"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD10",
"product": {
"name": "12.4(4)XD10",
"product_id": "CSAFPID-104273"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD6",
"product": {
"name": "12.4(4)XD6",
"product_id": "CSAFPID-105144"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD12",
"product": {
"name": "12.4(4)XD12",
"product_id": "CSAFPID-105471"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD2",
"product": {
"name": "12.4(4)XD2",
"product_id": "CSAFPID-105598"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD8",
"product": {
"name": "12.4(4)XD8",
"product_id": "CSAFPID-105707"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD11",
"product": {
"name": "12.4(4)XD11",
"product_id": "CSAFPID-105766"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD1",
"product": {
"name": "12.4(4)XD1",
"product_id": "CSAFPID-105918"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD5",
"product": {
"name": "12.4(4)XD5",
"product_id": "CSAFPID-106017"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD7",
"product": {
"name": "12.4(4)XD7",
"product_id": "CSAFPID-106956"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD3",
"product": {
"name": "12.4(4)XD3",
"product_id": "CSAFPID-106974"
}
},
{
"category": "service_pack",
"name": "12.4(4)XD9",
"product": {
"name": "12.4(4)XD9",
"product_id": "CSAFPID-107693"
}
}
],
"category": "product_version",
"name": "12.4XD"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(6)XE",
"product": {
"name": "12.4(6)XE",
"product_id": "CSAFPID-65557"
}
},
{
"category": "service_pack",
"name": "12.4(6)XE2",
"product": {
"name": "12.4(6)XE2",
"product_id": "CSAFPID-105120"
}
},
{
"category": "service_pack",
"name": "12.4(6)XE1",
"product": {
"name": "12.4(6)XE1",
"product_id": "CSAFPID-106963"
}
}
],
"category": "product_version",
"name": "12.4XE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEF",
"product": {
"name": "12.2(25)SEF",
"product_id": "CSAFPID-60350"
}
}
],
"category": "product_version",
"name": "12.2SEF"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)YZ1",
"product": {
"name": "12.3(11)YZ1",
"product_id": "CSAFPID-62618"
}
},
{
"category": "service_pack",
"name": "12.3(11)YZ",
"product": {
"name": "12.3(11)YZ",
"product_id": "CSAFPID-65440"
}
},
{
"category": "service_pack",
"name": "12.3(11)YZ2",
"product": {
"name": "12.3(11)YZ2",
"product_id": "CSAFPID-107270"
}
}
],
"category": "product_version",
"name": "12.3YZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(11)SW",
"product": {
"name": "12.4(11)SW",
"product_id": "CSAFPID-65535"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW6",
"product": {
"name": "12.4(15)SW6",
"product_id": "CSAFPID-103916"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW",
"product": {
"name": "12.4(15)SW",
"product_id": "CSAFPID-104118"
}
},
{
"category": "service_pack",
"name": "12.4(11)SW1",
"product": {
"name": "12.4(11)SW1",
"product_id": "CSAFPID-104656"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW5",
"product": {
"name": "12.4(15)SW5",
"product_id": "CSAFPID-105618"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW1",
"product": {
"name": "12.4(15)SW1",
"product_id": "CSAFPID-105690"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW4",
"product": {
"name": "12.4(15)SW4",
"product_id": "CSAFPID-105908"
}
},
{
"category": "service_pack",
"name": "12.4(11)SW3",
"product": {
"name": "12.4(11)SW3",
"product_id": "CSAFPID-106243"
}
},
{
"category": "service_pack",
"name": "12.4(11)SW2",
"product": {
"name": "12.4(11)SW2",
"product_id": "CSAFPID-106462"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW3",
"product": {
"name": "12.4(15)SW3",
"product_id": "CSAFPID-106637"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW2",
"product": {
"name": "12.4(15)SW2",
"product_id": "CSAFPID-106888"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW7",
"product": {
"name": "12.4(15)SW7",
"product_id": "CSAFPID-108407"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW8",
"product": {
"name": "12.4(15)SW8",
"product_id": "CSAFPID-112246"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW8a",
"product": {
"name": "12.4(15)SW8a",
"product_id": "CSAFPID-113992"
}
},
{
"category": "service_pack",
"name": "12.4(15)SW9",
"product": {
"name": "12.4(15)SW9",
"product_id": "CSAFPID-115736"
}
}
],
"category": "product_version",
"name": "12.4SW"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(11)XJ",
"product": {
"name": "12.4(11)XJ",
"product_id": "CSAFPID-66055"
}
},
{
"category": "service_pack",
"name": "12.4(11)XJ1",
"product": {
"name": "12.4(11)XJ1",
"product_id": "CSAFPID-104423"
}
},
{
"category": "service_pack",
"name": "12.4(11)XJ3",
"product": {
"name": "12.4(11)XJ3",
"product_id": "CSAFPID-105162"
}
},
{
"category": "service_pack",
"name": "12.4(11)XJ6",
"product": {
"name": "12.4(11)XJ6",
"product_id": "CSAFPID-105376"
}
},
{
"category": "service_pack",
"name": "12.4(11)XJ2",
"product": {
"name": "12.4(11)XJ2",
"product_id": "CSAFPID-105841"
}
},
{
"category": "service_pack",
"name": "12.4(11)XJ5",
"product": {
"name": "12.4(11)XJ5",
"product_id": "CSAFPID-106170"
}
},
{
"category": "service_pack",
"name": "12.4(11)XJ4",
"product": {
"name": "12.4(11)XJ4",
"product_id": "CSAFPID-106969"
}
}
],
"category": "product_version",
"name": "12.4XJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(6)XT",
"product": {
"name": "12.4(6)XT",
"product_id": "CSAFPID-66062"
}
},
{
"category": "service_pack",
"name": "12.4(6)XT1",
"product": {
"name": "12.4(6)XT1",
"product_id": "CSAFPID-106381"
}
},
{
"category": "service_pack",
"name": "12.4(6)XT2",
"product": {
"name": "12.4(6)XT2",
"product_id": "CSAFPID-107566"
}
}
],
"category": "product_version",
"name": "12.4XT"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(6)XP",
"product": {
"name": "12.4(6)XP",
"product_id": "CSAFPID-63196"
}
}
],
"category": "product_version",
"name": "12.4XP"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(11)MD2",
"product": {
"name": "12.4(11)MD2",
"product_id": "CSAFPID-104019"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD1",
"product": {
"name": "12.4(24)MD1",
"product_id": "CSAFPID-104076"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD",
"product": {
"name": "12.4(24)MD",
"product_id": "CSAFPID-104489"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD3",
"product": {
"name": "12.4(15)MD3",
"product_id": "CSAFPID-104522"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD3",
"product": {
"name": "12.4(24)MD3",
"product_id": "CSAFPID-104655"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD2",
"product": {
"name": "12.4(15)MD2",
"product_id": "CSAFPID-104841"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD2",
"product": {
"name": "12.4(24)MD2",
"product_id": "CSAFPID-104990"
}
},
{
"category": "service_pack",
"name": "12.4(22)MD1",
"product": {
"name": "12.4(22)MD1",
"product_id": "CSAFPID-105316"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD5",
"product": {
"name": "12.4(15)MD5",
"product_id": "CSAFPID-105587"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD4",
"product": {
"name": "12.4(15)MD4",
"product_id": "CSAFPID-105875"
}
},
{
"category": "service_pack",
"name": "12.4(22)MD2",
"product": {
"name": "12.4(22)MD2",
"product_id": "CSAFPID-106069"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD5",
"product": {
"name": "12.4(24)MD5",
"product_id": "CSAFPID-106321"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD",
"product": {
"name": "12.4(15)MD",
"product_id": "CSAFPID-106711"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD1",
"product": {
"name": "12.4(15)MD1",
"product_id": "CSAFPID-106941"
}
},
{
"category": "service_pack",
"name": "12.4(22)MD",
"product": {
"name": "12.4(22)MD",
"product_id": "CSAFPID-107316"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD4",
"product": {
"name": "12.4(24)MD4",
"product_id": "CSAFPID-107632"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD6",
"product": {
"name": "12.4(24)MD6",
"product_id": "CSAFPID-110096"
}
},
{
"category": "service_pack",
"name": "12.4(24)MD7",
"product": {
"name": "12.4(24)MD7",
"product_id": "CSAFPID-112158"
}
},
{
"category": "service_pack",
"name": "12.4(15)MD1a",
"product": {
"name": "12.4(15)MD1a",
"product_id": "CSAFPID-230584"
}
}
],
"category": "product_version",
"name": "12.4MD"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(14)XK",
"product": {
"name": "12.4(14)XK",
"product_id": "CSAFPID-66059"
}
}
],
"category": "product_version",
"name": "12.4XK"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(11)XV",
"product": {
"name": "12.4(11)XV",
"product_id": "CSAFPID-69756"
}
},
{
"category": "service_pack",
"name": "12.4(11)XV1",
"product": {
"name": "12.4(11)XV1",
"product_id": "CSAFPID-106757"
}
}
],
"category": "product_version",
"name": "12.4XV "
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(11)XW",
"product": {
"name": "12.4(11)XW",
"product_id": "CSAFPID-66056"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW3",
"product": {
"name": "12.4(11)XW3",
"product_id": "CSAFPID-103926"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW7",
"product": {
"name": "12.4(11)XW7",
"product_id": "CSAFPID-104134"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW10",
"product": {
"name": "12.4(11)XW10",
"product_id": "CSAFPID-104839"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW8",
"product": {
"name": "12.4(11)XW8",
"product_id": "CSAFPID-105481"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW9",
"product": {
"name": "12.4(11)XW9",
"product_id": "CSAFPID-105743"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW6",
"product": {
"name": "12.4(11)XW6",
"product_id": "CSAFPID-106057"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW4",
"product": {
"name": "12.4(11)XW4",
"product_id": "CSAFPID-106340"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW1",
"product": {
"name": "12.4(11)XW1",
"product_id": "CSAFPID-106653"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW5",
"product": {
"name": "12.4(11)XW5",
"product_id": "CSAFPID-107081"
}
},
{
"category": "service_pack",
"name": "12.4(11)XW2",
"product": {
"name": "12.4(11)XW2",
"product_id": "CSAFPID-107428"
}
}
],
"category": "product_version",
"name": "12.4XW"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(3g)JMA1",
"product": {
"name": "12.4(3g)JMA1",
"product_id": "CSAFPID-107751"
}
}
],
"category": "product_version",
"name": "12.4JMA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(15)XF",
"product": {
"name": "12.4(15)XF",
"product_id": "CSAFPID-69484"
}
}
],
"category": "product_version",
"name": "12.4XF"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(15)XQ4",
"product": {
"name": "12.4(15)XQ4",
"product_id": "CSAFPID-104056"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ1",
"product": {
"name": "12.4(15)XQ1",
"product_id": "CSAFPID-104838"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ7",
"product": {
"name": "12.4(15)XQ7",
"product_id": "CSAFPID-105342"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ2a",
"product": {
"name": "12.4(15)XQ2a",
"product_id": "CSAFPID-105366"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ6",
"product": {
"name": "12.4(15)XQ6",
"product_id": "CSAFPID-105590"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ2",
"product": {
"name": "12.4(15)XQ2",
"product_id": "CSAFPID-105664"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ",
"product": {
"name": "12.4(15)XQ",
"product_id": "CSAFPID-105782"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ3",
"product": {
"name": "12.4(15)XQ3",
"product_id": "CSAFPID-105941"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ2c",
"product": {
"name": "12.4(15)XQ2c",
"product_id": "CSAFPID-106456"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ5",
"product": {
"name": "12.4(15)XQ5",
"product_id": "CSAFPID-106861"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ2b",
"product": {
"name": "12.4(15)XQ2b",
"product_id": "CSAFPID-107179"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ8",
"product": {
"name": "12.4(15)XQ8",
"product_id": "CSAFPID-111027"
}
},
{
"category": "service_pack",
"name": "12.4(15)XQ2d",
"product": {
"name": "12.4(15)XQ2d",
"product_id": "CSAFPID-111563"
}
}
],
"category": "product_version",
"name": "12.4XQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(15)XY4",
"product": {
"name": "12.4(15)XY4",
"product_id": "CSAFPID-103564"
}
},
{
"category": "service_pack",
"name": "12.4(15)XY5",
"product": {
"name": "12.4(15)XY5",
"product_id": "CSAFPID-103869"
}
},
{
"category": "service_pack",
"name": "12.4(15)XY1",
"product": {
"name": "12.4(15)XY1",
"product_id": "CSAFPID-105150"
}
},
{
"category": "service_pack",
"name": "12.4(15)XY",
"product": {
"name": "12.4(15)XY",
"product_id": "CSAFPID-105469"
}
},
{
"category": "service_pack",
"name": "12.4(15)XY2",
"product": {
"name": "12.4(15)XY2",
"product_id": "CSAFPID-105930"
}
},
{
"category": "service_pack",
"name": "12.4(15)XY3",
"product": {
"name": "12.4(15)XY3",
"product_id": "CSAFPID-107014"
}
}
],
"category": "product_version",
"name": "12.4XY"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(15)XZ",
"product": {
"name": "12.4(15)XZ",
"product_id": "CSAFPID-104125"
}
},
{
"category": "service_pack",
"name": "12.4(15)XZ2",
"product": {
"name": "12.4(15)XZ2",
"product_id": "CSAFPID-104422"
}
},
{
"category": "service_pack",
"name": "12.4(15)XZ1",
"product": {
"name": "12.4(15)XZ1",
"product_id": "CSAFPID-104734"
}
}
],
"category": "product_version",
"name": "12.4XZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(8)ZA",
"product": {
"name": "12.3(8)ZA",
"product_id": "CSAFPID-63194"
}
},
{
"category": "service_pack",
"name": "12.3(8)ZA1",
"product": {
"name": "12.3(8)ZA1",
"product_id": "CSAFPID-106101"
}
}
],
"category": "product_version",
"name": "12.3ZA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)ZB",
"product": {
"name": "12.3(11)ZB",
"product_id": "CSAFPID-63189"
}
},
{
"category": "service_pack",
"name": "12.3(11)ZB1",
"product": {
"name": "12.3(11)ZB1",
"product_id": "CSAFPID-107379"
}
},
{
"category": "service_pack",
"name": "12.3(11)ZB2",
"product": {
"name": "12.3(11)ZB2",
"product_id": "CSAFPID-107733"
}
}
],
"category": "product_version",
"name": "12.3ZB"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(22)XR5",
"product": {
"name": "12.4(22)XR5",
"product_id": "CSAFPID-103558"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR4",
"product": {
"name": "12.4(22)XR4",
"product_id": "CSAFPID-103931"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR5",
"product": {
"name": "12.4(15)XR5",
"product_id": "CSAFPID-104119"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR2",
"product": {
"name": "12.4(15)XR2",
"product_id": "CSAFPID-104144"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR7",
"product": {
"name": "12.4(22)XR7",
"product_id": "CSAFPID-104641"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR4",
"product": {
"name": "12.4(15)XR4",
"product_id": "CSAFPID-104938"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR1",
"product": {
"name": "12.4(15)XR1",
"product_id": "CSAFPID-105023"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR7",
"product": {
"name": "12.4(15)XR7",
"product_id": "CSAFPID-105181"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR2",
"product": {
"name": "12.4(22)XR2",
"product_id": "CSAFPID-105255"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR9",
"product": {
"name": "12.4(15)XR9",
"product_id": "CSAFPID-105695"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR6",
"product": {
"name": "12.4(15)XR6",
"product_id": "CSAFPID-105966"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR3",
"product": {
"name": "12.4(15)XR3",
"product_id": "CSAFPID-106061"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR",
"product": {
"name": "12.4(15)XR",
"product_id": "CSAFPID-106492"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR6",
"product": {
"name": "12.4(22)XR6",
"product_id": "CSAFPID-106515"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR10",
"product": {
"name": "12.4(22)XR10",
"product_id": "CSAFPID-106546"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR8",
"product": {
"name": "12.4(15)XR8",
"product_id": "CSAFPID-106965"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR1",
"product": {
"name": "12.4(22)XR1",
"product_id": "CSAFPID-107061"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR9",
"product": {
"name": "12.4(22)XR9",
"product_id": "CSAFPID-107207"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR3",
"product": {
"name": "12.4(22)XR3",
"product_id": "CSAFPID-107388"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR8",
"product": {
"name": "12.4(22)XR8",
"product_id": "CSAFPID-107623"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR11",
"product": {
"name": "12.4(22)XR11",
"product_id": "CSAFPID-108305"
}
},
{
"category": "service_pack",
"name": "12.4(15)XR10",
"product": {
"name": "12.4(15)XR10",
"product_id": "CSAFPID-108473"
}
},
{
"category": "service_pack",
"name": "12.4(22)XR12",
"product": {
"name": "12.4(22)XR12",
"product_id": "CSAFPID-111415"
}
}
],
"category": "product_version",
"name": "12.4XR"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(33)STE0",
"product": {
"name": "12.2(33)STE0",
"product_id": "CSAFPID-105999"
}
}
],
"category": "product_version",
"name": "12.2STE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(10b)JDA1",
"product": {
"name": "12.4(10b)JDA1",
"product_id": "CSAFPID-105397"
}
}
],
"category": "product_version",
"name": "12.4JDA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(3g)JMB",
"product": {
"name": "12.4(3g)JMB",
"product_id": "CSAFPID-107399"
}
}
],
"category": "product_version",
"name": "12.4JMB"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(23c)JY",
"product": {
"name": "12.4(23c)JY",
"product_id": "CSAFPID-111406"
}
}
],
"category": "product_version",
"name": "12.4JY"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(10b)JDC",
"product": {
"name": "12.4(10b)JDC",
"product_id": "CSAFPID-106903"
}
}
],
"category": "product_version",
"name": "12.4JDC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(10b)JDD",
"product": {
"name": "12.4(10b)JDD",
"product_id": "CSAFPID-104548"
}
}
],
"category": "product_version",
"name": "12.4JDD"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(24)MDA",
"product": {
"name": "12.4(24)MDA",
"product_id": "CSAFPID-103585"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA3",
"product": {
"name": "12.4(22)MDA3",
"product_id": "CSAFPID-103702"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA5",
"product": {
"name": "12.4(24)MDA5",
"product_id": "CSAFPID-104416"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA5",
"product": {
"name": "12.4(22)MDA5",
"product_id": "CSAFPID-105429"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA3",
"product": {
"name": "12.4(24)MDA3",
"product_id": "CSAFPID-105498"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA4",
"product": {
"name": "12.4(22)MDA4",
"product_id": "CSAFPID-105727"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA4",
"product": {
"name": "12.4(24)MDA4",
"product_id": "CSAFPID-105791"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA1",
"product": {
"name": "12.4(24)MDA1",
"product_id": "CSAFPID-106268"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA",
"product": {
"name": "12.4(22)MDA",
"product_id": "CSAFPID-106363"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA2",
"product": {
"name": "12.4(22)MDA2",
"product_id": "CSAFPID-106661"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA1",
"product": {
"name": "12.4(22)MDA1",
"product_id": "CSAFPID-106792"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA2",
"product": {
"name": "12.4(24)MDA2",
"product_id": "CSAFPID-107043"
}
},
{
"category": "service_pack",
"name": "12.4(22)MDA6",
"product": {
"name": "12.4(22)MDA6",
"product_id": "CSAFPID-107122"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA6",
"product": {
"name": "12.4(24)MDA6",
"product_id": "CSAFPID-108460"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA7",
"product": {
"name": "12.4(24)MDA7",
"product_id": "CSAFPID-110095"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA8",
"product": {
"name": "12.4(24)MDA8",
"product_id": "CSAFPID-111029"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA10",
"product": {
"name": "12.4(24)MDA10",
"product_id": "CSAFPID-111032"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA9",
"product": {
"name": "12.4(24)MDA9",
"product_id": "CSAFPID-111047"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA11",
"product": {
"name": "12.4(24)MDA11",
"product_id": "CSAFPID-111559"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA12",
"product": {
"name": "12.4(24)MDA12",
"product_id": "CSAFPID-115280"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDA13",
"product": {
"name": "12.4(24)MDA13",
"product_id": "CSAFPID-190978"
}
}
],
"category": "product_version",
"name": "12.4MDA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(24)YG3",
"product": {
"name": "12.4(24)YG3",
"product_id": "CSAFPID-106388"
}
},
{
"category": "service_pack",
"name": "12.4(24)YG4",
"product": {
"name": "12.4(24)YG4",
"product_id": "CSAFPID-106560"
}
},
{
"category": "service_pack",
"name": "12.4(24)YG1",
"product": {
"name": "12.4(24)YG1",
"product_id": "CSAFPID-107561"
}
},
{
"category": "service_pack",
"name": "12.4(24)YG2",
"product": {
"name": "12.4(24)YG2",
"product_id": "CSAFPID-107757"
}
},
{
"category": "service_pack",
"name": "12.4(24)YG",
"product": {
"name": "12.4(24)YG",
"product_id": "CSAFPID-230585"
}
}
],
"category": "product_version",
"name": "12.4YG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)M1",
"product": {
"name": "15.0(1)M1",
"product_id": "CSAFPID-99645"
}
},
{
"category": "service_pack",
"name": "15.0(1)M5",
"product": {
"name": "15.0(1)M5",
"product_id": "CSAFPID-104157"
}
},
{
"category": "service_pack",
"name": "15.0(1)M4",
"product": {
"name": "15.0(1)M4",
"product_id": "CSAFPID-105005"
}
},
{
"category": "service_pack",
"name": "15.0(1)M3",
"product": {
"name": "15.0(1)M3",
"product_id": "CSAFPID-105547"
}
},
{
"category": "service_pack",
"name": "15.0(1)M2",
"product": {
"name": "15.0(1)M2",
"product_id": "CSAFPID-105802"
}
},
{
"category": "service_pack",
"name": "15.0(1)M6",
"product": {
"name": "15.0(1)M6",
"product_id": "CSAFPID-106044"
}
},
{
"category": "service_pack",
"name": "15.0(1)M",
"product": {
"name": "15.0(1)M",
"product_id": "CSAFPID-106499"
}
},
{
"category": "service_pack",
"name": "15.0(1)M7",
"product": {
"name": "15.0(1)M7",
"product_id": "CSAFPID-108464"
}
},
{
"category": "service_pack",
"name": "15.0(1)M10",
"product": {
"name": "15.0(1)M10",
"product_id": "CSAFPID-109432"
}
},
{
"category": "service_pack",
"name": "15.0(1)M9",
"product": {
"name": "15.0(1)M9",
"product_id": "CSAFPID-109433"
}
},
{
"category": "service_pack",
"name": "15.0(1)M8",
"product": {
"name": "15.0(1)M8",
"product_id": "CSAFPID-109505"
}
},
{
"category": "service_pack",
"name": "15.0(1)M6a",
"product": {
"name": "15.0(1)M6a",
"product_id": "CSAFPID-111022"
}
}
],
"category": "product_version",
"name": "15.0M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)XA2",
"product": {
"name": "15.0(1)XA2",
"product_id": "CSAFPID-104165"
}
},
{
"category": "service_pack",
"name": "15.0(1)XA4",
"product": {
"name": "15.0(1)XA4",
"product_id": "CSAFPID-105426"
}
},
{
"category": "service_pack",
"name": "15.0(1)XA1",
"product": {
"name": "15.0(1)XA1",
"product_id": "CSAFPID-106082"
}
},
{
"category": "service_pack",
"name": "15.0(1)XA3",
"product": {
"name": "15.0(1)XA3",
"product_id": "CSAFPID-106740"
}
},
{
"category": "service_pack",
"name": "15.0(1)XA",
"product": {
"name": "15.0(1)XA",
"product_id": "CSAFPID-107048"
}
},
{
"category": "service_pack",
"name": "15.0(1)XA5",
"product": {
"name": "15.0(1)XA5",
"product_id": "CSAFPID-107191"
}
}
],
"category": "product_version",
"name": "15.0XA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(2)T",
"product": {
"name": "15.1(2)T",
"product_id": "CSAFPID-100214"
}
},
{
"category": "service_pack",
"name": "15.1(1)T4",
"product": {
"name": "15.1(1)T4",
"product_id": "CSAFPID-103759"
}
},
{
"category": "service_pack",
"name": "15.1(3)T2",
"product": {
"name": "15.1(3)T2",
"product_id": "CSAFPID-104785"
}
},
{
"category": "service_pack",
"name": "15.1(1)T1",
"product": {
"name": "15.1(1)T1",
"product_id": "CSAFPID-105178"
}
},
{
"category": "service_pack",
"name": "15.1(2)T0a",
"product": {
"name": "15.1(2)T0a",
"product_id": "CSAFPID-106078"
}
},
{
"category": "service_pack",
"name": "15.1(3)T3",
"product": {
"name": "15.1(3)T3",
"product_id": "CSAFPID-106196"
}
},
{
"category": "service_pack",
"name": "15.1(1)T3",
"product": {
"name": "15.1(1)T3",
"product_id": "CSAFPID-106205"
}
},
{
"category": "service_pack",
"name": "15.1(2)T3",
"product": {
"name": "15.1(2)T3",
"product_id": "CSAFPID-106246"
}
},
{
"category": "service_pack",
"name": "15.1(2)T4",
"product": {
"name": "15.1(2)T4",
"product_id": "CSAFPID-106454"
}
},
{
"category": "service_pack",
"name": "15.1(1)T2",
"product": {
"name": "15.1(1)T2",
"product_id": "CSAFPID-106988"
}
},
{
"category": "service_pack",
"name": "15.1(3)T",
"product": {
"name": "15.1(3)T",
"product_id": "CSAFPID-107057"
}
},
{
"category": "service_pack",
"name": "15.1(2)T2a",
"product": {
"name": "15.1(2)T2a",
"product_id": "CSAFPID-107123"
}
},
{
"category": "service_pack",
"name": "15.1(3)T1",
"product": {
"name": "15.1(3)T1",
"product_id": "CSAFPID-107407"
}
},
{
"category": "service_pack",
"name": "15.1(1)T",
"product": {
"name": "15.1(1)T",
"product_id": "CSAFPID-107433"
}
},
{
"category": "service_pack",
"name": "15.1(2)T2",
"product": {
"name": "15.1(2)T2",
"product_id": "CSAFPID-107626"
}
},
{
"category": "service_pack",
"name": "15.1(2)T1",
"product": {
"name": "15.1(2)T1",
"product_id": "CSAFPID-107691"
}
},
{
"category": "service_pack",
"name": "15.1(2)T5",
"product": {
"name": "15.1(2)T5",
"product_id": "CSAFPID-108770"
}
},
{
"category": "service_pack",
"name": "15.1(3)T4",
"product": {
"name": "15.1(3)T4",
"product_id": "CSAFPID-109243"
}
},
{
"category": "service_pack",
"name": "15.1(1)T5",
"product": {
"name": "15.1(1)T5",
"product_id": "CSAFPID-113965"
}
}
],
"category": "product_version",
"name": "15.1T"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(1)XB",
"product": {
"name": "15.1(1)XB",
"product_id": "CSAFPID-104546"
}
},
{
"category": "service_pack",
"name": "15.1(1)XB3",
"product": {
"name": "15.1(1)XB3",
"product_id": "CSAFPID-105260"
}
},
{
"category": "service_pack",
"name": "15.1(1)XB1",
"product": {
"name": "15.1(1)XB1",
"product_id": "CSAFPID-105906"
}
},
{
"category": "service_pack",
"name": "15.1(1)XB2",
"product": {
"name": "15.1(1)XB2",
"product_id": "CSAFPID-106077"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB4",
"product": {
"name": "15.1(4)XB4",
"product_id": "CSAFPID-108462"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB5",
"product": {
"name": "15.1(4)XB5",
"product_id": "CSAFPID-109594"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB6",
"product": {
"name": "15.1(4)XB6",
"product_id": "CSAFPID-111884"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB5a",
"product": {
"name": "15.1(4)XB5a",
"product_id": "CSAFPID-113966"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB7",
"product": {
"name": "15.1(4)XB7",
"product_id": "CSAFPID-114012"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB8",
"product": {
"name": "15.1(4)XB8",
"product_id": "CSAFPID-115982"
}
},
{
"category": "service_pack",
"name": "15.1(4)XB8a",
"product": {
"name": "15.1(4)XB8a",
"product_id": "CSAFPID-116254"
}
}
],
"category": "product_version",
"name": "15.1XB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)XO1",
"product": {
"name": "15.0(1)XO1",
"product_id": "CSAFPID-103955"
}
},
{
"category": "service_pack",
"name": "15.0(1)XO",
"product": {
"name": "15.0(1)XO",
"product_id": "CSAFPID-106072"
}
},
{
"category": "service_pack",
"name": "15.0(2)XO",
"product": {
"name": "15.0(2)XO",
"product_id": "CSAFPID-111005"
}
}
],
"category": "product_version",
"name": "15.0XO"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)S2",
"product": {
"name": "15.0(1)S2",
"product_id": "CSAFPID-103751"
}
},
{
"category": "service_pack",
"name": "15.0(1)S1",
"product": {
"name": "15.0(1)S1",
"product_id": "CSAFPID-106152"
}
},
{
"category": "service_pack",
"name": "15.0(1)S",
"product": {
"name": "15.0(1)S",
"product_id": "CSAFPID-106712"
}
},
{
"category": "service_pack",
"name": "15.0(1)S3a",
"product": {
"name": "15.0(1)S3a",
"product_id": "CSAFPID-108588"
}
},
{
"category": "service_pack",
"name": "15.0(1)S4",
"product": {
"name": "15.0(1)S4",
"product_id": "CSAFPID-108998"
}
},
{
"category": "service_pack",
"name": "15.0(1)S5",
"product": {
"name": "15.0(1)S5",
"product_id": "CSAFPID-111002"
}
},
{
"category": "service_pack",
"name": "15.0(1)S4a",
"product": {
"name": "15.0(1)S4a",
"product_id": "CSAFPID-111018"
}
}
],
"category": "product_version",
"name": "15.0S"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(21a)M1",
"product": {
"name": "12.4(21a)M1",
"product_id": "CSAFPID-103527"
}
},
{
"category": "service_pack",
"name": "12.4(23b)M1",
"product": {
"name": "12.4(23b)M1",
"product_id": "CSAFPID-107845"
}
},
{
"category": "service_pack",
"name": "12.4(5a)M0",
"product": {
"name": "12.4(5a)M0",
"product_id": "CSAFPID-107848"
}
}
],
"category": "product_version",
"name": "12.4M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)S",
"product": {
"name": "15.2(1)S",
"product_id": "CSAFPID-107859"
}
},
{
"category": "service_pack",
"name": "15.2(2)S",
"product": {
"name": "15.2(2)S",
"product_id": "CSAFPID-107861"
}
},
{
"category": "service_pack",
"name": "15.2(1)S1",
"product": {
"name": "15.2(1)S1",
"product_id": "CSAFPID-111551"
}
},
{
"category": "service_pack",
"name": "15.2(4)S",
"product": {
"name": "15.2(4)S",
"product_id": "CSAFPID-112424"
}
},
{
"category": "service_pack",
"name": "15.2(1)S2",
"product": {
"name": "15.2(1)S2",
"product_id": "CSAFPID-114168"
}
},
{
"category": "service_pack",
"name": "15.2(2)S1",
"product": {
"name": "15.2(2)S1",
"product_id": "CSAFPID-114419"
}
},
{
"category": "service_pack",
"name": "15.2(2)S2",
"product": {
"name": "15.2(2)S2",
"product_id": "CSAFPID-115687"
}
},
{
"category": "service_pack",
"name": "15.2(4)S1",
"product": {
"name": "15.2(4)S1",
"product_id": "CSAFPID-183813"
}
},
{
"category": "service_pack",
"name": "15.2(4)S4",
"product": {
"name": "15.2(4)S4",
"product_id": "CSAFPID-183835"
}
},
{
"category": "service_pack",
"name": "15.2(4)S6",
"product": {
"name": "15.2(4)S6",
"product_id": "CSAFPID-183836"
}
},
{
"category": "service_pack",
"name": "15.2(4)S2",
"product": {
"name": "15.2(4)S2",
"product_id": "CSAFPID-183837"
}
},
{
"category": "service_pack",
"name": "15.2(4)S5",
"product": {
"name": "15.2(4)S5",
"product_id": "CSAFPID-183838"
}
},
{
"category": "service_pack",
"name": "15.2(4)S3",
"product": {
"name": "15.2(4)S3",
"product_id": "CSAFPID-183839"
}
},
{
"category": "service_pack",
"name": "15.2(4)S3a",
"product": {
"name": "15.2(4)S3a",
"product_id": "CSAFPID-191686"
}
},
{
"category": "service_pack",
"name": "15.2(4)S4a",
"product": {
"name": "15.2(4)S4a",
"product_id": "CSAFPID-195062"
}
},
{
"category": "service_pack",
"name": "15.2(4)S7",
"product": {
"name": "15.2(4)S7",
"product_id": "CSAFPID-209059"
}
},
{
"category": "service_pack",
"name": "15.2(4)S8",
"product": {
"name": "15.2(4)S8",
"product_id": "CSAFPID-210344"
}
}
],
"category": "product_version",
"name": "15.2S"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(1)T",
"product": {
"name": "15.3(1)T",
"product_id": "CSAFPID-103851"
}
},
{
"category": "service_pack",
"name": "15.3(2)T",
"product": {
"name": "15.3(2)T",
"product_id": "CSAFPID-111023"
}
},
{
"category": "service_pack",
"name": "15.3(1)T1",
"product": {
"name": "15.3(1)T1",
"product_id": "CSAFPID-187231"
}
},
{
"category": "service_pack",
"name": "15.3(1)T2",
"product": {
"name": "15.3(1)T2",
"product_id": "CSAFPID-187232"
}
},
{
"category": "service_pack",
"name": "15.3(1)T3",
"product": {
"name": "15.3(1)T3",
"product_id": "CSAFPID-187425"
}
},
{
"category": "service_pack",
"name": "15.3(1)T4",
"product": {
"name": "15.3(1)T4",
"product_id": "CSAFPID-189617"
}
},
{
"category": "service_pack",
"name": "15.3(2)T1",
"product": {
"name": "15.3(2)T1",
"product_id": "CSAFPID-190432"
}
},
{
"category": "service_pack",
"name": "15.3(2)T2",
"product": {
"name": "15.3(2)T2",
"product_id": "CSAFPID-190493"
}
},
{
"category": "service_pack",
"name": "15.3(2)T3",
"product": {
"name": "15.3(2)T3",
"product_id": "CSAFPID-191942"
}
},
{
"category": "service_pack",
"name": "15.3(2)T4",
"product": {
"name": "15.3(2)T4",
"product_id": "CSAFPID-194942"
}
}
],
"category": "product_version",
"name": "15.3T"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(10b)JDE",
"product": {
"name": "12.4(10b)JDE",
"product_id": "CSAFPID-104047"
}
}
],
"category": "product_version",
"name": "12.4JDE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EY",
"product": {
"name": "15.0(1)EY",
"product_id": "CSAFPID-104376"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY1",
"product": {
"name": "15.0(1)EY1",
"product_id": "CSAFPID-115969"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY2",
"product": {
"name": "15.0(1)EY2",
"product_id": "CSAFPID-187269"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY",
"product": {
"name": "15.0(2)EY",
"product_id": "CSAFPID-187932"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY1",
"product": {
"name": "15.0(2)EY1",
"product_id": "CSAFPID-190250"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY2",
"product": {
"name": "15.0(2)EY2",
"product_id": "CSAFPID-192831"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY3",
"product": {
"name": "15.0(2)EY3",
"product_id": "CSAFPID-195481"
}
}
],
"category": "product_version",
"name": "15.0EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(20)MRB",
"product": {
"name": "12.4(20)MRB",
"product_id": "CSAFPID-104463"
}
},
{
"category": "service_pack",
"name": "12.4(20)MRB1",
"product": {
"name": "12.4(20)MRB1",
"product_id": "CSAFPID-107841"
}
}
],
"category": "product_version",
"name": "12.4MRB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(2)S",
"product": {
"name": "15.1(2)S",
"product_id": "CSAFPID-105018"
}
},
{
"category": "service_pack",
"name": "15.1(1)S",
"product": {
"name": "15.1(1)S",
"product_id": "CSAFPID-107853"
}
},
{
"category": "service_pack",
"name": "15.1(1)S1",
"product": {
"name": "15.1(1)S1",
"product_id": "CSAFPID-107854"
}
},
{
"category": "service_pack",
"name": "15.1(3)S",
"product": {
"name": "15.1(3)S",
"product_id": "CSAFPID-107855"
}
},
{
"category": "service_pack",
"name": "15.1(1)S2",
"product": {
"name": "15.1(1)S2",
"product_id": "CSAFPID-108176"
}
},
{
"category": "service_pack",
"name": "15.1(2)S1",
"product": {
"name": "15.1(2)S1",
"product_id": "CSAFPID-108865"
}
},
{
"category": "service_pack",
"name": "15.1(2)S2",
"product": {
"name": "15.1(2)S2",
"product_id": "CSAFPID-110090"
}
},
{
"category": "service_pack",
"name": "15.1(3)S1",
"product": {
"name": "15.1(3)S1",
"product_id": "CSAFPID-111026"
}
},
{
"category": "service_pack",
"name": "15.1(3)S0a",
"product": {
"name": "15.1(3)S0a",
"product_id": "CSAFPID-111161"
}
},
{
"category": "service_pack",
"name": "15.1(3)S2",
"product": {
"name": "15.1(3)S2",
"product_id": "CSAFPID-111552"
}
},
{
"category": "service_pack",
"name": "15.1(3)S4",
"product": {
"name": "15.1(3)S4",
"product_id": "CSAFPID-111553"
}
},
{
"category": "service_pack",
"name": "15.1(3)S3",
"product": {
"name": "15.1(3)S3",
"product_id": "CSAFPID-111558"
}
},
{
"category": "service_pack",
"name": "15.1(3)S5",
"product": {
"name": "15.1(3)S5",
"product_id": "CSAFPID-184123"
}
},
{
"category": "service_pack",
"name": "15.1(3)S6",
"product": {
"name": "15.1(3)S6",
"product_id": "CSAFPID-184858"
}
},
{
"category": "service_pack",
"name": "15.1(3)S5a",
"product": {
"name": "15.1(3)S5a",
"product_id": "CSAFPID-190983"
}
},
{
"category": "service_pack",
"name": "15.1(3)S7",
"product": {
"name": "15.1(3)S7",
"product_id": "CSAFPID-198215"
}
}
],
"category": "product_version",
"name": "15.1S"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(4)M3",
"product": {
"name": "15.1(4)M3",
"product_id": "CSAFPID-105332"
}
},
{
"category": "service_pack",
"name": "15.1(4)M",
"product": {
"name": "15.1(4)M",
"product_id": "CSAFPID-107856"
}
},
{
"category": "service_pack",
"name": "15.1(4)M1",
"product": {
"name": "15.1(4)M1",
"product_id": "CSAFPID-107857"
}
},
{
"category": "service_pack",
"name": "15.1(4)M2",
"product": {
"name": "15.1(4)M2",
"product_id": "CSAFPID-107858"
}
},
{
"category": "service_pack",
"name": "15.1(4)M6",
"product": {
"name": "15.1(4)M6",
"product_id": "CSAFPID-108307"
}
},
{
"category": "service_pack",
"name": "15.1(4)M5",
"product": {
"name": "15.1(4)M5",
"product_id": "CSAFPID-108308"
}
},
{
"category": "service_pack",
"name": "15.1(4)M4",
"product": {
"name": "15.1(4)M4",
"product_id": "CSAFPID-108614"
}
},
{
"category": "service_pack",
"name": "15.1(4)M0a",
"product": {
"name": "15.1(4)M0a",
"product_id": "CSAFPID-108997"
}
},
{
"category": "service_pack",
"name": "15.1(4)M0b",
"product": {
"name": "15.1(4)M0b",
"product_id": "CSAFPID-109851"
}
},
{
"category": "service_pack",
"name": "15.1(4)M7",
"product": {
"name": "15.1(4)M7",
"product_id": "CSAFPID-111044"
}
},
{
"category": "service_pack",
"name": "15.1(4)M3a",
"product": {
"name": "15.1(4)M3a",
"product_id": "CSAFPID-114167"
}
},
{
"category": "service_pack",
"name": "15.1(4)M10",
"product": {
"name": "15.1(4)M10",
"product_id": "CSAFPID-184124"
}
},
{
"category": "service_pack",
"name": "15.1(4)M8",
"product": {
"name": "15.1(4)M8",
"product_id": "CSAFPID-185011"
}
},
{
"category": "service_pack",
"name": "15.1(4)M9",
"product": {
"name": "15.1(4)M9",
"product_id": "CSAFPID-194727"
}
},
{
"category": "service_pack",
"name": "15.1(4)M12a",
"product": {
"name": "15.1(4)M12a",
"product_id": "CSAFPID-220640"
}
}
],
"category": "product_version",
"name": "15.1M"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(3g)JMC1",
"product": {
"name": "12.4(3g)JMC1",
"product_id": "CSAFPID-105567"
}
},
{
"category": "service_pack",
"name": "12.4(3g)JMC",
"product": {
"name": "12.4(3g)JMC",
"product_id": "CSAFPID-107846"
}
},
{
"category": "service_pack",
"name": "12.4(3g)JMC2",
"product": {
"name": "12.4(3g)JMC2",
"product_id": "CSAFPID-107847"
}
}
],
"category": "product_version",
"name": "12.4JMC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SE",
"product": {
"name": "15.0(2)SE",
"product_id": "CSAFPID-107852"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE1",
"product": {
"name": "15.0(2)SE1",
"product_id": "CSAFPID-115939"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE2",
"product": {
"name": "15.0(2)SE2",
"product_id": "CSAFPID-116083"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE3",
"product": {
"name": "15.0(2)SE3",
"product_id": "CSAFPID-189455"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE4",
"product": {
"name": "15.0(2)SE4",
"product_id": "CSAFPID-190635"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE5",
"product": {
"name": "15.0(2)SE5",
"product_id": "CSAFPID-192706"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE6",
"product": {
"name": "15.0(2)SE6",
"product_id": "CSAFPID-195770"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE7",
"product": {
"name": "15.0(2)SE7",
"product_id": "CSAFPID-204097"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE8",
"product": {
"name": "15.0(2)SE8",
"product_id": "CSAFPID-209028"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE9",
"product": {
"name": "15.0(2)SE9",
"product_id": "CSAFPID-209029"
}
},
{
"category": "service_pack",
"name": "15.0(2a)SE9",
"product": {
"name": "15.0(2a)SE9",
"product_id": "CSAFPID-212329"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10",
"product": {
"name": "15.0(2)SE10",
"product_id": "CSAFPID-213788"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE11",
"product": {
"name": "15.0(2)SE11",
"product_id": "CSAFPID-220466"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10a",
"product": {
"name": "15.0(2)SE10a",
"product_id": "CSAFPID-222342"
}
}
],
"category": "product_version",
"name": "15.0SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(2)GC",
"product": {
"name": "15.1(2)GC",
"product_id": "CSAFPID-105759"
}
},
{
"category": "service_pack",
"name": "15.1(2)GC1",
"product": {
"name": "15.1(2)GC1",
"product_id": "CSAFPID-108649"
}
},
{
"category": "service_pack",
"name": "15.1(2)GC2",
"product": {
"name": "15.1(2)GC2",
"product_id": "CSAFPID-114130"
}
},
{
"category": "service_pack",
"name": "15.1(4)GC",
"product": {
"name": "15.1(4)GC",
"product_id": "CSAFPID-185352"
}
},
{
"category": "service_pack",
"name": "15.1(4)GC1",
"product": {
"name": "15.1(4)GC1",
"product_id": "CSAFPID-187826"
}
},
{
"category": "service_pack",
"name": "15.1(4)GC2",
"product": {
"name": "15.1(4)GC2",
"product_id": "CSAFPID-197489"
}
}
],
"category": "product_version",
"name": "15.1GC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(1)SG",
"product": {
"name": "15.1(1)SG",
"product_id": "CSAFPID-106089"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG",
"product": {
"name": "15.1(2)SG",
"product_id": "CSAFPID-115477"
}
},
{
"category": "service_pack",
"name": "15.1(1)SG1",
"product": {
"name": "15.1(1)SG1",
"product_id": "CSAFPID-117196"
}
},
{
"category": "service_pack",
"name": "15.1(1)SG2",
"product": {
"name": "15.1(1)SG2",
"product_id": "CSAFPID-185281"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG1",
"product": {
"name": "15.1(2)SG1",
"product_id": "CSAFPID-188035"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG2",
"product": {
"name": "15.1(2)SG2",
"product_id": "CSAFPID-193283"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG3",
"product": {
"name": "15.1(2)SG3",
"product_id": "CSAFPID-194741"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG4",
"product": {
"name": "15.1(2)SG4",
"product_id": "CSAFPID-195489"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG5",
"product": {
"name": "15.1(2)SG5",
"product_id": "CSAFPID-197465"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG6",
"product": {
"name": "15.1(2)SG6",
"product_id": "CSAFPID-204187"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG7",
"product": {
"name": "15.1(2)SG7",
"product_id": "CSAFPID-209034"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG8",
"product": {
"name": "15.1(2)SG8",
"product_id": "CSAFPID-214992"
}
}
],
"category": "product_version",
"name": "15.1SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)MR",
"product": {
"name": "15.0(1)MR",
"product_id": "CSAFPID-106446"
}
},
{
"category": "service_pack",
"name": "15.0(2)MR",
"product": {
"name": "15.0(2)MR",
"product_id": "CSAFPID-108459"
}
}
],
"category": "product_version",
"name": "15.0MR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)M",
"product": {
"name": "15.2(4)M",
"product_id": "CSAFPID-106899"
}
},
{
"category": "service_pack",
"name": "15.2(4)M1",
"product": {
"name": "15.2(4)M1",
"product_id": "CSAFPID-116774"
}
},
{
"category": "service_pack",
"name": "15.2(4)M2",
"product": {
"name": "15.2(4)M2",
"product_id": "CSAFPID-117681"
}
},
{
"category": "service_pack",
"name": "15.2(4)M4",
"product": {
"name": "15.2(4)M4",
"product_id": "CSAFPID-117682"
}
},
{
"category": "service_pack",
"name": "15.2(4)M3",
"product": {
"name": "15.2(4)M3",
"product_id": "CSAFPID-117683"
}
},
{
"category": "service_pack",
"name": "15.2(4)M5",
"product": {
"name": "15.2(4)M5",
"product_id": "CSAFPID-117789"
}
},
{
"category": "service_pack",
"name": "15.2(4)M8",
"product": {
"name": "15.2(4)M8",
"product_id": "CSAFPID-117800"
}
},
{
"category": "service_pack",
"name": "15.2(4)M10",
"product": {
"name": "15.2(4)M10",
"product_id": "CSAFPID-117801"
}
},
{
"category": "service_pack",
"name": "15.2(4)M7",
"product": {
"name": "15.2(4)M7",
"product_id": "CSAFPID-117802"
}
},
{
"category": "service_pack",
"name": "15.2(4)M6",
"product": {
"name": "15.2(4)M6",
"product_id": "CSAFPID-117803"
}
},
{
"category": "service_pack",
"name": "15.2(4)M9",
"product": {
"name": "15.2(4)M9",
"product_id": "CSAFPID-117804"
}
},
{
"category": "service_pack",
"name": "15.2(4)M6b",
"product": {
"name": "15.2(4)M6b",
"product_id": "CSAFPID-200506"
}
},
{
"category": "service_pack",
"name": "15.2(4)M6a",
"product": {
"name": "15.2(4)M6a",
"product_id": "CSAFPID-202559"
}
},
{
"category": "service_pack",
"name": "15.2(4)M11",
"product": {
"name": "15.2(4)M11",
"product_id": "CSAFPID-210407"
}
}
],
"category": "product_version",
"name": "15.2M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SG11a",
"product": {
"name": "15.0(2)SG11a",
"product_id": "CSAFPID-262335"
}
}
],
"category": "product_version",
"name": "15.0SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(24)MDB",
"product": {
"name": "12.4(24)MDB",
"product_id": "CSAFPID-107267"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB1",
"product": {
"name": "12.4(24)MDB1",
"product_id": "CSAFPID-108472"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB3",
"product": {
"name": "12.4(24)MDB3",
"product_id": "CSAFPID-111012"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB4",
"product": {
"name": "12.4(24)MDB4",
"product_id": "CSAFPID-111039"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB5",
"product": {
"name": "12.4(24)MDB5",
"product_id": "CSAFPID-113955"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB6",
"product": {
"name": "12.4(24)MDB6",
"product_id": "CSAFPID-113956"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB7",
"product": {
"name": "12.4(24)MDB7",
"product_id": "CSAFPID-113957"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB5a",
"product": {
"name": "12.4(24)MDB5a",
"product_id": "CSAFPID-113993"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB8",
"product": {
"name": "12.4(24)MDB8",
"product_id": "CSAFPID-116045"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB9",
"product": {
"name": "12.4(24)MDB9",
"product_id": "CSAFPID-116144"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB10",
"product": {
"name": "12.4(24)MDB10",
"product_id": "CSAFPID-117535"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB11",
"product": {
"name": "12.4(24)MDB11",
"product_id": "CSAFPID-183785"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB12",
"product": {
"name": "12.4(24)MDB12",
"product_id": "CSAFPID-184264"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB13",
"product": {
"name": "12.4(24)MDB13",
"product_id": "CSAFPID-185191"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB14",
"product": {
"name": "12.4(24)MDB14",
"product_id": "CSAFPID-188817"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB15",
"product": {
"name": "12.4(24)MDB15",
"product_id": "CSAFPID-189908"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB16",
"product": {
"name": "12.4(24)MDB16",
"product_id": "CSAFPID-192937"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB17",
"product": {
"name": "12.4(24)MDB17",
"product_id": "CSAFPID-194943"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB18",
"product": {
"name": "12.4(24)MDB18",
"product_id": "CSAFPID-197463"
}
},
{
"category": "service_pack",
"name": "12.4(24)MDB19",
"product": {
"name": "12.4(24)MDB19",
"product_id": "CSAFPID-198055"
}
}
],
"category": "product_version",
"name": "12.4MDB"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.3(11)TO3",
"product": {
"name": "12.3(11)TO3",
"product_id": "CSAFPID-107321"
}
}
],
"category": "product_version",
"name": "12.3TO"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(21a)JHC",
"product": {
"name": "12.4(21a)JHC",
"product_id": "CSAFPID-108458"
}
}
],
"category": "product_version",
"name": "12.4JHC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EX",
"product": {
"name": "15.0(1)EX",
"product_id": "CSAFPID-109442"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX",
"product": {
"name": "15.0(2)EX",
"product_id": "CSAFPID-189064"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX1",
"product": {
"name": "15.0(2)EX1",
"product_id": "CSAFPID-189115"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX2",
"product": {
"name": "15.0(2)EX2",
"product_id": "CSAFPID-192910"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX3",
"product": {
"name": "15.0(2)EX3",
"product_id": "CSAFPID-194540"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX4",
"product": {
"name": "15.0(2)EX4",
"product_id": "CSAFPID-194913"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX5",
"product": {
"name": "15.0(2)EX5",
"product_id": "CSAFPID-195943"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX6",
"product": {
"name": "15.0(2)EX6",
"product_id": "CSAFPID-200496"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX7",
"product": {
"name": "15.0(2)EX7",
"product_id": "CSAFPID-201366"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX8",
"product": {
"name": "15.0(2)EX8",
"product_id": "CSAFPID-204831"
}
},
{
"category": "service_pack",
"name": "15.0(2a)EX5",
"product": {
"name": "15.0(2a)EX5",
"product_id": "CSAFPID-205064"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX10",
"product": {
"name": "15.0(2)EX10",
"product_id": "CSAFPID-211570"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX11",
"product": {
"name": "15.0(2)EX11",
"product_id": "CSAFPID-214797"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX13",
"product": {
"name": "15.0(2)EX13",
"product_id": "CSAFPID-225160"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX12",
"product": {
"name": "15.0(2)EX12",
"product_id": "CSAFPID-230965"
}
}
],
"category": "product_version",
"name": "15.0EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)GC",
"product": {
"name": "15.2(1)GC",
"product_id": "CSAFPID-109702"
}
},
{
"category": "service_pack",
"name": "15.2(1)GC1",
"product": {
"name": "15.2(1)GC1",
"product_id": "CSAFPID-113019"
}
},
{
"category": "service_pack",
"name": "15.2(1)GC2",
"product": {
"name": "15.2(1)GC2",
"product_id": "CSAFPID-113967"
}
},
{
"category": "service_pack",
"name": "15.2(2)GC",
"product": {
"name": "15.2(2)GC",
"product_id": "CSAFPID-116219"
}
},
{
"category": "service_pack",
"name": "15.2(3)GC",
"product": {
"name": "15.2(3)GC",
"product_id": "CSAFPID-116726"
}
},
{
"category": "service_pack",
"name": "15.2(3)GC1",
"product": {
"name": "15.2(3)GC1",
"product_id": "CSAFPID-189765"
}
},
{
"category": "service_pack",
"name": "15.2(4)GC",
"product": {
"name": "15.2(4)GC",
"product_id": "CSAFPID-193316"
}
},
{
"category": "service_pack",
"name": "15.2(4)GC1",
"product": {
"name": "15.2(4)GC1",
"product_id": "CSAFPID-197495"
}
},
{
"category": "service_pack",
"name": "15.2(4)GC2",
"product": {
"name": "15.2(4)GC2",
"product_id": "CSAFPID-200634"
}
},
{
"category": "service_pack",
"name": "15.2(4)GC3",
"product": {
"name": "15.2(4)GC3",
"product_id": "CSAFPID-203066"
}
}
],
"category": "product_version",
"name": "15.2GC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(1)SY",
"product": {
"name": "15.1(1)SY",
"product_id": "CSAFPID-112489"
}
},
{
"category": "service_pack",
"name": "15.1(1)SY1",
"product": {
"name": "15.1(1)SY1",
"product_id": "CSAFPID-115285"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY",
"product": {
"name": "15.1(2)SY",
"product_id": "CSAFPID-184932"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY1",
"product": {
"name": "15.1(2)SY1",
"product_id": "CSAFPID-188061"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY2",
"product": {
"name": "15.1(2)SY2",
"product_id": "CSAFPID-189219"
}
},
{
"category": "service_pack",
"name": "15.1(1)SY2",
"product": {
"name": "15.1(1)SY2",
"product_id": "CSAFPID-191635"
}
},
{
"category": "service_pack",
"name": "15.1(1)SY3",
"product": {
"name": "15.1(1)SY3",
"product_id": "CSAFPID-194944"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY3",
"product": {
"name": "15.1(2)SY3",
"product_id": "CSAFPID-198059"
}
},
{
"category": "service_pack",
"name": "15.1(1)SY4",
"product": {
"name": "15.1(1)SY4",
"product_id": "CSAFPID-198426"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY4",
"product": {
"name": "15.1(2)SY4",
"product_id": "CSAFPID-201019"
}
},
{
"category": "service_pack",
"name": "15.1(1)SY5",
"product": {
"name": "15.1(1)SY5",
"product_id": "CSAFPID-204109"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY5",
"product": {
"name": "15.1(2)SY5",
"product_id": "CSAFPID-204110"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY4a",
"product": {
"name": "15.1(2)SY4a",
"product_id": "CSAFPID-204832"
}
},
{
"category": "service_pack",
"name": "15.1(1)SY6",
"product": {
"name": "15.1(1)SY6",
"product_id": "CSAFPID-209043"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY6",
"product": {
"name": "15.1(2)SY6",
"product_id": "CSAFPID-209044"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY7",
"product": {
"name": "15.1(2)SY7",
"product_id": "CSAFPID-210406"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY8",
"product": {
"name": "15.1(2)SY8",
"product_id": "CSAFPID-214052"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY9",
"product": {
"name": "15.1(2)SY9",
"product_id": "CSAFPID-220440"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY10",
"product": {
"name": "15.1(2)SY10",
"product_id": "CSAFPID-222650"
}
},
{
"category": "service_pack",
"name": "15.1(2)SY11",
"product": {
"name": "15.1(2)SY11",
"product_id": "CSAFPID-227307"
}
}
],
"category": "product_version",
"name": "15.1SY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(1)S",
"product": {
"name": "15.3(1)S",
"product_id": "CSAFPID-113970"
}
},
{
"category": "service_pack",
"name": "15.3(2)S",
"product": {
"name": "15.3(2)S",
"product_id": "CSAFPID-116256"
}
},
{
"category": "service_pack",
"name": "15.3(3)S",
"product": {
"name": "15.3(3)S",
"product_id": "CSAFPID-117783"
}
},
{
"category": "service_pack",
"name": "15.3(1)S2",
"product": {
"name": "15.3(1)S2",
"product_id": "CSAFPID-187962"
}
},
{
"category": "service_pack",
"name": "15.3(1)S1",
"product": {
"name": "15.3(1)S1",
"product_id": "CSAFPID-188008"
}
},
{
"category": "service_pack",
"name": "15.3(2)S2",
"product": {
"name": "15.3(2)S2",
"product_id": "CSAFPID-191331"
}
},
{
"category": "service_pack",
"name": "15.3(2)S1",
"product": {
"name": "15.3(2)S1",
"product_id": "CSAFPID-191336"
}
},
{
"category": "service_pack",
"name": "15.3(3)S1",
"product": {
"name": "15.3(3)S1",
"product_id": "CSAFPID-193406"
}
},
{
"category": "service_pack",
"name": "15.3(3)S2",
"product": {
"name": "15.3(3)S2",
"product_id": "CSAFPID-193407"
}
},
{
"category": "service_pack",
"name": "15.3(3)S3",
"product": {
"name": "15.3(3)S3",
"product_id": "CSAFPID-193408"
}
},
{
"category": "service_pack",
"name": "15.3(3)S6",
"product": {
"name": "15.3(3)S6",
"product_id": "CSAFPID-193409"
}
},
{
"category": "service_pack",
"name": "15.3(3)S4",
"product": {
"name": "15.3(3)S4",
"product_id": "CSAFPID-194877"
}
},
{
"category": "service_pack",
"name": "15.3(3)S5",
"product": {
"name": "15.3(3)S5",
"product_id": "CSAFPID-197469"
}
},
{
"category": "service_pack",
"name": "15.3(3)S2a",
"product": {
"name": "15.3(3)S2a",
"product_id": "CSAFPID-198066"
}
},
{
"category": "service_pack",
"name": "15.3(3)S7",
"product": {
"name": "15.3(3)S7",
"product_id": "CSAFPID-209093"
}
},
{
"category": "service_pack",
"name": "15.3(3)S8",
"product": {
"name": "15.3(3)S8",
"product_id": "CSAFPID-209268"
}
},
{
"category": "service_pack",
"name": "15.3(3)S6a",
"product": {
"name": "15.3(3)S6a",
"product_id": "CSAFPID-213023"
}
},
{
"category": "service_pack",
"name": "15.3(3)S9",
"product": {
"name": "15.3(3)S9",
"product_id": "CSAFPID-213032"
}
},
{
"category": "service_pack",
"name": "15.3(3)S10",
"product": {
"name": "15.3(3)S10",
"product_id": "CSAFPID-220442"
}
},
{
"category": "service_pack",
"name": "15.3(3)S8a",
"product": {
"name": "15.3(3)S8a",
"product_id": "CSAFPID-220673"
}
}
],
"category": "product_version",
"name": "15.3S"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.4(1)T",
"product": {
"name": "15.4(1)T",
"product_id": "CSAFPID-115981"
}
},
{
"category": "service_pack",
"name": "15.4(1)T2",
"product": {
"name": "15.4(1)T2",
"product_id": "CSAFPID-196114"
}
},
{
"category": "service_pack",
"name": "15.4(1)T1",
"product": {
"name": "15.4(1)T1",
"product_id": "CSAFPID-196255"
}
},
{
"category": "service_pack",
"name": "15.4(1)T3",
"product": {
"name": "15.4(1)T3",
"product_id": "CSAFPID-196256"
}
},
{
"category": "service_pack",
"name": "15.4(1)T4",
"product": {
"name": "15.4(1)T4",
"product_id": "CSAFPID-204282"
}
}
],
"category": "product_version",
"name": "15.4T"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)E",
"product": {
"name": "15.2(1)E",
"product_id": "CSAFPID-183811"
}
},
{
"category": "service_pack",
"name": "15.2(2)E",
"product": {
"name": "15.2(2)E",
"product_id": "CSAFPID-187057"
}
},
{
"category": "service_pack",
"name": "15.2(1)E1",
"product": {
"name": "15.2(1)E1",
"product_id": "CSAFPID-195469"
}
},
{
"category": "service_pack",
"name": "15.2(3)E",
"product": {
"name": "15.2(3)E",
"product_id": "CSAFPID-197483"
}
},
{
"category": "service_pack",
"name": "15.2(1)E2",
"product": {
"name": "15.2(1)E2",
"product_id": "CSAFPID-198060"
}
},
{
"category": "service_pack",
"name": "15.2(1)E3",
"product": {
"name": "15.2(1)E3",
"product_id": "CSAFPID-200488"
}
},
{
"category": "service_pack",
"name": "15.2(2)E1",
"product": {
"name": "15.2(2)E1",
"product_id": "CSAFPID-201074"
}
},
{
"category": "service_pack",
"name": "15.2(2b)E",
"product": {
"name": "15.2(2b)E",
"product_id": "CSAFPID-204102"
}
},
{
"category": "service_pack",
"name": "15.2(3)E1",
"product": {
"name": "15.2(3)E1",
"product_id": "CSAFPID-204186"
}
},
{
"category": "service_pack",
"name": "15.2(2)E2",
"product": {
"name": "15.2(2)E2",
"product_id": "CSAFPID-204228"
}
},
{
"category": "service_pack",
"name": "15.2(2a)E1",
"product": {
"name": "15.2(2a)E1",
"product_id": "CSAFPID-204818"
}
},
{
"category": "service_pack",
"name": "15.2(2)E3",
"product": {
"name": "15.2(2)E3",
"product_id": "CSAFPID-205672"
}
},
{
"category": "service_pack",
"name": "15.2(2a)E2",
"product": {
"name": "15.2(2a)E2",
"product_id": "CSAFPID-209045"
}
},
{
"category": "service_pack",
"name": "15.2(3)E2",
"product": {
"name": "15.2(3)E2",
"product_id": "CSAFPID-209046"
}
},
{
"category": "service_pack",
"name": "15.2(3a)E",
"product": {
"name": "15.2(3a)E",
"product_id": "CSAFPID-209047"
}
},
{
"category": "service_pack",
"name": "15.2(3)E3",
"product": {
"name": "15.2(3)E3",
"product_id": "CSAFPID-209358"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E2",
"product": {
"name": "15.2(3m)E2",
"product_id": "CSAFPID-209359"
}
},
{
"category": "service_pack",
"name": "15.2(2)E4",
"product": {
"name": "15.2(2)E4",
"product_id": "CSAFPID-210766"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5",
"product": {
"name": "15.2(2)E5",
"product_id": "CSAFPID-211296"
}
},
{
"category": "service_pack",
"name": "15.2(3)E4",
"product": {
"name": "15.2(3)E4",
"product_id": "CSAFPID-214078"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E7",
"product": {
"name": "15.2(3m)E7",
"product_id": "CSAFPID-216295"
}
},
{
"category": "service_pack",
"name": "15.2(2)E6",
"product": {
"name": "15.2(2)E6",
"product_id": "CSAFPID-218891"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E8",
"product": {
"name": "15.2(3m)E8",
"product_id": "CSAFPID-220689"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5a",
"product": {
"name": "15.2(2)E5a",
"product_id": "CSAFPID-221033"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5b",
"product": {
"name": "15.2(2)E5b",
"product_id": "CSAFPID-222436"
}
},
{
"category": "service_pack",
"name": "15.2(2)E7",
"product": {
"name": "15.2(2)E7",
"product_id": "CSAFPID-224868"
}
}
],
"category": "product_version",
"name": "15.2E"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)MRA",
"product": {
"name": "15.1(3)MRA",
"product_id": "CSAFPID-184570"
}
},
{
"category": "service_pack",
"name": "15.1(3)MRA1",
"product": {
"name": "15.1(3)MRA1",
"product_id": "CSAFPID-189739"
}
},
{
"category": "service_pack",
"name": "15.1(3)MRA2",
"product": {
"name": "15.1(3)MRA2",
"product_id": "CSAFPID-192990"
}
},
{
"category": "service_pack",
"name": "15.1(3)MRA3",
"product": {
"name": "15.1(3)MRA3",
"product_id": "CSAFPID-195771"
}
},
{
"category": "service_pack",
"name": "15.1(3)MRA4",
"product": {
"name": "15.1(3)MRA4",
"product_id": "CSAFPID-198425"
}
}
],
"category": "product_version",
"name": "15.1MRA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVB1",
"product": {
"name": "15.1(3)SVB1",
"product_id": "CSAFPID-187958"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVB2",
"product": {
"name": "15.1(3)SVB2",
"product_id": "CSAFPID-230966"
}
}
],
"category": "product_version",
"name": "15.1SVB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.4(1)S",
"product": {
"name": "15.4(1)S",
"product_id": "CSAFPID-187147"
}
},
{
"category": "service_pack",
"name": "15.4(1)S1",
"product": {
"name": "15.4(1)S1",
"product_id": "CSAFPID-197474"
}
},
{
"category": "service_pack",
"name": "15.4(1)S2",
"product": {
"name": "15.4(1)S2",
"product_id": "CSAFPID-198067"
}
},
{
"category": "service_pack",
"name": "15.4(1)S3",
"product": {
"name": "15.4(1)S3",
"product_id": "CSAFPID-201259"
}
},
{
"category": "service_pack",
"name": "15.4(1)S4",
"product": {
"name": "15.4(1)S4",
"product_id": "CSAFPID-209095"
}
}
],
"category": "product_version",
"name": "15.4S"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)M",
"product": {
"name": "15.3(3)M",
"product_id": "CSAFPID-187412"
}
},
{
"category": "service_pack",
"name": "15.3(3)M1",
"product": {
"name": "15.3(3)M1",
"product_id": "CSAFPID-193284"
}
},
{
"category": "service_pack",
"name": "15.3(3)M2",
"product": {
"name": "15.3(3)M2",
"product_id": "CSAFPID-193315"
}
},
{
"category": "service_pack",
"name": "15.3(3)M3",
"product": {
"name": "15.3(3)M3",
"product_id": "CSAFPID-193321"
}
},
{
"category": "service_pack",
"name": "15.3(3)M5",
"product": {
"name": "15.3(3)M5",
"product_id": "CSAFPID-193347"
}
},
{
"category": "service_pack",
"name": "15.3(3)M4",
"product": {
"name": "15.3(3)M4",
"product_id": "CSAFPID-195024"
}
},
{
"category": "service_pack",
"name": "15.3(3)M6",
"product": {
"name": "15.3(3)M6",
"product_id": "CSAFPID-198065"
}
},
{
"category": "service_pack",
"name": "15.3(3)M7",
"product": {
"name": "15.3(3)M7",
"product_id": "CSAFPID-209091"
}
},
{
"category": "service_pack",
"name": "15.3(3)M8",
"product": {
"name": "15.3(3)M8",
"product_id": "CSAFPID-209455"
}
},
{
"category": "service_pack",
"name": "15.3(3)M9",
"product": {
"name": "15.3(3)M9",
"product_id": "CSAFPID-216344"
}
},
{
"category": "service_pack",
"name": "15.3(3)M10",
"product": {
"name": "15.3(3)M10",
"product_id": "CSAFPID-220467"
}
},
{
"category": "service_pack",
"name": "15.3(3)M8a",
"product": {
"name": "15.3(3)M8a",
"product_id": "CSAFPID-220650"
}
}
],
"category": "product_version",
"name": "15.3M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)JN",
"product": {
"name": "15.2(4)JN",
"product_id": "CSAFPID-194433"
}
}
],
"category": "product_version",
"name": "15.2JN"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EZ",
"product": {
"name": "15.0(2)EZ",
"product_id": "CSAFPID-190637"
}
}
],
"category": "product_version",
"name": "15.0EZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)SC1a",
"product": {
"name": "15.2(1)SC1a",
"product_id": "CSAFPID-192423"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC",
"product": {
"name": "15.2(2)SC",
"product_id": "CSAFPID-195636"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC1",
"product": {
"name": "15.2(2)SC1",
"product_id": "CSAFPID-204094"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC3",
"product": {
"name": "15.2(2)SC3",
"product_id": "CSAFPID-209060"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC4",
"product": {
"name": "15.2(2)SC4",
"product_id": "CSAFPID-209061"
}
}
],
"category": "product_version",
"name": "15.2SC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.4(24)YS",
"product": {
"name": "12.4(24)YS",
"product_id": "CSAFPID-189612"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS1",
"product": {
"name": "12.4(24)YS1",
"product_id": "CSAFPID-192156"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS2",
"product": {
"name": "12.4(24)YS2",
"product_id": "CSAFPID-192704"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS3",
"product": {
"name": "12.4(24)YS3",
"product_id": "CSAFPID-193317"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS4",
"product": {
"name": "12.4(24)YS4",
"product_id": "CSAFPID-193628"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS5",
"product": {
"name": "12.4(24)YS5",
"product_id": "CSAFPID-194586"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS6",
"product": {
"name": "12.4(24)YS6",
"product_id": "CSAFPID-197493"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS7",
"product": {
"name": "12.4(24)YS7",
"product_id": "CSAFPID-198056"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS8",
"product": {
"name": "12.4(24)YS8",
"product_id": "CSAFPID-198524"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS8a",
"product": {
"name": "12.4(24)YS8a",
"product_id": "CSAFPID-200635"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS9",
"product": {
"name": "12.4(24)YS9",
"product_id": "CSAFPID-201079"
}
},
{
"category": "service_pack",
"name": "12.4(24)YS10",
"product": {
"name": "12.4(24)YS10",
"product_id": "CSAFPID-203046"
}
}
],
"category": "product_version",
"name": "12.4YS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVD",
"product": {
"name": "15.1(3)SVD",
"product_id": "CSAFPID-191566"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVD1",
"product": {
"name": "15.1(3)SVD1",
"product_id": "CSAFPID-192447"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVD2",
"product": {
"name": "15.1(3)SVD2",
"product_id": "CSAFPID-194467"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVD3",
"product": {
"name": "15.1(3)SVD3",
"product_id": "CSAFPID-198214"
}
}
],
"category": "product_version",
"name": "15.1SVD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)EY",
"product": {
"name": "15.2(1)EY",
"product_id": "CSAFPID-191928"
}
}
],
"category": "product_version",
"name": "15.2EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EJ",
"product": {
"name": "15.0(2)EJ",
"product_id": "CSAFPID-191948"
}
},
{
"category": "service_pack",
"name": "15.0(2)EJ1",
"product": {
"name": "15.0(2)EJ1",
"product_id": "CSAFPID-197471"
}
}
],
"category": "product_version",
"name": "15.0EJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)SY",
"product": {
"name": "15.2(1)SY",
"product_id": "CSAFPID-192726"
}
},
{
"category": "service_pack",
"name": "15.2(1)SY1",
"product": {
"name": "15.2(1)SY1",
"product_id": "CSAFPID-204828"
}
},
{
"category": "service_pack",
"name": "15.2(1)SY0a",
"product": {
"name": "15.2(1)SY0a",
"product_id": "CSAFPID-209063"
}
},
{
"category": "service_pack",
"name": "15.2(2)SY",
"product": {
"name": "15.2(2)SY",
"product_id": "CSAFPID-209065"
}
},
{
"category": "service_pack",
"name": "15.2(1)SY1a",
"product": {
"name": "15.2(1)SY1a",
"product_id": "CSAFPID-209439"
}
},
{
"category": "service_pack",
"name": "15.2(2)SY1",
"product": {
"name": "15.2(2)SY1",
"product_id": "CSAFPID-211976"
}
},
{
"category": "service_pack",
"name": "15.2(2)SY2",
"product": {
"name": "15.2(2)SY2",
"product_id": "CSAFPID-214053"
}
},
{
"category": "service_pack",
"name": "15.2(2)SY3",
"product": {
"name": "15.2(2)SY3",
"product_id": "CSAFPID-227285"
}
}
],
"category": "product_version",
"name": "15.2SY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVF",
"product": {
"name": "15.1(3)SVF",
"product_id": "CSAFPID-193177"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF1",
"product": {
"name": "15.1(3)SVF1",
"product_id": "CSAFPID-195519"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF2",
"product": {
"name": "15.1(3)SVF2",
"product_id": "CSAFPID-196115"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF2a",
"product": {
"name": "15.1(3)SVF2a",
"product_id": "CSAFPID-209035"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4b",
"product": {
"name": "15.1(3)SVF4b",
"product_id": "CSAFPID-209036"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4d",
"product": {
"name": "15.1(3)SVF4d",
"product_id": "CSAFPID-209037"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4e",
"product": {
"name": "15.1(3)SVF4e",
"product_id": "CSAFPID-210990"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4f",
"product": {
"name": "15.1(3)SVF4f",
"product_id": "CSAFPID-211717"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4c",
"product": {
"name": "15.1(3)SVF4c",
"product_id": "CSAFPID-230967"
}
}
],
"category": "product_version",
"name": "15.1SVF"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVE",
"product": {
"name": "15.1(3)SVE",
"product_id": "CSAFPID-193180"
}
}
],
"category": "product_version",
"name": "15.1SVE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)SD1",
"product": {
"name": "15.2(1)SD1",
"product_id": "CSAFPID-194439"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD2",
"product": {
"name": "15.2(1)SD2",
"product_id": "CSAFPID-195033"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD3",
"product": {
"name": "15.2(1)SD3",
"product_id": "CSAFPID-195688"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD4",
"product": {
"name": "15.2(1)SD4",
"product_id": "CSAFPID-196417"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD6",
"product": {
"name": "15.2(1)SD6",
"product_id": "CSAFPID-200489"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD6a",
"product": {
"name": "15.2(1)SD6a",
"product_id": "CSAFPID-201683"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD7",
"product": {
"name": "15.2(1)SD7",
"product_id": "CSAFPID-202565"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD8",
"product": {
"name": "15.2(1)SD8",
"product_id": "CSAFPID-205731"
}
}
],
"category": "product_version",
"name": "15.2SD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)JAZ1",
"product": {
"name": "15.2(4)JAZ1",
"product_id": "CSAFPID-200503"
}
}
],
"category": "product_version",
"name": "15.2JAZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EK",
"product": {
"name": "15.0(2)EK",
"product_id": "CSAFPID-195544"
}
},
{
"category": "service_pack",
"name": "15.0(2)EK1",
"product": {
"name": "15.0(2)EK1",
"product_id": "CSAFPID-197468"
}
}
],
"category": "product_version",
"name": "15.0EK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)XB12",
"product": {
"name": "15.3(3)XB12",
"product_id": "CSAFPID-195876"
}
}
],
"category": "product_version",
"name": "15.3XB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.4(1)CG",
"product": {
"name": "15.4(1)CG",
"product_id": "CSAFPID-195977"
}
},
{
"category": "service_pack",
"name": "15.4(1)CG1",
"product": {
"name": "15.4(1)CG1",
"product_id": "CSAFPID-200495"
}
}
],
"category": "product_version",
"name": "15.4CG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVG",
"product": {
"name": "15.1(3)SVG",
"product_id": "CSAFPID-196528"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG2",
"product": {
"name": "15.1(3)SVG2",
"product_id": "CSAFPID-200486"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3",
"product": {
"name": "15.1(3)SVG3",
"product_id": "CSAFPID-201336"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG1b",
"product": {
"name": "15.1(3)SVG1b",
"product_id": "CSAFPID-201448"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG1c",
"product": {
"name": "15.1(3)SVG1c",
"product_id": "CSAFPID-209038"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3a",
"product": {
"name": "15.1(3)SVG3a",
"product_id": "CSAFPID-209039"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3b",
"product": {
"name": "15.1(3)SVG3b",
"product_id": "CSAFPID-209040"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3c",
"product": {
"name": "15.1(3)SVG3c",
"product_id": "CSAFPID-209465"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG2a",
"product": {
"name": "15.1(3)SVG2a",
"product_id": "CSAFPID-211982"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG1a",
"product": {
"name": "15.1(3)SVG1a",
"product_id": "CSAFPID-230968"
}
}
],
"category": "product_version",
"name": "15.1SVG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EB",
"product": {
"name": "15.2(2)EB",
"product_id": "CSAFPID-197462"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB1",
"product": {
"name": "15.2(2)EB1",
"product_id": "CSAFPID-209839"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB2",
"product": {
"name": "15.2(2)EB2",
"product_id": "CSAFPID-214218"
}
}
],
"category": "product_version",
"name": "15.2EB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EA",
"product": {
"name": "15.2(2)EA",
"product_id": "CSAFPID-198063"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA2",
"product": {
"name": "15.2(2)EA2",
"product_id": "CSAFPID-209050"
}
},
{
"category": "service_pack",
"name": "15.2(3)EA",
"product": {
"name": "15.2(3)EA",
"product_id": "CSAFPID-209051"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA3",
"product": {
"name": "15.2(2)EA3",
"product_id": "CSAFPID-214217"
}
}
],
"category": "product_version",
"name": "15.2EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVH",
"product": {
"name": "15.1(3)SVH",
"product_id": "CSAFPID-200502"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVH2",
"product": {
"name": "15.1(3)SVH2",
"product_id": "CSAFPID-204101"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVH4",
"product": {
"name": "15.1(3)SVH4",
"product_id": "CSAFPID-209041"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVH4a",
"product": {
"name": "15.1(3)SVH4a",
"product_id": "CSAFPID-230969"
}
}
],
"category": "product_version",
"name": "15.1SVH"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JAA1",
"product": {
"name": "15.3(3)JAA1",
"product_id": "CSAFPID-230594"
}
}
],
"category": "product_version",
"name": "15.3JAA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SQD",
"product": {
"name": "15.0(2)SQD",
"product_id": "CSAFPID-204324"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD1",
"product": {
"name": "15.0(2)SQD1",
"product_id": "CSAFPID-209628"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD2",
"product": {
"name": "15.0(2)SQD2",
"product_id": "CSAFPID-211290"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD3",
"product": {
"name": "15.0(2)SQD3",
"product_id": "CSAFPID-217078"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD4",
"product": {
"name": "15.0(2)SQD4",
"product_id": "CSAFPID-220670"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD5",
"product": {
"name": "15.0(2)SQD5",
"product_id": "CSAFPID-225358"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD6",
"product": {
"name": "15.0(2)SQD6",
"product_id": "CSAFPID-226038"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD7",
"product": {
"name": "15.0(2)SQD7",
"product_id": "CSAFPID-227364"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD8",
"product": {
"name": "15.0(2)SQD8",
"product_id": "CSAFPID-232850"
}
}
],
"category": "product_version",
"name": "15.0SQD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVI2",
"product": {
"name": "15.1(3)SVI2",
"product_id": "CSAFPID-209421"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI1a",
"product": {
"name": "15.1(3)SVI1a",
"product_id": "CSAFPID-209466"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI2a",
"product": {
"name": "15.1(3)SVI2a",
"product_id": "CSAFPID-230970"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI3",
"product": {
"name": "15.1(3)SVI3",
"product_id": "CSAFPID-230971"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI31a",
"product": {
"name": "15.1(3)SVI31a",
"product_id": "CSAFPID-230973"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI31b",
"product": {
"name": "15.1(3)SVI31b",
"product_id": "CSAFPID-230974"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI3b",
"product": {
"name": "15.1(3)SVI3b",
"product_id": "CSAFPID-230976"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI3c",
"product": {
"name": "15.1(3)SVI3c",
"product_id": "CSAFPID-230977"
}
}
],
"category": "product_version",
"name": "15.1SVI"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVJ",
"product": {
"name": "15.1(3)SVJ",
"product_id": "CSAFPID-230982"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVJ2",
"product": {
"name": "15.1(3)SVJ2",
"product_id": "CSAFPID-230983"
}
}
],
"category": "product_version",
"name": "15.1SVJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVR1",
"product": {
"name": "15.1(3)SVR1",
"product_id": "CSAFPID-277230"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR2",
"product": {
"name": "15.1(3)SVR2",
"product_id": "CSAFPID-277253"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR3",
"product": {
"name": "15.1(3)SVR3",
"product_id": "CSAFPID-279337"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR10",
"product": {
"name": "15.1(3)SVR10",
"product_id": "CSAFPID-290618"
}
}
],
"category": "product_version",
"name": "15.1SVR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVS",
"product": {
"name": "15.1(3)SVS",
"product_id": "CSAFPID-277232"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVS1",
"product": {
"name": "15.1(3)SVS1",
"product_id": "CSAFPID-279335"
}
}
],
"category": "product_version",
"name": "15.1SVS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVT1",
"product": {
"name": "15.1(3)SVT1",
"product_id": "CSAFPID-280759"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT2",
"product": {
"name": "15.1(3)SVT2",
"product_id": "CSAFPID-282026"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT3",
"product": {
"name": "15.1(3)SVT3",
"product_id": "CSAFPID-284785"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT4",
"product": {
"name": "15.1(3)SVT4",
"product_id": "CSAFPID-286399"
}
}
],
"category": "product_version",
"name": "15.1SVT"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVU1",
"product": {
"name": "15.1(3)SVU1",
"product_id": "CSAFPID-283833"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU10",
"product": {
"name": "15.1(3)SVU10",
"product_id": "CSAFPID-284291"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU2",
"product": {
"name": "15.1(3)SVU2",
"product_id": "CSAFPID-284566"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU11",
"product": {
"name": "15.1(3)SVU11",
"product_id": "CSAFPID-286400"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU20",
"product": {
"name": "15.1(3)SVU20",
"product_id": "CSAFPID-289270"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU21",
"product": {
"name": "15.1(3)SVU21",
"product_id": "CSAFPID-290557"
}
}
],
"category": "product_version",
"name": "15.1SVU"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVV1",
"product": {
"name": "15.1(3)SVV1",
"product_id": "CSAFPID-284341"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV2",
"product": {
"name": "15.1(3)SVV2",
"product_id": "CSAFPID-286029"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV3",
"product": {
"name": "15.1(3)SVV3",
"product_id": "CSAFPID-286940"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV4",
"product": {
"name": "15.1(3)SVV4",
"product_id": "CSAFPID-289371"
}
}
],
"category": "product_version",
"name": "15.1SVV"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVW",
"product": {
"name": "15.1(3)SVW",
"product_id": "CSAFPID-286451"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVW1",
"product": {
"name": "15.1(3)SVW1",
"product_id": "CSAFPID-286844"
}
}
],
"category": "product_version",
"name": "15.1SVW"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVX",
"product": {
"name": "15.1(3)SVX",
"product_id": "CSAFPID-286927"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVX1",
"product": {
"name": "15.1(3)SVX1",
"product_id": "CSAFPID-289301"
}
}
],
"category": "product_version",
"name": "15.1SVX"
}
],
"category": "product_family",
"name": "IOS"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0159",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCuj73916"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-100214",
"CSAFPID-103494",
"CSAFPID-103502",
"CSAFPID-103503",
"CSAFPID-103527",
"CSAFPID-103531",
"CSAFPID-103543",
"CSAFPID-103553",
"CSAFPID-103558",
"CSAFPID-103564",
"CSAFPID-103573",
"CSAFPID-103585",
"CSAFPID-103595",
"CSAFPID-103602",
"CSAFPID-103615",
"CSAFPID-103631",
"CSAFPID-103638",
"CSAFPID-103650",
"CSAFPID-103674",
"CSAFPID-103692",
"CSAFPID-103698",
"CSAFPID-103702",
"CSAFPID-103715",
"CSAFPID-103735",
"CSAFPID-103751",
"CSAFPID-103756",
"CSAFPID-103759",
"CSAFPID-103773",
"CSAFPID-103774",
"CSAFPID-103777",
"CSAFPID-103815",
"CSAFPID-103824",
"CSAFPID-103843",
"CSAFPID-103851",
"CSAFPID-103862",
"CSAFPID-103869",
"CSAFPID-103886",
"CSAFPID-103889",
"CSAFPID-103893",
"CSAFPID-103916",
"CSAFPID-103926",
"CSAFPID-103931",
"CSAFPID-103946",
"CSAFPID-103949",
"CSAFPID-103953",
"CSAFPID-103955",
"CSAFPID-103968",
"CSAFPID-104005",
"CSAFPID-104006",
"CSAFPID-104019",
"CSAFPID-104047",
"CSAFPID-104048",
"CSAFPID-104054",
"CSAFPID-104056",
"CSAFPID-104076",
"CSAFPID-104083",
"CSAFPID-104118",
"CSAFPID-104119",
"CSAFPID-104125",
"CSAFPID-104134",
"CSAFPID-104136",
"CSAFPID-104138",
"CSAFPID-104139",
"CSAFPID-104144",
"CSAFPID-104146",
"CSAFPID-104155",
"CSAFPID-104157",
"CSAFPID-104165",
"CSAFPID-104167",
"CSAFPID-104179",
"CSAFPID-104190",
"CSAFPID-104198",
"CSAFPID-104208",
"CSAFPID-104212",
"CSAFPID-104230",
"CSAFPID-104247",
"CSAFPID-104248",
"CSAFPID-104249",
"CSAFPID-104266",
"CSAFPID-104273",
"CSAFPID-104280",
"CSAFPID-104304",
"CSAFPID-104319",
"CSAFPID-104322",
"CSAFPID-104345",
"CSAFPID-104369",
"CSAFPID-104376",
"CSAFPID-104378",
"CSAFPID-104379",
"CSAFPID-104381",
"CSAFPID-104386",
"CSAFPID-104400",
"CSAFPID-104416",
"CSAFPID-104422",
"CSAFPID-104423",
"CSAFPID-104445",
"CSAFPID-104448",
"CSAFPID-104463",
"CSAFPID-104474",
"CSAFPID-104481",
"CSAFPID-104486",
"CSAFPID-104487",
"CSAFPID-104489",
"CSAFPID-104491",
"CSAFPID-104500",
"CSAFPID-104514",
"CSAFPID-104522",
"CSAFPID-104523",
"CSAFPID-104533",
"CSAFPID-104534",
"CSAFPID-104540",
"CSAFPID-104546",
"CSAFPID-104548",
"CSAFPID-104570",
"CSAFPID-104577",
"CSAFPID-104584",
"CSAFPID-104587",
"CSAFPID-104612",
"CSAFPID-104641",
"CSAFPID-104651",
"CSAFPID-104655",
"CSAFPID-104656",
"CSAFPID-104657",
"CSAFPID-104666",
"CSAFPID-104670",
"CSAFPID-104673",
"CSAFPID-104677",
"CSAFPID-104678",
"CSAFPID-104692",
"CSAFPID-104715",
"CSAFPID-104734",
"CSAFPID-104758",
"CSAFPID-104777",
"CSAFPID-104785",
"CSAFPID-104788",
"CSAFPID-104802",
"CSAFPID-104807",
"CSAFPID-104810",
"CSAFPID-104838",
"CSAFPID-104839",
"CSAFPID-104841",
"CSAFPID-104844",
"CSAFPID-104846",
"CSAFPID-104851",
"CSAFPID-104852",
"CSAFPID-104854",
"CSAFPID-104878",
"CSAFPID-104909",
"CSAFPID-104916",
"CSAFPID-104938",
"CSAFPID-104953",
"CSAFPID-104955",
"CSAFPID-104979",
"CSAFPID-104980",
"CSAFPID-104989",
"CSAFPID-104990",
"CSAFPID-104996",
"CSAFPID-105005",
"CSAFPID-105013",
"CSAFPID-105018",
"CSAFPID-105022",
"CSAFPID-105023",
"CSAFPID-105034",
"CSAFPID-105060",
"CSAFPID-105067",
"CSAFPID-105069",
"CSAFPID-105092",
"CSAFPID-105113",
"CSAFPID-105116",
"CSAFPID-105120",
"CSAFPID-105144",
"CSAFPID-105150",
"CSAFPID-105162",
"CSAFPID-105174",
"CSAFPID-105178",
"CSAFPID-105181",
"CSAFPID-105193",
"CSAFPID-105203",
"CSAFPID-105205",
"CSAFPID-105225",
"CSAFPID-105234",
"CSAFPID-105255",
"CSAFPID-105256",
"CSAFPID-105260",
"CSAFPID-105271",
"CSAFPID-105272",
"CSAFPID-105274",
"CSAFPID-105275",
"CSAFPID-105305",
"CSAFPID-105307",
"CSAFPID-105316",
"CSAFPID-105332",
"CSAFPID-105337",
"CSAFPID-105342",
"CSAFPID-105348",
"CSAFPID-105358",
"CSAFPID-105366",
"CSAFPID-105369",
"CSAFPID-105376",
"CSAFPID-105388",
"CSAFPID-105391",
"CSAFPID-105393",
"CSAFPID-105397",
"CSAFPID-105401",
"CSAFPID-105402",
"CSAFPID-105426",
"CSAFPID-105429",
"CSAFPID-105434",
"CSAFPID-105462",
"CSAFPID-105463",
"CSAFPID-105469",
"CSAFPID-105471",
"CSAFPID-105480",
"CSAFPID-105481",
"CSAFPID-105482",
"CSAFPID-105484",
"CSAFPID-105497",
"CSAFPID-105498",
"CSAFPID-105503",
"CSAFPID-105523",
"CSAFPID-105532",
"CSAFPID-105547",
"CSAFPID-105554",
"CSAFPID-105562",
"CSAFPID-105567",
"CSAFPID-105571",
"CSAFPID-105575",
"CSAFPID-105585",
"CSAFPID-105587",
"CSAFPID-105588",
"CSAFPID-105590",
"CSAFPID-105594",
"CSAFPID-105595",
"CSAFPID-105598",
"CSAFPID-105618",
"CSAFPID-105631",
"CSAFPID-105635",
"CSAFPID-105637",
"CSAFPID-105638",
"CSAFPID-105647",
"CSAFPID-105662",
"CSAFPID-105664",
"CSAFPID-105683",
"CSAFPID-105690",
"CSAFPID-105695",
"CSAFPID-105707",
"CSAFPID-105715",
"CSAFPID-105716",
"CSAFPID-105720",
"CSAFPID-105727",
"CSAFPID-105743",
"CSAFPID-105745",
"CSAFPID-105748",
"CSAFPID-105753",
"CSAFPID-105754",
"CSAFPID-105759",
"CSAFPID-105763",
"CSAFPID-105766",
"CSAFPID-105773",
"CSAFPID-105782",
"CSAFPID-105791",
"CSAFPID-105797",
"CSAFPID-105802",
"CSAFPID-105808",
"CSAFPID-105830",
"CSAFPID-105831",
"CSAFPID-105834",
"CSAFPID-105841",
"CSAFPID-105843",
"CSAFPID-105844",
"CSAFPID-105848",
"CSAFPID-105850",
"CSAFPID-105857",
"CSAFPID-105875",
"CSAFPID-105888",
"CSAFPID-105889",
"CSAFPID-105906",
"CSAFPID-105908",
"CSAFPID-105911",
"CSAFPID-105912",
"CSAFPID-105918",
"CSAFPID-105930",
"CSAFPID-105933",
"CSAFPID-105941",
"CSAFPID-105958",
"CSAFPID-105964",
"CSAFPID-105966",
"CSAFPID-105967",
"CSAFPID-105983",
"CSAFPID-105999",
"CSAFPID-106011",
"CSAFPID-106017",
"CSAFPID-106044",
"CSAFPID-106056",
"CSAFPID-106057",
"CSAFPID-106061",
"CSAFPID-106062",
"CSAFPID-106064",
"CSAFPID-106069",
"CSAFPID-106072",
"CSAFPID-106077",
"CSAFPID-106078",
"CSAFPID-106081",
"CSAFPID-106082",
"CSAFPID-106085",
"CSAFPID-106089",
"CSAFPID-106091",
"CSAFPID-106094",
"CSAFPID-106096",
"CSAFPID-106100",
"CSAFPID-106101",
"CSAFPID-106104",
"CSAFPID-106125",
"CSAFPID-106128",
"CSAFPID-106141",
"CSAFPID-106147",
"CSAFPID-106148",
"CSAFPID-106152",
"CSAFPID-106170",
"CSAFPID-106196",
"CSAFPID-106205",
"CSAFPID-106214",
"CSAFPID-106241",
"CSAFPID-106243",
"CSAFPID-106246",
"CSAFPID-106250",
"CSAFPID-106268",
"CSAFPID-106271",
"CSAFPID-106296",
"CSAFPID-106304",
"CSAFPID-106312",
"CSAFPID-106321",
"CSAFPID-106324",
"CSAFPID-106340",
"CSAFPID-106351",
"CSAFPID-106357",
"CSAFPID-106363",
"CSAFPID-106380",
"CSAFPID-106381",
"CSAFPID-106385",
"CSAFPID-106387",
"CSAFPID-106388",
"CSAFPID-106391",
"CSAFPID-106419",
"CSAFPID-106421",
"CSAFPID-106428",
"CSAFPID-106430",
"CSAFPID-106433",
"CSAFPID-106434",
"CSAFPID-106437",
"CSAFPID-106446",
"CSAFPID-106454",
"CSAFPID-106456",
"CSAFPID-106462",
"CSAFPID-106465",
"CSAFPID-106469",
"CSAFPID-106492",
"CSAFPID-106499",
"CSAFPID-106510",
"CSAFPID-106515",
"CSAFPID-106523",
"CSAFPID-106531",
"CSAFPID-106546",
"CSAFPID-106553",
"CSAFPID-106560",
"CSAFPID-106569",
"CSAFPID-106582",
"CSAFPID-106594",
"CSAFPID-106612",
"CSAFPID-106630",
"CSAFPID-106637",
"CSAFPID-106650",
"CSAFPID-106653",
"CSAFPID-106661",
"CSAFPID-106667",
"CSAFPID-106672",
"CSAFPID-106680",
"CSAFPID-106693",
"CSAFPID-106696",
"CSAFPID-106711",
"CSAFPID-106712",
"CSAFPID-106713",
"CSAFPID-106716",
"CSAFPID-106730",
"CSAFPID-106735",
"CSAFPID-106740",
"CSAFPID-106745",
"CSAFPID-106751",
"CSAFPID-106756",
"CSAFPID-106757",
"CSAFPID-106773",
"CSAFPID-106786",
"CSAFPID-106792",
"CSAFPID-106793",
"CSAFPID-106794",
"CSAFPID-106835",
"CSAFPID-106839",
"CSAFPID-106845",
"CSAFPID-106853",
"CSAFPID-106854",
"CSAFPID-106861",
"CSAFPID-106867",
"CSAFPID-106872",
"CSAFPID-106884",
"CSAFPID-106888",
"CSAFPID-106895",
"CSAFPID-106896",
"CSAFPID-106899",
"CSAFPID-106903",
"CSAFPID-106924",
"CSAFPID-106941",
"CSAFPID-106945",
"CSAFPID-106956",
"CSAFPID-106962",
"CSAFPID-106963",
"CSAFPID-106965",
"CSAFPID-106969",
"CSAFPID-106974",
"CSAFPID-106983",
"CSAFPID-106986",
"CSAFPID-106988",
"CSAFPID-106998",
"CSAFPID-107012",
"CSAFPID-107014",
"CSAFPID-107016",
"CSAFPID-107043",
"CSAFPID-107044",
"CSAFPID-107048",
"CSAFPID-107057",
"CSAFPID-107061",
"CSAFPID-107066",
"CSAFPID-107075",
"CSAFPID-107081",
"CSAFPID-107099",
"CSAFPID-107104",
"CSAFPID-107122",
"CSAFPID-107123",
"CSAFPID-107131",
"CSAFPID-107136",
"CSAFPID-107157",
"CSAFPID-107160",
"CSAFPID-107163",
"CSAFPID-107169",
"CSAFPID-107173",
"CSAFPID-107179",
"CSAFPID-107191",
"CSAFPID-107207",
"CSAFPID-107211",
"CSAFPID-107238",
"CSAFPID-107245",
"CSAFPID-107267",
"CSAFPID-107270",
"CSAFPID-107277",
"CSAFPID-107295",
"CSAFPID-107299",
"CSAFPID-107307",
"CSAFPID-107314",
"CSAFPID-107316",
"CSAFPID-107321",
"CSAFPID-107329",
"CSAFPID-107335",
"CSAFPID-107350",
"CSAFPID-107354",
"CSAFPID-107367",
"CSAFPID-107379",
"CSAFPID-107382",
"CSAFPID-107388",
"CSAFPID-107392",
"CSAFPID-107393",
"CSAFPID-107394",
"CSAFPID-107399",
"CSAFPID-107407",
"CSAFPID-107428",
"CSAFPID-107433",
"CSAFPID-107438",
"CSAFPID-107447",
"CSAFPID-107464",
"CSAFPID-107475",
"CSAFPID-107524",
"CSAFPID-107536",
"CSAFPID-107542",
"CSAFPID-107550",
"CSAFPID-107558",
"CSAFPID-107559",
"CSAFPID-107561",
"CSAFPID-107566",
"CSAFPID-107575",
"CSAFPID-107596",
"CSAFPID-107597",
"CSAFPID-107603",
"CSAFPID-107608",
"CSAFPID-107623",
"CSAFPID-107626",
"CSAFPID-107632",
"CSAFPID-107640",
"CSAFPID-107661",
"CSAFPID-107671",
"CSAFPID-107691",
"CSAFPID-107693",
"CSAFPID-107715",
"CSAFPID-107727",
"CSAFPID-107733",
"CSAFPID-107747",
"CSAFPID-107751",
"CSAFPID-107757",
"CSAFPID-107764",
"CSAFPID-107841",
"CSAFPID-107845",
"CSAFPID-107846",
"CSAFPID-107847",
"CSAFPID-107848",
"CSAFPID-107852",
"CSAFPID-107853",
"CSAFPID-107854",
"CSAFPID-107855",
"CSAFPID-107856",
"CSAFPID-107857",
"CSAFPID-107858",
"CSAFPID-107859",
"CSAFPID-107861",
"CSAFPID-108176",
"CSAFPID-108177",
"CSAFPID-108305",
"CSAFPID-108307",
"CSAFPID-108308",
"CSAFPID-108407",
"CSAFPID-108458",
"CSAFPID-108459",
"CSAFPID-108460",
"CSAFPID-108462",
"CSAFPID-108464",
"CSAFPID-108472",
"CSAFPID-108473",
"CSAFPID-108588",
"CSAFPID-108614",
"CSAFPID-108649",
"CSAFPID-108770",
"CSAFPID-108865",
"CSAFPID-108997",
"CSAFPID-108998",
"CSAFPID-109243",
"CSAFPID-109432",
"CSAFPID-109433",
"CSAFPID-109442",
"CSAFPID-109505",
"CSAFPID-109594",
"CSAFPID-109702",
"CSAFPID-109851",
"CSAFPID-110090",
"CSAFPID-110095",
"CSAFPID-110096",
"CSAFPID-111002",
"CSAFPID-111005",
"CSAFPID-111012",
"CSAFPID-111018",
"CSAFPID-111022",
"CSAFPID-111023",
"CSAFPID-111026",
"CSAFPID-111027",
"CSAFPID-111029",
"CSAFPID-111032",
"CSAFPID-111033",
"CSAFPID-111039",
"CSAFPID-111044",
"CSAFPID-111047",
"CSAFPID-111161",
"CSAFPID-111162",
"CSAFPID-111406",
"CSAFPID-111415",
"CSAFPID-111551",
"CSAFPID-111552",
"CSAFPID-111553",
"CSAFPID-111558",
"CSAFPID-111559",
"CSAFPID-111563",
"CSAFPID-111884",
"CSAFPID-112158",
"CSAFPID-112246",
"CSAFPID-112247",
"CSAFPID-112424",
"CSAFPID-112489",
"CSAFPID-112564",
"CSAFPID-113019",
"CSAFPID-113955",
"CSAFPID-113956",
"CSAFPID-113957",
"CSAFPID-113960",
"CSAFPID-113965",
"CSAFPID-113966",
"CSAFPID-113967",
"CSAFPID-113970",
"CSAFPID-113992",
"CSAFPID-113993",
"CSAFPID-114012",
"CSAFPID-114130",
"CSAFPID-114167",
"CSAFPID-114168",
"CSAFPID-114419",
"CSAFPID-115280",
"CSAFPID-115281",
"CSAFPID-115285",
"CSAFPID-115302",
"CSAFPID-115340",
"CSAFPID-115477",
"CSAFPID-115636",
"CSAFPID-115687",
"CSAFPID-115736",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-115981",
"CSAFPID-115982",
"CSAFPID-116045",
"CSAFPID-116083",
"CSAFPID-116144",
"CSAFPID-116219",
"CSAFPID-116254",
"CSAFPID-116256",
"CSAFPID-116726",
"CSAFPID-116774",
"CSAFPID-116838",
"CSAFPID-117196",
"CSAFPID-117535",
"CSAFPID-117681",
"CSAFPID-117682",
"CSAFPID-117683",
"CSAFPID-117783",
"CSAFPID-117789",
"CSAFPID-117800",
"CSAFPID-117801",
"CSAFPID-117802",
"CSAFPID-117803",
"CSAFPID-117804",
"CSAFPID-183785",
"CSAFPID-183811",
"CSAFPID-183813",
"CSAFPID-183835",
"CSAFPID-183836",
"CSAFPID-183837",
"CSAFPID-183838",
"CSAFPID-183839",
"CSAFPID-184092",
"CSAFPID-184123",
"CSAFPID-184124",
"CSAFPID-184264",
"CSAFPID-184570",
"CSAFPID-184858",
"CSAFPID-184887",
"CSAFPID-184932",
"CSAFPID-185011",
"CSAFPID-185191",
"CSAFPID-185281",
"CSAFPID-185352",
"CSAFPID-185642",
"CSAFPID-186998",
"CSAFPID-187057",
"CSAFPID-187147",
"CSAFPID-187231",
"CSAFPID-187232",
"CSAFPID-187269",
"CSAFPID-187412",
"CSAFPID-187425",
"CSAFPID-187826",
"CSAFPID-187932",
"CSAFPID-187958",
"CSAFPID-187962",
"CSAFPID-188008",
"CSAFPID-188035",
"CSAFPID-188061",
"CSAFPID-188501",
"CSAFPID-188817",
"CSAFPID-189064",
"CSAFPID-189115",
"CSAFPID-189219",
"CSAFPID-189455",
"CSAFPID-189457",
"CSAFPID-189612",
"CSAFPID-189617",
"CSAFPID-189739",
"CSAFPID-189765",
"CSAFPID-189908",
"CSAFPID-190250",
"CSAFPID-190432",
"CSAFPID-190493",
"CSAFPID-190635",
"CSAFPID-190637",
"CSAFPID-190638",
"CSAFPID-190639",
"CSAFPID-190978",
"CSAFPID-190983",
"CSAFPID-191331",
"CSAFPID-191336",
"CSAFPID-191566",
"CSAFPID-191635",
"CSAFPID-191686",
"CSAFPID-191928",
"CSAFPID-191942",
"CSAFPID-191948",
"CSAFPID-192041",
"CSAFPID-192156",
"CSAFPID-192423",
"CSAFPID-192447",
"CSAFPID-192704",
"CSAFPID-192706",
"CSAFPID-192726",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192937",
"CSAFPID-192990",
"CSAFPID-193177",
"CSAFPID-193180",
"CSAFPID-193283",
"CSAFPID-193284",
"CSAFPID-193315",
"CSAFPID-193316",
"CSAFPID-193317",
"CSAFPID-193321",
"CSAFPID-193347",
"CSAFPID-193406",
"CSAFPID-193407",
"CSAFPID-193408",
"CSAFPID-193409",
"CSAFPID-193628",
"CSAFPID-194433",
"CSAFPID-194439",
"CSAFPID-194467",
"CSAFPID-194509",
"CSAFPID-194540",
"CSAFPID-194585",
"CSAFPID-194586",
"CSAFPID-194727",
"CSAFPID-194741",
"CSAFPID-194877",
"CSAFPID-194913",
"CSAFPID-194942",
"CSAFPID-194943",
"CSAFPID-194944",
"CSAFPID-195024",
"CSAFPID-195033",
"CSAFPID-195062",
"CSAFPID-195469",
"CSAFPID-195481",
"CSAFPID-195489",
"CSAFPID-195519",
"CSAFPID-195544",
"CSAFPID-195636",
"CSAFPID-195688",
"CSAFPID-195770",
"CSAFPID-195771",
"CSAFPID-195876",
"CSAFPID-195943",
"CSAFPID-195977",
"CSAFPID-196114",
"CSAFPID-196115",
"CSAFPID-196255",
"CSAFPID-196256",
"CSAFPID-196417",
"CSAFPID-196528",
"CSAFPID-197462",
"CSAFPID-197463",
"CSAFPID-197465",
"CSAFPID-197468",
"CSAFPID-197469",
"CSAFPID-197471",
"CSAFPID-197474",
"CSAFPID-197483",
"CSAFPID-197489",
"CSAFPID-197493",
"CSAFPID-197495",
"CSAFPID-198055",
"CSAFPID-198056",
"CSAFPID-198059",
"CSAFPID-198060",
"CSAFPID-198063",
"CSAFPID-198065",
"CSAFPID-198066",
"CSAFPID-198067",
"CSAFPID-198214",
"CSAFPID-198215",
"CSAFPID-198425",
"CSAFPID-198426",
"CSAFPID-198524",
"CSAFPID-200486",
"CSAFPID-200488",
"CSAFPID-200489",
"CSAFPID-200495",
"CSAFPID-200496",
"CSAFPID-200502",
"CSAFPID-200503",
"CSAFPID-200506",
"CSAFPID-200634",
"CSAFPID-200635",
"CSAFPID-201019",
"CSAFPID-201074",
"CSAFPID-201079",
"CSAFPID-201259",
"CSAFPID-201336",
"CSAFPID-201366",
"CSAFPID-201448",
"CSAFPID-201683",
"CSAFPID-202559",
"CSAFPID-202565",
"CSAFPID-203046",
"CSAFPID-203066",
"CSAFPID-204094",
"CSAFPID-204097",
"CSAFPID-204101",
"CSAFPID-204102",
"CSAFPID-204109",
"CSAFPID-204110",
"CSAFPID-204186",
"CSAFPID-204187",
"CSAFPID-204228",
"CSAFPID-204282",
"CSAFPID-204324",
"CSAFPID-204818",
"CSAFPID-204828",
"CSAFPID-204831",
"CSAFPID-204832",
"CSAFPID-205064",
"CSAFPID-205672",
"CSAFPID-205731",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209034",
"CSAFPID-209035",
"CSAFPID-209036",
"CSAFPID-209037",
"CSAFPID-209038",
"CSAFPID-209039",
"CSAFPID-209040",
"CSAFPID-209041",
"CSAFPID-209043",
"CSAFPID-209044",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209059",
"CSAFPID-209060",
"CSAFPID-209061",
"CSAFPID-209063",
"CSAFPID-209065",
"CSAFPID-209091",
"CSAFPID-209093",
"CSAFPID-209095",
"CSAFPID-209268",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209421",
"CSAFPID-209439",
"CSAFPID-209455",
"CSAFPID-209465",
"CSAFPID-209466",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-210344",
"CSAFPID-210406",
"CSAFPID-210407",
"CSAFPID-210766",
"CSAFPID-210990",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-211717",
"CSAFPID-211976",
"CSAFPID-211982",
"CSAFPID-212329",
"CSAFPID-213023",
"CSAFPID-213032",
"CSAFPID-213788",
"CSAFPID-214052",
"CSAFPID-214053",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214797",
"CSAFPID-214992",
"CSAFPID-216295",
"CSAFPID-216344",
"CSAFPID-217078",
"CSAFPID-218891",
"CSAFPID-220440",
"CSAFPID-220442",
"CSAFPID-220466",
"CSAFPID-220467",
"CSAFPID-220640",
"CSAFPID-220650",
"CSAFPID-220670",
"CSAFPID-220673",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222342",
"CSAFPID-222436",
"CSAFPID-222650",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225358",
"CSAFPID-226038",
"CSAFPID-227285",
"CSAFPID-227307",
"CSAFPID-227364",
"CSAFPID-230584",
"CSAFPID-230585",
"CSAFPID-230594",
"CSAFPID-230964",
"CSAFPID-230965",
"CSAFPID-230966",
"CSAFPID-230967",
"CSAFPID-230968",
"CSAFPID-230969",
"CSAFPID-230970",
"CSAFPID-230971",
"CSAFPID-230973",
"CSAFPID-230974",
"CSAFPID-230976",
"CSAFPID-230977",
"CSAFPID-230982",
"CSAFPID-230983",
"CSAFPID-232850",
"CSAFPID-262335",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280759",
"CSAFPID-282026",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284566",
"CSAFPID-284785",
"CSAFPID-286029",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286844",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289371",
"CSAFPID-290557",
"CSAFPID-290618",
"CSAFPID-56052",
"CSAFPID-56055",
"CSAFPID-56056",
"CSAFPID-58331",
"CSAFPID-59292",
"CSAFPID-59293",
"CSAFPID-59294",
"CSAFPID-59295",
"CSAFPID-59296",
"CSAFPID-59297",
"CSAFPID-59298",
"CSAFPID-59299",
"CSAFPID-60350",
"CSAFPID-62555",
"CSAFPID-62570",
"CSAFPID-62571",
"CSAFPID-62573",
"CSAFPID-62574",
"CSAFPID-62575",
"CSAFPID-62576",
"CSAFPID-62585",
"CSAFPID-62603",
"CSAFPID-62613",
"CSAFPID-62614",
"CSAFPID-62616",
"CSAFPID-62618",
"CSAFPID-62622",
"CSAFPID-62623",
"CSAFPID-62625",
"CSAFPID-62626",
"CSAFPID-63189",
"CSAFPID-63194",
"CSAFPID-63196",
"CSAFPID-63197",
"CSAFPID-63198",
"CSAFPID-63204",
"CSAFPID-63378",
"CSAFPID-63379",
"CSAFPID-63380",
"CSAFPID-63381",
"CSAFPID-63382",
"CSAFPID-63384",
"CSAFPID-63385",
"CSAFPID-63387",
"CSAFPID-63388",
"CSAFPID-63389",
"CSAFPID-63498",
"CSAFPID-63499",
"CSAFPID-63501",
"CSAFPID-63937",
"CSAFPID-65434",
"CSAFPID-65435",
"CSAFPID-65437",
"CSAFPID-65439",
"CSAFPID-65440",
"CSAFPID-65453",
"CSAFPID-65454",
"CSAFPID-65455",
"CSAFPID-65470",
"CSAFPID-65471",
"CSAFPID-65488",
"CSAFPID-65490",
"CSAFPID-65491",
"CSAFPID-65509",
"CSAFPID-65510",
"CSAFPID-65511",
"CSAFPID-65513",
"CSAFPID-65514",
"CSAFPID-65517",
"CSAFPID-65518",
"CSAFPID-65520",
"CSAFPID-65527",
"CSAFPID-65528",
"CSAFPID-65529",
"CSAFPID-65530",
"CSAFPID-65532",
"CSAFPID-65535",
"CSAFPID-65536",
"CSAFPID-65538",
"CSAFPID-65539",
"CSAFPID-65542",
"CSAFPID-65543",
"CSAFPID-65544",
"CSAFPID-65545",
"CSAFPID-65546",
"CSAFPID-65549",
"CSAFPID-65551",
"CSAFPID-65552",
"CSAFPID-65554",
"CSAFPID-65557",
"CSAFPID-65559",
"CSAFPID-65560",
"CSAFPID-65561",
"CSAFPID-65562",
"CSAFPID-65899",
"CSAFPID-65900",
"CSAFPID-66054",
"CSAFPID-66055",
"CSAFPID-66056",
"CSAFPID-66058",
"CSAFPID-66059",
"CSAFPID-66062",
"CSAFPID-66207",
"CSAFPID-66213",
"CSAFPID-66328",
"CSAFPID-69484",
"CSAFPID-69755",
"CSAFPID-69756",
"CSAFPID-69757",
"CSAFPID-69758",
"CSAFPID-69759",
"CSAFPID-69760",
"CSAFPID-69761",
"CSAFPID-69762",
"CSAFPID-69763",
"CSAFPID-69764",
"CSAFPID-69776",
"CSAFPID-81746",
"CSAFPID-83376",
"CSAFPID-92384",
"CSAFPID-99645",
"CSAFPID-99647"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-100214",
"CSAFPID-103494",
"CSAFPID-103502",
"CSAFPID-103503",
"CSAFPID-103527",
"CSAFPID-103531",
"CSAFPID-103543",
"CSAFPID-103553",
"CSAFPID-103558",
"CSAFPID-103564",
"CSAFPID-103573",
"CSAFPID-103585",
"CSAFPID-103595",
"CSAFPID-103602",
"CSAFPID-103615",
"CSAFPID-103631",
"CSAFPID-103638",
"CSAFPID-103650",
"CSAFPID-103674",
"CSAFPID-103692",
"CSAFPID-103698",
"CSAFPID-103702",
"CSAFPID-103715",
"CSAFPID-103735",
"CSAFPID-103751",
"CSAFPID-103756",
"CSAFPID-103759",
"CSAFPID-103773",
"CSAFPID-103774",
"CSAFPID-103777",
"CSAFPID-103815",
"CSAFPID-103824",
"CSAFPID-103843",
"CSAFPID-103851",
"CSAFPID-103862",
"CSAFPID-103869",
"CSAFPID-103886",
"CSAFPID-103889",
"CSAFPID-103893",
"CSAFPID-103916",
"CSAFPID-103926",
"CSAFPID-103931",
"CSAFPID-103946",
"CSAFPID-103949",
"CSAFPID-103953",
"CSAFPID-103955",
"CSAFPID-103968",
"CSAFPID-104005",
"CSAFPID-104006",
"CSAFPID-104019",
"CSAFPID-104047",
"CSAFPID-104048",
"CSAFPID-104054",
"CSAFPID-104056",
"CSAFPID-104076",
"CSAFPID-104083",
"CSAFPID-104118",
"CSAFPID-104119",
"CSAFPID-104125",
"CSAFPID-104134",
"CSAFPID-104136",
"CSAFPID-104138",
"CSAFPID-104139",
"CSAFPID-104144",
"CSAFPID-104146",
"CSAFPID-104155",
"CSAFPID-104157",
"CSAFPID-104165",
"CSAFPID-104167",
"CSAFPID-104179",
"CSAFPID-104190",
"CSAFPID-104198",
"CSAFPID-104208",
"CSAFPID-104212",
"CSAFPID-104230",
"CSAFPID-104247",
"CSAFPID-104248",
"CSAFPID-104249",
"CSAFPID-104266",
"CSAFPID-104273",
"CSAFPID-104280",
"CSAFPID-104304",
"CSAFPID-104319",
"CSAFPID-104322",
"CSAFPID-104345",
"CSAFPID-104369",
"CSAFPID-104376",
"CSAFPID-104378",
"CSAFPID-104379",
"CSAFPID-104381",
"CSAFPID-104386",
"CSAFPID-104400",
"CSAFPID-104416",
"CSAFPID-104422",
"CSAFPID-104423",
"CSAFPID-104445",
"CSAFPID-104448",
"CSAFPID-104463",
"CSAFPID-104474",
"CSAFPID-104481",
"CSAFPID-104486",
"CSAFPID-104487",
"CSAFPID-104489",
"CSAFPID-104491",
"CSAFPID-104500",
"CSAFPID-104514",
"CSAFPID-104522",
"CSAFPID-104523",
"CSAFPID-104533",
"CSAFPID-104534",
"CSAFPID-104540",
"CSAFPID-104546",
"CSAFPID-104548",
"CSAFPID-104570",
"CSAFPID-104577",
"CSAFPID-104584",
"CSAFPID-104587",
"CSAFPID-104612",
"CSAFPID-104641",
"CSAFPID-104651",
"CSAFPID-104655",
"CSAFPID-104656",
"CSAFPID-104657",
"CSAFPID-104666",
"CSAFPID-104670",
"CSAFPID-104673",
"CSAFPID-104677",
"CSAFPID-104678",
"CSAFPID-104692",
"CSAFPID-104715",
"CSAFPID-104734",
"CSAFPID-104758",
"CSAFPID-104777",
"CSAFPID-104785",
"CSAFPID-104788",
"CSAFPID-104802",
"CSAFPID-104807",
"CSAFPID-104810",
"CSAFPID-104838",
"CSAFPID-104839",
"CSAFPID-104841",
"CSAFPID-104844",
"CSAFPID-104846",
"CSAFPID-104851",
"CSAFPID-104852",
"CSAFPID-104854",
"CSAFPID-104878",
"CSAFPID-104909",
"CSAFPID-104916",
"CSAFPID-104938",
"CSAFPID-104953",
"CSAFPID-104955",
"CSAFPID-104979",
"CSAFPID-104980",
"CSAFPID-104989",
"CSAFPID-104990",
"CSAFPID-104996",
"CSAFPID-105005",
"CSAFPID-105013",
"CSAFPID-105018",
"CSAFPID-105022",
"CSAFPID-105023",
"CSAFPID-105034",
"CSAFPID-105060",
"CSAFPID-105067",
"CSAFPID-105069",
"CSAFPID-105092",
"CSAFPID-105113",
"CSAFPID-105116",
"CSAFPID-105120",
"CSAFPID-105144",
"CSAFPID-105150",
"CSAFPID-105162",
"CSAFPID-105174",
"CSAFPID-105178",
"CSAFPID-105181",
"CSAFPID-105193",
"CSAFPID-105203",
"CSAFPID-105205",
"CSAFPID-105225",
"CSAFPID-105234",
"CSAFPID-105255",
"CSAFPID-105256",
"CSAFPID-105260",
"CSAFPID-105271",
"CSAFPID-105272",
"CSAFPID-105274",
"CSAFPID-105275",
"CSAFPID-105305",
"CSAFPID-105307",
"CSAFPID-105316",
"CSAFPID-105332",
"CSAFPID-105337",
"CSAFPID-105342",
"CSAFPID-105348",
"CSAFPID-105358",
"CSAFPID-105366",
"CSAFPID-105369",
"CSAFPID-105376",
"CSAFPID-105388",
"CSAFPID-105391",
"CSAFPID-105393",
"CSAFPID-105397",
"CSAFPID-105401",
"CSAFPID-105402",
"CSAFPID-105426",
"CSAFPID-105429",
"CSAFPID-105434",
"CSAFPID-105462",
"CSAFPID-105463",
"CSAFPID-105469",
"CSAFPID-105471",
"CSAFPID-105480",
"CSAFPID-105481",
"CSAFPID-105482",
"CSAFPID-105484",
"CSAFPID-105497",
"CSAFPID-105498",
"CSAFPID-105503",
"CSAFPID-105523",
"CSAFPID-105532",
"CSAFPID-105547",
"CSAFPID-105554",
"CSAFPID-105562",
"CSAFPID-105567",
"CSAFPID-105571",
"CSAFPID-105575",
"CSAFPID-105585",
"CSAFPID-105587",
"CSAFPID-105588",
"CSAFPID-105590",
"CSAFPID-105594",
"CSAFPID-105595",
"CSAFPID-105598",
"CSAFPID-105618",
"CSAFPID-105631",
"CSAFPID-105635",
"CSAFPID-105637",
"CSAFPID-105638",
"CSAFPID-105647",
"CSAFPID-105662",
"CSAFPID-105664",
"CSAFPID-105683",
"CSAFPID-105690",
"CSAFPID-105695",
"CSAFPID-105707",
"CSAFPID-105715",
"CSAFPID-105716",
"CSAFPID-105720",
"CSAFPID-105727",
"CSAFPID-105743",
"CSAFPID-105745",
"CSAFPID-105748",
"CSAFPID-105753",
"CSAFPID-105754",
"CSAFPID-105759",
"CSAFPID-105763",
"CSAFPID-105766",
"CSAFPID-105773",
"CSAFPID-105782",
"CSAFPID-105791",
"CSAFPID-105797",
"CSAFPID-105802",
"CSAFPID-105808",
"CSAFPID-105830",
"CSAFPID-105831",
"CSAFPID-105834",
"CSAFPID-105841",
"CSAFPID-105843",
"CSAFPID-105844",
"CSAFPID-105848",
"CSAFPID-105850",
"CSAFPID-105857",
"CSAFPID-105875",
"CSAFPID-105888",
"CSAFPID-105889",
"CSAFPID-105906",
"CSAFPID-105908",
"CSAFPID-105911",
"CSAFPID-105912",
"CSAFPID-105918",
"CSAFPID-105930",
"CSAFPID-105933",
"CSAFPID-105941",
"CSAFPID-105958",
"CSAFPID-105964",
"CSAFPID-105966",
"CSAFPID-105967",
"CSAFPID-105983",
"CSAFPID-105999",
"CSAFPID-106011",
"CSAFPID-106017",
"CSAFPID-106044",
"CSAFPID-106056",
"CSAFPID-106057",
"CSAFPID-106061",
"CSAFPID-106062",
"CSAFPID-106064",
"CSAFPID-106069",
"CSAFPID-106072",
"CSAFPID-106077",
"CSAFPID-106078",
"CSAFPID-106081",
"CSAFPID-106082",
"CSAFPID-106085",
"CSAFPID-106089",
"CSAFPID-106091",
"CSAFPID-106094",
"CSAFPID-106096",
"CSAFPID-106100",
"CSAFPID-106101",
"CSAFPID-106104",
"CSAFPID-106125",
"CSAFPID-106128",
"CSAFPID-106141",
"CSAFPID-106147",
"CSAFPID-106148",
"CSAFPID-106152",
"CSAFPID-106170",
"CSAFPID-106196",
"CSAFPID-106205",
"CSAFPID-106214",
"CSAFPID-106241",
"CSAFPID-106243",
"CSAFPID-106246",
"CSAFPID-106250",
"CSAFPID-106268",
"CSAFPID-106271",
"CSAFPID-106296",
"CSAFPID-106304",
"CSAFPID-106312",
"CSAFPID-106321",
"CSAFPID-106324",
"CSAFPID-106340",
"CSAFPID-106351",
"CSAFPID-106357",
"CSAFPID-106363",
"CSAFPID-106380",
"CSAFPID-106381",
"CSAFPID-106385",
"CSAFPID-106387",
"CSAFPID-106388",
"CSAFPID-106391",
"CSAFPID-106419",
"CSAFPID-106421",
"CSAFPID-106428",
"CSAFPID-106430",
"CSAFPID-106433",
"CSAFPID-106434",
"CSAFPID-106437",
"CSAFPID-106446",
"CSAFPID-106454",
"CSAFPID-106456",
"CSAFPID-106462",
"CSAFPID-106465",
"CSAFPID-106469",
"CSAFPID-106492",
"CSAFPID-106499",
"CSAFPID-106510",
"CSAFPID-106515",
"CSAFPID-106523",
"CSAFPID-106531",
"CSAFPID-106546",
"CSAFPID-106553",
"CSAFPID-106560",
"CSAFPID-106569",
"CSAFPID-106582",
"CSAFPID-106594",
"CSAFPID-106612",
"CSAFPID-106630",
"CSAFPID-106637",
"CSAFPID-106650",
"CSAFPID-106653",
"CSAFPID-106661",
"CSAFPID-106667",
"CSAFPID-106672",
"CSAFPID-106680",
"CSAFPID-106693",
"CSAFPID-106696",
"CSAFPID-106711",
"CSAFPID-106712",
"CSAFPID-106713",
"CSAFPID-106716",
"CSAFPID-106730",
"CSAFPID-106735",
"CSAFPID-106740",
"CSAFPID-106745",
"CSAFPID-106751",
"CSAFPID-106756",
"CSAFPID-106757",
"CSAFPID-106773",
"CSAFPID-106786",
"CSAFPID-106792",
"CSAFPID-106793",
"CSAFPID-106794",
"CSAFPID-106835",
"CSAFPID-106839",
"CSAFPID-106845",
"CSAFPID-106853",
"CSAFPID-106854",
"CSAFPID-106861",
"CSAFPID-106867",
"CSAFPID-106872",
"CSAFPID-106884",
"CSAFPID-106888",
"CSAFPID-106895",
"CSAFPID-106896",
"CSAFPID-106899",
"CSAFPID-106903",
"CSAFPID-106924",
"CSAFPID-106941",
"CSAFPID-106945",
"CSAFPID-106956",
"CSAFPID-106962",
"CSAFPID-106963",
"CSAFPID-106965",
"CSAFPID-106969",
"CSAFPID-106974",
"CSAFPID-106983",
"CSAFPID-106986",
"CSAFPID-106988",
"CSAFPID-106998",
"CSAFPID-107012",
"CSAFPID-107014",
"CSAFPID-107016",
"CSAFPID-107043",
"CSAFPID-107044",
"CSAFPID-107048",
"CSAFPID-107057",
"CSAFPID-107061",
"CSAFPID-107066",
"CSAFPID-107075",
"CSAFPID-107081",
"CSAFPID-107099",
"CSAFPID-107104",
"CSAFPID-107122",
"CSAFPID-107123",
"CSAFPID-107131",
"CSAFPID-107136",
"CSAFPID-107157",
"CSAFPID-107160",
"CSAFPID-107163",
"CSAFPID-107169",
"CSAFPID-107173",
"CSAFPID-107179",
"CSAFPID-107191",
"CSAFPID-107207",
"CSAFPID-107211",
"CSAFPID-107238",
"CSAFPID-107245",
"CSAFPID-107267",
"CSAFPID-107270",
"CSAFPID-107277",
"CSAFPID-107295",
"CSAFPID-107299",
"CSAFPID-107307",
"CSAFPID-107314",
"CSAFPID-107316",
"CSAFPID-107321",
"CSAFPID-107329",
"CSAFPID-107335",
"CSAFPID-107350",
"CSAFPID-107354",
"CSAFPID-107367",
"CSAFPID-107379",
"CSAFPID-107382",
"CSAFPID-107388",
"CSAFPID-107392",
"CSAFPID-107393",
"CSAFPID-107394",
"CSAFPID-107399",
"CSAFPID-107407",
"CSAFPID-107428",
"CSAFPID-107433",
"CSAFPID-107438",
"CSAFPID-107447",
"CSAFPID-107464",
"CSAFPID-107475",
"CSAFPID-107524",
"CSAFPID-107536",
"CSAFPID-107542",
"CSAFPID-107550",
"CSAFPID-107558",
"CSAFPID-107559",
"CSAFPID-107561",
"CSAFPID-107566",
"CSAFPID-107575",
"CSAFPID-107596",
"CSAFPID-107597",
"CSAFPID-107603",
"CSAFPID-107608",
"CSAFPID-107623",
"CSAFPID-107626",
"CSAFPID-107632",
"CSAFPID-107640",
"CSAFPID-107661",
"CSAFPID-107671",
"CSAFPID-107691",
"CSAFPID-107693",
"CSAFPID-107715",
"CSAFPID-107727",
"CSAFPID-107733",
"CSAFPID-107747",
"CSAFPID-107751",
"CSAFPID-107757",
"CSAFPID-107764",
"CSAFPID-107841",
"CSAFPID-107845",
"CSAFPID-107846",
"CSAFPID-107847",
"CSAFPID-107848",
"CSAFPID-107852",
"CSAFPID-107853",
"CSAFPID-107854",
"CSAFPID-107855",
"CSAFPID-107856",
"CSAFPID-107857",
"CSAFPID-107858",
"CSAFPID-107859",
"CSAFPID-107861",
"CSAFPID-108176",
"CSAFPID-108177",
"CSAFPID-108305",
"CSAFPID-108307",
"CSAFPID-108308",
"CSAFPID-108407",
"CSAFPID-108458",
"CSAFPID-108459",
"CSAFPID-108460",
"CSAFPID-108462",
"CSAFPID-108464",
"CSAFPID-108472",
"CSAFPID-108473",
"CSAFPID-108588",
"CSAFPID-108614",
"CSAFPID-108649",
"CSAFPID-108770",
"CSAFPID-108865",
"CSAFPID-108997",
"CSAFPID-108998",
"CSAFPID-109243",
"CSAFPID-109432",
"CSAFPID-109433",
"CSAFPID-109442",
"CSAFPID-109505",
"CSAFPID-109594",
"CSAFPID-109702",
"CSAFPID-109851",
"CSAFPID-110090",
"CSAFPID-110095",
"CSAFPID-110096",
"CSAFPID-111002",
"CSAFPID-111005",
"CSAFPID-111012",
"CSAFPID-111018",
"CSAFPID-111022",
"CSAFPID-111023",
"CSAFPID-111026",
"CSAFPID-111027",
"CSAFPID-111029",
"CSAFPID-111032",
"CSAFPID-111033",
"CSAFPID-111039",
"CSAFPID-111044",
"CSAFPID-111047",
"CSAFPID-111161",
"CSAFPID-111162",
"CSAFPID-111406",
"CSAFPID-111415",
"CSAFPID-111551",
"CSAFPID-111552",
"CSAFPID-111553",
"CSAFPID-111558",
"CSAFPID-111559",
"CSAFPID-111563",
"CSAFPID-111884",
"CSAFPID-112158",
"CSAFPID-112246",
"CSAFPID-112247",
"CSAFPID-112424",
"CSAFPID-112489",
"CSAFPID-112564",
"CSAFPID-113019",
"CSAFPID-113955",
"CSAFPID-113956",
"CSAFPID-113957",
"CSAFPID-113960",
"CSAFPID-113965",
"CSAFPID-113966",
"CSAFPID-113967",
"CSAFPID-113970",
"CSAFPID-113992",
"CSAFPID-113993",
"CSAFPID-114012",
"CSAFPID-114130",
"CSAFPID-114167",
"CSAFPID-114168",
"CSAFPID-114419",
"CSAFPID-115280",
"CSAFPID-115281",
"CSAFPID-115285",
"CSAFPID-115302",
"CSAFPID-115340",
"CSAFPID-115477",
"CSAFPID-115636",
"CSAFPID-115687",
"CSAFPID-115736",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-115981",
"CSAFPID-115982",
"CSAFPID-116045",
"CSAFPID-116083",
"CSAFPID-116144",
"CSAFPID-116219",
"CSAFPID-116254",
"CSAFPID-116256",
"CSAFPID-116726",
"CSAFPID-116774",
"CSAFPID-116838",
"CSAFPID-117196",
"CSAFPID-117535",
"CSAFPID-117681",
"CSAFPID-117682",
"CSAFPID-117683",
"CSAFPID-117783",
"CSAFPID-117789",
"CSAFPID-117800",
"CSAFPID-117801",
"CSAFPID-117802",
"CSAFPID-117803",
"CSAFPID-117804",
"CSAFPID-183785",
"CSAFPID-183811",
"CSAFPID-183813",
"CSAFPID-183835",
"CSAFPID-183836",
"CSAFPID-183837",
"CSAFPID-183838",
"CSAFPID-183839",
"CSAFPID-184092",
"CSAFPID-184123",
"CSAFPID-184124",
"CSAFPID-184264",
"CSAFPID-184570",
"CSAFPID-184858",
"CSAFPID-184887",
"CSAFPID-184932",
"CSAFPID-185011",
"CSAFPID-185191",
"CSAFPID-185281",
"CSAFPID-185352",
"CSAFPID-185642",
"CSAFPID-186998",
"CSAFPID-187057",
"CSAFPID-187147",
"CSAFPID-187231",
"CSAFPID-187232",
"CSAFPID-187269",
"CSAFPID-187412",
"CSAFPID-187425",
"CSAFPID-187826",
"CSAFPID-187932",
"CSAFPID-187958",
"CSAFPID-187962",
"CSAFPID-188008",
"CSAFPID-188035",
"CSAFPID-188061",
"CSAFPID-188501",
"CSAFPID-188817",
"CSAFPID-189064",
"CSAFPID-189115",
"CSAFPID-189219",
"CSAFPID-189455",
"CSAFPID-189457",
"CSAFPID-189612",
"CSAFPID-189617",
"CSAFPID-189739",
"CSAFPID-189765",
"CSAFPID-189908",
"CSAFPID-190250",
"CSAFPID-190432",
"CSAFPID-190493",
"CSAFPID-190635",
"CSAFPID-190637",
"CSAFPID-190638",
"CSAFPID-190639",
"CSAFPID-190978",
"CSAFPID-190983",
"CSAFPID-191331",
"CSAFPID-191336",
"CSAFPID-191566",
"CSAFPID-191635",
"CSAFPID-191686",
"CSAFPID-191928",
"CSAFPID-191942",
"CSAFPID-191948",
"CSAFPID-192041",
"CSAFPID-192156",
"CSAFPID-192423",
"CSAFPID-192447",
"CSAFPID-192704",
"CSAFPID-192706",
"CSAFPID-192726",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192937",
"CSAFPID-192990",
"CSAFPID-193177",
"CSAFPID-193180",
"CSAFPID-193283",
"CSAFPID-193284",
"CSAFPID-193315",
"CSAFPID-193316",
"CSAFPID-193317",
"CSAFPID-193321",
"CSAFPID-193347",
"CSAFPID-193406",
"CSAFPID-193407",
"CSAFPID-193408",
"CSAFPID-193409",
"CSAFPID-193628",
"CSAFPID-194433",
"CSAFPID-194439",
"CSAFPID-194467",
"CSAFPID-194509",
"CSAFPID-194540",
"CSAFPID-194585",
"CSAFPID-194586",
"CSAFPID-194727",
"CSAFPID-194741",
"CSAFPID-194877",
"CSAFPID-194913",
"CSAFPID-194942",
"CSAFPID-194943",
"CSAFPID-194944",
"CSAFPID-195024",
"CSAFPID-195033",
"CSAFPID-195062",
"CSAFPID-195469",
"CSAFPID-195481",
"CSAFPID-195489",
"CSAFPID-195519",
"CSAFPID-195544",
"CSAFPID-195636",
"CSAFPID-195688",
"CSAFPID-195770",
"CSAFPID-195771",
"CSAFPID-195876",
"CSAFPID-195943",
"CSAFPID-195977",
"CSAFPID-196114",
"CSAFPID-196115",
"CSAFPID-196255",
"CSAFPID-196256",
"CSAFPID-196417",
"CSAFPID-196528",
"CSAFPID-197462",
"CSAFPID-197463",
"CSAFPID-197465",
"CSAFPID-197468",
"CSAFPID-197469",
"CSAFPID-197471",
"CSAFPID-197474",
"CSAFPID-197483",
"CSAFPID-197489",
"CSAFPID-197493",
"CSAFPID-197495",
"CSAFPID-198055",
"CSAFPID-198056",
"CSAFPID-198059",
"CSAFPID-198060",
"CSAFPID-198063",
"CSAFPID-198065",
"CSAFPID-198066",
"CSAFPID-198067",
"CSAFPID-198214",
"CSAFPID-198215",
"CSAFPID-198425",
"CSAFPID-198426",
"CSAFPID-198524",
"CSAFPID-200486",
"CSAFPID-200488",
"CSAFPID-200489",
"CSAFPID-200495",
"CSAFPID-200496",
"CSAFPID-200502",
"CSAFPID-200503",
"CSAFPID-200506",
"CSAFPID-200634",
"CSAFPID-200635",
"CSAFPID-201019",
"CSAFPID-201074",
"CSAFPID-201079",
"CSAFPID-201259",
"CSAFPID-201336",
"CSAFPID-201366",
"CSAFPID-201448",
"CSAFPID-201683",
"CSAFPID-202559",
"CSAFPID-202565",
"CSAFPID-203046",
"CSAFPID-203066",
"CSAFPID-204094",
"CSAFPID-204097",
"CSAFPID-204101",
"CSAFPID-204102",
"CSAFPID-204109",
"CSAFPID-204110",
"CSAFPID-204186",
"CSAFPID-204187",
"CSAFPID-204228",
"CSAFPID-204282",
"CSAFPID-204324",
"CSAFPID-204818",
"CSAFPID-204828",
"CSAFPID-204831",
"CSAFPID-204832",
"CSAFPID-205064",
"CSAFPID-205672",
"CSAFPID-205731",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209034",
"CSAFPID-209035",
"CSAFPID-209036",
"CSAFPID-209037",
"CSAFPID-209038",
"CSAFPID-209039",
"CSAFPID-209040",
"CSAFPID-209041",
"CSAFPID-209043",
"CSAFPID-209044",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209059",
"CSAFPID-209060",
"CSAFPID-209061",
"CSAFPID-209063",
"CSAFPID-209065",
"CSAFPID-209091",
"CSAFPID-209093",
"CSAFPID-209095",
"CSAFPID-209268",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209421",
"CSAFPID-209439",
"CSAFPID-209455",
"CSAFPID-209465",
"CSAFPID-209466",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-210344",
"CSAFPID-210406",
"CSAFPID-210407",
"CSAFPID-210766",
"CSAFPID-210990",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-211717",
"CSAFPID-211976",
"CSAFPID-211982",
"CSAFPID-212329",
"CSAFPID-213023",
"CSAFPID-213032",
"CSAFPID-213788",
"CSAFPID-214052",
"CSAFPID-214053",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214797",
"CSAFPID-214992",
"CSAFPID-216295",
"CSAFPID-216344",
"CSAFPID-217078",
"CSAFPID-218891",
"CSAFPID-220440",
"CSAFPID-220442",
"CSAFPID-220466",
"CSAFPID-220467",
"CSAFPID-220640",
"CSAFPID-220650",
"CSAFPID-220670",
"CSAFPID-220673",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222342",
"CSAFPID-222436",
"CSAFPID-222650",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225358",
"CSAFPID-226038",
"CSAFPID-227285",
"CSAFPID-227307",
"CSAFPID-227364",
"CSAFPID-230584",
"CSAFPID-230585",
"CSAFPID-230594",
"CSAFPID-230964",
"CSAFPID-230965",
"CSAFPID-230966",
"CSAFPID-230967",
"CSAFPID-230968",
"CSAFPID-230969",
"CSAFPID-230970",
"CSAFPID-230971",
"CSAFPID-230973",
"CSAFPID-230974",
"CSAFPID-230976",
"CSAFPID-230977",
"CSAFPID-230982",
"CSAFPID-230983",
"CSAFPID-232850",
"CSAFPID-262335",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280759",
"CSAFPID-282026",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284566",
"CSAFPID-284785",
"CSAFPID-286029",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286844",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289371",
"CSAFPID-290557",
"CSAFPID-290618",
"CSAFPID-56052",
"CSAFPID-56055",
"CSAFPID-56056",
"CSAFPID-58331",
"CSAFPID-59292",
"CSAFPID-59293",
"CSAFPID-59294",
"CSAFPID-59295",
"CSAFPID-59296",
"CSAFPID-59297",
"CSAFPID-59298",
"CSAFPID-59299",
"CSAFPID-60350",
"CSAFPID-62555",
"CSAFPID-62570",
"CSAFPID-62571",
"CSAFPID-62573",
"CSAFPID-62574",
"CSAFPID-62575",
"CSAFPID-62576",
"CSAFPID-62585",
"CSAFPID-62603",
"CSAFPID-62613",
"CSAFPID-62614",
"CSAFPID-62616",
"CSAFPID-62618",
"CSAFPID-62622",
"CSAFPID-62623",
"CSAFPID-62625",
"CSAFPID-62626",
"CSAFPID-63189",
"CSAFPID-63194",
"CSAFPID-63196",
"CSAFPID-63197",
"CSAFPID-63198",
"CSAFPID-63204",
"CSAFPID-63378",
"CSAFPID-63379",
"CSAFPID-63380",
"CSAFPID-63381",
"CSAFPID-63382",
"CSAFPID-63384",
"CSAFPID-63385",
"CSAFPID-63387",
"CSAFPID-63388",
"CSAFPID-63389",
"CSAFPID-63498",
"CSAFPID-63499",
"CSAFPID-63501",
"CSAFPID-63937",
"CSAFPID-65434",
"CSAFPID-65435",
"CSAFPID-65437",
"CSAFPID-65439",
"CSAFPID-65440",
"CSAFPID-65453",
"CSAFPID-65454",
"CSAFPID-65455",
"CSAFPID-65470",
"CSAFPID-65471",
"CSAFPID-65488",
"CSAFPID-65490",
"CSAFPID-65491",
"CSAFPID-65509",
"CSAFPID-65510",
"CSAFPID-65511",
"CSAFPID-65513",
"CSAFPID-65514",
"CSAFPID-65517",
"CSAFPID-65518",
"CSAFPID-65520",
"CSAFPID-65527",
"CSAFPID-65528",
"CSAFPID-65529",
"CSAFPID-65530",
"CSAFPID-65532",
"CSAFPID-65535",
"CSAFPID-65536",
"CSAFPID-65538",
"CSAFPID-65539",
"CSAFPID-65542",
"CSAFPID-65543",
"CSAFPID-65544",
"CSAFPID-65545",
"CSAFPID-65546",
"CSAFPID-65549",
"CSAFPID-65551",
"CSAFPID-65552",
"CSAFPID-65554",
"CSAFPID-65557",
"CSAFPID-65559",
"CSAFPID-65560",
"CSAFPID-65561",
"CSAFPID-65562",
"CSAFPID-65899",
"CSAFPID-65900",
"CSAFPID-66054",
"CSAFPID-66055",
"CSAFPID-66056",
"CSAFPID-66058",
"CSAFPID-66059",
"CSAFPID-66062",
"CSAFPID-66207",
"CSAFPID-66213",
"CSAFPID-66328",
"CSAFPID-69484",
"CSAFPID-69755",
"CSAFPID-69756",
"CSAFPID-69757",
"CSAFPID-69758",
"CSAFPID-69759",
"CSAFPID-69760",
"CSAFPID-69761",
"CSAFPID-69762",
"CSAFPID-69763",
"CSAFPID-69764",
"CSAFPID-69776",
"CSAFPID-81746",
"CSAFPID-83376",
"CSAFPID-92384",
"CSAFPID-99645",
"CSAFPID-99647"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-100214",
"CSAFPID-103494",
"CSAFPID-103502",
"CSAFPID-103503",
"CSAFPID-103527",
"CSAFPID-103531",
"CSAFPID-103543",
"CSAFPID-103553",
"CSAFPID-103558",
"CSAFPID-103564",
"CSAFPID-103573",
"CSAFPID-103585",
"CSAFPID-103595",
"CSAFPID-103602",
"CSAFPID-103615",
"CSAFPID-103631",
"CSAFPID-103638",
"CSAFPID-103650",
"CSAFPID-103674",
"CSAFPID-103692",
"CSAFPID-103698",
"CSAFPID-103702",
"CSAFPID-103715",
"CSAFPID-103735",
"CSAFPID-103751",
"CSAFPID-103756",
"CSAFPID-103759",
"CSAFPID-103773",
"CSAFPID-103774",
"CSAFPID-103777",
"CSAFPID-103815",
"CSAFPID-103824",
"CSAFPID-103843",
"CSAFPID-103851",
"CSAFPID-103862",
"CSAFPID-103869",
"CSAFPID-103886",
"CSAFPID-103889",
"CSAFPID-103893",
"CSAFPID-103916",
"CSAFPID-103926",
"CSAFPID-103931",
"CSAFPID-103946",
"CSAFPID-103949",
"CSAFPID-103953",
"CSAFPID-103955",
"CSAFPID-103968",
"CSAFPID-104005",
"CSAFPID-104006",
"CSAFPID-104019",
"CSAFPID-104047",
"CSAFPID-104048",
"CSAFPID-104054",
"CSAFPID-104056",
"CSAFPID-104076",
"CSAFPID-104083",
"CSAFPID-104118",
"CSAFPID-104119",
"CSAFPID-104125",
"CSAFPID-104134",
"CSAFPID-104136",
"CSAFPID-104138",
"CSAFPID-104139",
"CSAFPID-104144",
"CSAFPID-104146",
"CSAFPID-104155",
"CSAFPID-104157",
"CSAFPID-104165",
"CSAFPID-104167",
"CSAFPID-104179",
"CSAFPID-104190",
"CSAFPID-104198",
"CSAFPID-104208",
"CSAFPID-104212",
"CSAFPID-104230",
"CSAFPID-104247",
"CSAFPID-104248",
"CSAFPID-104249",
"CSAFPID-104266",
"CSAFPID-104273",
"CSAFPID-104280",
"CSAFPID-104304",
"CSAFPID-104319",
"CSAFPID-104322",
"CSAFPID-104345",
"CSAFPID-104369",
"CSAFPID-104376",
"CSAFPID-104378",
"CSAFPID-104379",
"CSAFPID-104381",
"CSAFPID-104386",
"CSAFPID-104400",
"CSAFPID-104416",
"CSAFPID-104422",
"CSAFPID-104423",
"CSAFPID-104445",
"CSAFPID-104448",
"CSAFPID-104463",
"CSAFPID-104474",
"CSAFPID-104481",
"CSAFPID-104486",
"CSAFPID-104487",
"CSAFPID-104489",
"CSAFPID-104491",
"CSAFPID-104500",
"CSAFPID-104514",
"CSAFPID-104522",
"CSAFPID-104523",
"CSAFPID-104533",
"CSAFPID-104534",
"CSAFPID-104540",
"CSAFPID-104546",
"CSAFPID-104548",
"CSAFPID-104570",
"CSAFPID-104577",
"CSAFPID-104584",
"CSAFPID-104587",
"CSAFPID-104612",
"CSAFPID-104641",
"CSAFPID-104651",
"CSAFPID-104655",
"CSAFPID-104656",
"CSAFPID-104657",
"CSAFPID-104666",
"CSAFPID-104670",
"CSAFPID-104673",
"CSAFPID-104677",
"CSAFPID-104678",
"CSAFPID-104692",
"CSAFPID-104715",
"CSAFPID-104734",
"CSAFPID-104758",
"CSAFPID-104777",
"CSAFPID-104785",
"CSAFPID-104788",
"CSAFPID-104802",
"CSAFPID-104807",
"CSAFPID-104810",
"CSAFPID-104838",
"CSAFPID-104839",
"CSAFPID-104841",
"CSAFPID-104844",
"CSAFPID-104846",
"CSAFPID-104851",
"CSAFPID-104852",
"CSAFPID-104854",
"CSAFPID-104878",
"CSAFPID-104909",
"CSAFPID-104916",
"CSAFPID-104938",
"CSAFPID-104953",
"CSAFPID-104955",
"CSAFPID-104979",
"CSAFPID-104980",
"CSAFPID-104989",
"CSAFPID-104990",
"CSAFPID-104996",
"CSAFPID-105005",
"CSAFPID-105013",
"CSAFPID-105018",
"CSAFPID-105022",
"CSAFPID-105023",
"CSAFPID-105034",
"CSAFPID-105060",
"CSAFPID-105067",
"CSAFPID-105069",
"CSAFPID-105092",
"CSAFPID-105113",
"CSAFPID-105116",
"CSAFPID-105120",
"CSAFPID-105144",
"CSAFPID-105150",
"CSAFPID-105162",
"CSAFPID-105174",
"CSAFPID-105178",
"CSAFPID-105181",
"CSAFPID-105193",
"CSAFPID-105203",
"CSAFPID-105205",
"CSAFPID-105225",
"CSAFPID-105234",
"CSAFPID-105255",
"CSAFPID-105256",
"CSAFPID-105260",
"CSAFPID-105271",
"CSAFPID-105272",
"CSAFPID-105274",
"CSAFPID-105275",
"CSAFPID-105305",
"CSAFPID-105307",
"CSAFPID-105316",
"CSAFPID-105332",
"CSAFPID-105337",
"CSAFPID-105342",
"CSAFPID-105348",
"CSAFPID-105358",
"CSAFPID-105366",
"CSAFPID-105369",
"CSAFPID-105376",
"CSAFPID-105388",
"CSAFPID-105391",
"CSAFPID-105393",
"CSAFPID-105397",
"CSAFPID-105401",
"CSAFPID-105402",
"CSAFPID-105426",
"CSAFPID-105429",
"CSAFPID-105434",
"CSAFPID-105462",
"CSAFPID-105463",
"CSAFPID-105469",
"CSAFPID-105471",
"CSAFPID-105480",
"CSAFPID-105481",
"CSAFPID-105482",
"CSAFPID-105484",
"CSAFPID-105497",
"CSAFPID-105498",
"CSAFPID-105503",
"CSAFPID-105523",
"CSAFPID-105532",
"CSAFPID-105547",
"CSAFPID-105554",
"CSAFPID-105562",
"CSAFPID-105567",
"CSAFPID-105571",
"CSAFPID-105575",
"CSAFPID-105585",
"CSAFPID-105587",
"CSAFPID-105588",
"CSAFPID-105590",
"CSAFPID-105594",
"CSAFPID-105595",
"CSAFPID-105598",
"CSAFPID-105618",
"CSAFPID-105631",
"CSAFPID-105635",
"CSAFPID-105637",
"CSAFPID-105638",
"CSAFPID-105647",
"CSAFPID-105662",
"CSAFPID-105664",
"CSAFPID-105683",
"CSAFPID-105690",
"CSAFPID-105695",
"CSAFPID-105707",
"CSAFPID-105715",
"CSAFPID-105716",
"CSAFPID-105720",
"CSAFPID-105727",
"CSAFPID-105743",
"CSAFPID-105745",
"CSAFPID-105748",
"CSAFPID-105753",
"CSAFPID-105754",
"CSAFPID-105759",
"CSAFPID-105763",
"CSAFPID-105766",
"CSAFPID-105773",
"CSAFPID-105782",
"CSAFPID-105791",
"CSAFPID-105797",
"CSAFPID-105802",
"CSAFPID-105808",
"CSAFPID-105830",
"CSAFPID-105831",
"CSAFPID-105834",
"CSAFPID-105841",
"CSAFPID-105843",
"CSAFPID-105844",
"CSAFPID-105848",
"CSAFPID-105850",
"CSAFPID-105857",
"CSAFPID-105875",
"CSAFPID-105888",
"CSAFPID-105889",
"CSAFPID-105906",
"CSAFPID-105908",
"CSAFPID-105911",
"CSAFPID-105912",
"CSAFPID-105918",
"CSAFPID-105930",
"CSAFPID-105933",
"CSAFPID-105941",
"CSAFPID-105958",
"CSAFPID-105964",
"CSAFPID-105966",
"CSAFPID-105967",
"CSAFPID-105983",
"CSAFPID-105999",
"CSAFPID-106011",
"CSAFPID-106017",
"CSAFPID-106044",
"CSAFPID-106056",
"CSAFPID-106057",
"CSAFPID-106061",
"CSAFPID-106062",
"CSAFPID-106064",
"CSAFPID-106069",
"CSAFPID-106072",
"CSAFPID-106077",
"CSAFPID-106078",
"CSAFPID-106081",
"CSAFPID-106082",
"CSAFPID-106085",
"CSAFPID-106089",
"CSAFPID-106091",
"CSAFPID-106094",
"CSAFPID-106096",
"CSAFPID-106100",
"CSAFPID-106101",
"CSAFPID-106104",
"CSAFPID-106125",
"CSAFPID-106128",
"CSAFPID-106141",
"CSAFPID-106147",
"CSAFPID-106148",
"CSAFPID-106152",
"CSAFPID-106170",
"CSAFPID-106196",
"CSAFPID-106205",
"CSAFPID-106214",
"CSAFPID-106241",
"CSAFPID-106243",
"CSAFPID-106246",
"CSAFPID-106250",
"CSAFPID-106268",
"CSAFPID-106271",
"CSAFPID-106296",
"CSAFPID-106304",
"CSAFPID-106312",
"CSAFPID-106321",
"CSAFPID-106324",
"CSAFPID-106340",
"CSAFPID-106351",
"CSAFPID-106357",
"CSAFPID-106363",
"CSAFPID-106380",
"CSAFPID-106381",
"CSAFPID-106385",
"CSAFPID-106387",
"CSAFPID-106388",
"CSAFPID-106391",
"CSAFPID-106419",
"CSAFPID-106421",
"CSAFPID-106428",
"CSAFPID-106430",
"CSAFPID-106433",
"CSAFPID-106434",
"CSAFPID-106437",
"CSAFPID-106446",
"CSAFPID-106454",
"CSAFPID-106456",
"CSAFPID-106462",
"CSAFPID-106465",
"CSAFPID-106469",
"CSAFPID-106492",
"CSAFPID-106499",
"CSAFPID-106510",
"CSAFPID-106515",
"CSAFPID-106523",
"CSAFPID-106531",
"CSAFPID-106546",
"CSAFPID-106553",
"CSAFPID-106560",
"CSAFPID-106569",
"CSAFPID-106582",
"CSAFPID-106594",
"CSAFPID-106612",
"CSAFPID-106630",
"CSAFPID-106637",
"CSAFPID-106650",
"CSAFPID-106653",
"CSAFPID-106661",
"CSAFPID-106667",
"CSAFPID-106672",
"CSAFPID-106680",
"CSAFPID-106693",
"CSAFPID-106696",
"CSAFPID-106711",
"CSAFPID-106712",
"CSAFPID-106713",
"CSAFPID-106716",
"CSAFPID-106730",
"CSAFPID-106735",
"CSAFPID-106740",
"CSAFPID-106745",
"CSAFPID-106751",
"CSAFPID-106756",
"CSAFPID-106757",
"CSAFPID-106773",
"CSAFPID-106786",
"CSAFPID-106792",
"CSAFPID-106793",
"CSAFPID-106794",
"CSAFPID-106835",
"CSAFPID-106839",
"CSAFPID-106845",
"CSAFPID-106853",
"CSAFPID-106854",
"CSAFPID-106861",
"CSAFPID-106867",
"CSAFPID-106872",
"CSAFPID-106884",
"CSAFPID-106888",
"CSAFPID-106895",
"CSAFPID-106896",
"CSAFPID-106899",
"CSAFPID-106903",
"CSAFPID-106924",
"CSAFPID-106941",
"CSAFPID-106945",
"CSAFPID-106956",
"CSAFPID-106962",
"CSAFPID-106963",
"CSAFPID-106965",
"CSAFPID-106969",
"CSAFPID-106974",
"CSAFPID-106983",
"CSAFPID-106986",
"CSAFPID-106988",
"CSAFPID-106998",
"CSAFPID-107012",
"CSAFPID-107014",
"CSAFPID-107016",
"CSAFPID-107043",
"CSAFPID-107044",
"CSAFPID-107048",
"CSAFPID-107057",
"CSAFPID-107061",
"CSAFPID-107066",
"CSAFPID-107075",
"CSAFPID-107081",
"CSAFPID-107099",
"CSAFPID-107104",
"CSAFPID-107122",
"CSAFPID-107123",
"CSAFPID-107131",
"CSAFPID-107136",
"CSAFPID-107157",
"CSAFPID-107160",
"CSAFPID-107163",
"CSAFPID-107169",
"CSAFPID-107173",
"CSAFPID-107179",
"CSAFPID-107191",
"CSAFPID-107207",
"CSAFPID-107211",
"CSAFPID-107238",
"CSAFPID-107245",
"CSAFPID-107267",
"CSAFPID-107270",
"CSAFPID-107277",
"CSAFPID-107295",
"CSAFPID-107299",
"CSAFPID-107307",
"CSAFPID-107314",
"CSAFPID-107316",
"CSAFPID-107321",
"CSAFPID-107329",
"CSAFPID-107335",
"CSAFPID-107350",
"CSAFPID-107354",
"CSAFPID-107367",
"CSAFPID-107379",
"CSAFPID-107382",
"CSAFPID-107388",
"CSAFPID-107392",
"CSAFPID-107393",
"CSAFPID-107394",
"CSAFPID-107399",
"CSAFPID-107407",
"CSAFPID-107428",
"CSAFPID-107433",
"CSAFPID-107438",
"CSAFPID-107447",
"CSAFPID-107464",
"CSAFPID-107475",
"CSAFPID-107524",
"CSAFPID-107536",
"CSAFPID-107542",
"CSAFPID-107550",
"CSAFPID-107558",
"CSAFPID-107559",
"CSAFPID-107561",
"CSAFPID-107566",
"CSAFPID-107575",
"CSAFPID-107596",
"CSAFPID-107597",
"CSAFPID-107603",
"CSAFPID-107608",
"CSAFPID-107623",
"CSAFPID-107626",
"CSAFPID-107632",
"CSAFPID-107640",
"CSAFPID-107661",
"CSAFPID-107671",
"CSAFPID-107691",
"CSAFPID-107693",
"CSAFPID-107715",
"CSAFPID-107727",
"CSAFPID-107733",
"CSAFPID-107747",
"CSAFPID-107751",
"CSAFPID-107757",
"CSAFPID-107764",
"CSAFPID-107841",
"CSAFPID-107845",
"CSAFPID-107846",
"CSAFPID-107847",
"CSAFPID-107848",
"CSAFPID-107852",
"CSAFPID-107853",
"CSAFPID-107854",
"CSAFPID-107855",
"CSAFPID-107856",
"CSAFPID-107857",
"CSAFPID-107858",
"CSAFPID-107859",
"CSAFPID-107861",
"CSAFPID-108176",
"CSAFPID-108177",
"CSAFPID-108305",
"CSAFPID-108307",
"CSAFPID-108308",
"CSAFPID-108407",
"CSAFPID-108458",
"CSAFPID-108459",
"CSAFPID-108460",
"CSAFPID-108462",
"CSAFPID-108464",
"CSAFPID-108472",
"CSAFPID-108473",
"CSAFPID-108588",
"CSAFPID-108614",
"CSAFPID-108649",
"CSAFPID-108770",
"CSAFPID-108865",
"CSAFPID-108997",
"CSAFPID-108998",
"CSAFPID-109243",
"CSAFPID-109432",
"CSAFPID-109433",
"CSAFPID-109442",
"CSAFPID-109505",
"CSAFPID-109594",
"CSAFPID-109702",
"CSAFPID-109851",
"CSAFPID-110090",
"CSAFPID-110095",
"CSAFPID-110096",
"CSAFPID-111002",
"CSAFPID-111005",
"CSAFPID-111012",
"CSAFPID-111018",
"CSAFPID-111022",
"CSAFPID-111023",
"CSAFPID-111026",
"CSAFPID-111027",
"CSAFPID-111029",
"CSAFPID-111032",
"CSAFPID-111033",
"CSAFPID-111039",
"CSAFPID-111044",
"CSAFPID-111047",
"CSAFPID-111161",
"CSAFPID-111162",
"CSAFPID-111406",
"CSAFPID-111415",
"CSAFPID-111551",
"CSAFPID-111552",
"CSAFPID-111553",
"CSAFPID-111558",
"CSAFPID-111559",
"CSAFPID-111563",
"CSAFPID-111884",
"CSAFPID-112158",
"CSAFPID-112246",
"CSAFPID-112247",
"CSAFPID-112424",
"CSAFPID-112489",
"CSAFPID-112564",
"CSAFPID-113019",
"CSAFPID-113955",
"CSAFPID-113956",
"CSAFPID-113957",
"CSAFPID-113960",
"CSAFPID-113965",
"CSAFPID-113966",
"CSAFPID-113967",
"CSAFPID-113970",
"CSAFPID-113992",
"CSAFPID-113993",
"CSAFPID-114012",
"CSAFPID-114130",
"CSAFPID-114167",
"CSAFPID-114168",
"CSAFPID-114419",
"CSAFPID-115280",
"CSAFPID-115281",
"CSAFPID-115285",
"CSAFPID-115302",
"CSAFPID-115340",
"CSAFPID-115477",
"CSAFPID-115636",
"CSAFPID-115687",
"CSAFPID-115736",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-115981",
"CSAFPID-115982",
"CSAFPID-116045",
"CSAFPID-116083",
"CSAFPID-116144",
"CSAFPID-116219",
"CSAFPID-116254",
"CSAFPID-116256",
"CSAFPID-116726",
"CSAFPID-116774",
"CSAFPID-116838",
"CSAFPID-117196",
"CSAFPID-117535",
"CSAFPID-117681",
"CSAFPID-117682",
"CSAFPID-117683",
"CSAFPID-117783",
"CSAFPID-117789",
"CSAFPID-117800",
"CSAFPID-117801",
"CSAFPID-117802",
"CSAFPID-117803",
"CSAFPID-117804",
"CSAFPID-183785",
"CSAFPID-183811",
"CSAFPID-183813",
"CSAFPID-183835",
"CSAFPID-183836",
"CSAFPID-183837",
"CSAFPID-183838",
"CSAFPID-183839",
"CSAFPID-184092",
"CSAFPID-184123",
"CSAFPID-184124",
"CSAFPID-184264",
"CSAFPID-184570",
"CSAFPID-184858",
"CSAFPID-184887",
"CSAFPID-184932",
"CSAFPID-185011",
"CSAFPID-185191",
"CSAFPID-185281",
"CSAFPID-185352",
"CSAFPID-185642",
"CSAFPID-186998",
"CSAFPID-187057",
"CSAFPID-187147",
"CSAFPID-187231",
"CSAFPID-187232",
"CSAFPID-187269",
"CSAFPID-187412",
"CSAFPID-187425",
"CSAFPID-187826",
"CSAFPID-187932",
"CSAFPID-187958",
"CSAFPID-187962",
"CSAFPID-188008",
"CSAFPID-188035",
"CSAFPID-188061",
"CSAFPID-188501",
"CSAFPID-188817",
"CSAFPID-189064",
"CSAFPID-189115",
"CSAFPID-189219",
"CSAFPID-189455",
"CSAFPID-189457",
"CSAFPID-189612",
"CSAFPID-189617",
"CSAFPID-189739",
"CSAFPID-189765",
"CSAFPID-189908",
"CSAFPID-190250",
"CSAFPID-190432",
"CSAFPID-190493",
"CSAFPID-190635",
"CSAFPID-190637",
"CSAFPID-190638",
"CSAFPID-190639",
"CSAFPID-190978",
"CSAFPID-190983",
"CSAFPID-191331",
"CSAFPID-191336",
"CSAFPID-191566",
"CSAFPID-191635",
"CSAFPID-191686",
"CSAFPID-191928",
"CSAFPID-191942",
"CSAFPID-191948",
"CSAFPID-192041",
"CSAFPID-192156",
"CSAFPID-192423",
"CSAFPID-192447",
"CSAFPID-192704",
"CSAFPID-192706",
"CSAFPID-192726",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192937",
"CSAFPID-192990",
"CSAFPID-193177",
"CSAFPID-193180",
"CSAFPID-193283",
"CSAFPID-193284",
"CSAFPID-193315",
"CSAFPID-193316",
"CSAFPID-193317",
"CSAFPID-193321",
"CSAFPID-193347",
"CSAFPID-193406",
"CSAFPID-193407",
"CSAFPID-193408",
"CSAFPID-193409",
"CSAFPID-193628",
"CSAFPID-194433",
"CSAFPID-194439",
"CSAFPID-194467",
"CSAFPID-194509",
"CSAFPID-194540",
"CSAFPID-194585",
"CSAFPID-194586",
"CSAFPID-194727",
"CSAFPID-194741",
"CSAFPID-194877",
"CSAFPID-194913",
"CSAFPID-194942",
"CSAFPID-194943",
"CSAFPID-194944",
"CSAFPID-195024",
"CSAFPID-195033",
"CSAFPID-195062",
"CSAFPID-195469",
"CSAFPID-195481",
"CSAFPID-195489",
"CSAFPID-195519",
"CSAFPID-195544",
"CSAFPID-195636",
"CSAFPID-195688",
"CSAFPID-195770",
"CSAFPID-195771",
"CSAFPID-195876",
"CSAFPID-195943",
"CSAFPID-195977",
"CSAFPID-196114",
"CSAFPID-196115",
"CSAFPID-196255",
"CSAFPID-196256",
"CSAFPID-196417",
"CSAFPID-196528",
"CSAFPID-197462",
"CSAFPID-197463",
"CSAFPID-197465",
"CSAFPID-197468",
"CSAFPID-197469",
"CSAFPID-197471",
"CSAFPID-197474",
"CSAFPID-197483",
"CSAFPID-197489",
"CSAFPID-197493",
"CSAFPID-197495",
"CSAFPID-198055",
"CSAFPID-198056",
"CSAFPID-198059",
"CSAFPID-198060",
"CSAFPID-198063",
"CSAFPID-198065",
"CSAFPID-198066",
"CSAFPID-198067",
"CSAFPID-198214",
"CSAFPID-198215",
"CSAFPID-198425",
"CSAFPID-198426",
"CSAFPID-198524",
"CSAFPID-200486",
"CSAFPID-200488",
"CSAFPID-200489",
"CSAFPID-200495",
"CSAFPID-200496",
"CSAFPID-200502",
"CSAFPID-200503",
"CSAFPID-200506",
"CSAFPID-200634",
"CSAFPID-200635",
"CSAFPID-201019",
"CSAFPID-201074",
"CSAFPID-201079",
"CSAFPID-201259",
"CSAFPID-201336",
"CSAFPID-201366",
"CSAFPID-201448",
"CSAFPID-201683",
"CSAFPID-202559",
"CSAFPID-202565",
"CSAFPID-203046",
"CSAFPID-203066",
"CSAFPID-204094",
"CSAFPID-204097",
"CSAFPID-204101",
"CSAFPID-204102",
"CSAFPID-204109",
"CSAFPID-204110",
"CSAFPID-204186",
"CSAFPID-204187",
"CSAFPID-204228",
"CSAFPID-204282",
"CSAFPID-204324",
"CSAFPID-204818",
"CSAFPID-204828",
"CSAFPID-204831",
"CSAFPID-204832",
"CSAFPID-205064",
"CSAFPID-205672",
"CSAFPID-205731",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209034",
"CSAFPID-209035",
"CSAFPID-209036",
"CSAFPID-209037",
"CSAFPID-209038",
"CSAFPID-209039",
"CSAFPID-209040",
"CSAFPID-209041",
"CSAFPID-209043",
"CSAFPID-209044",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209059",
"CSAFPID-209060",
"CSAFPID-209061",
"CSAFPID-209063",
"CSAFPID-209065",
"CSAFPID-209091",
"CSAFPID-209093",
"CSAFPID-209095",
"CSAFPID-209268",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209421",
"CSAFPID-209439",
"CSAFPID-209455",
"CSAFPID-209465",
"CSAFPID-209466",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-210344",
"CSAFPID-210406",
"CSAFPID-210407",
"CSAFPID-210766",
"CSAFPID-210990",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-211717",
"CSAFPID-211976",
"CSAFPID-211982",
"CSAFPID-212329",
"CSAFPID-213023",
"CSAFPID-213032",
"CSAFPID-213788",
"CSAFPID-214052",
"CSAFPID-214053",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214797",
"CSAFPID-214992",
"CSAFPID-216295",
"CSAFPID-216344",
"CSAFPID-217078",
"CSAFPID-218891",
"CSAFPID-220440",
"CSAFPID-220442",
"CSAFPID-220466",
"CSAFPID-220467",
"CSAFPID-220640",
"CSAFPID-220650",
"CSAFPID-220670",
"CSAFPID-220673",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222342",
"CSAFPID-222436",
"CSAFPID-222650",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225358",
"CSAFPID-226038",
"CSAFPID-227285",
"CSAFPID-227307",
"CSAFPID-227364",
"CSAFPID-230584",
"CSAFPID-230585",
"CSAFPID-230594",
"CSAFPID-230964",
"CSAFPID-230965",
"CSAFPID-230966",
"CSAFPID-230967",
"CSAFPID-230968",
"CSAFPID-230969",
"CSAFPID-230970",
"CSAFPID-230971",
"CSAFPID-230973",
"CSAFPID-230974",
"CSAFPID-230976",
"CSAFPID-230977",
"CSAFPID-230982",
"CSAFPID-230983",
"CSAFPID-232850",
"CSAFPID-262335",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280759",
"CSAFPID-282026",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284566",
"CSAFPID-284785",
"CSAFPID-286029",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286844",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289371",
"CSAFPID-290557",
"CSAFPID-290618",
"CSAFPID-56052",
"CSAFPID-56055",
"CSAFPID-56056",
"CSAFPID-58331",
"CSAFPID-59292",
"CSAFPID-59293",
"CSAFPID-59294",
"CSAFPID-59295",
"CSAFPID-59296",
"CSAFPID-59297",
"CSAFPID-59298",
"CSAFPID-59299",
"CSAFPID-60350",
"CSAFPID-62555",
"CSAFPID-62570",
"CSAFPID-62571",
"CSAFPID-62573",
"CSAFPID-62574",
"CSAFPID-62575",
"CSAFPID-62576",
"CSAFPID-62585",
"CSAFPID-62603",
"CSAFPID-62613",
"CSAFPID-62614",
"CSAFPID-62616",
"CSAFPID-62618",
"CSAFPID-62622",
"CSAFPID-62623",
"CSAFPID-62625",
"CSAFPID-62626",
"CSAFPID-63189",
"CSAFPID-63194",
"CSAFPID-63196",
"CSAFPID-63197",
"CSAFPID-63198",
"CSAFPID-63204",
"CSAFPID-63378",
"CSAFPID-63379",
"CSAFPID-63380",
"CSAFPID-63381",
"CSAFPID-63382",
"CSAFPID-63384",
"CSAFPID-63385",
"CSAFPID-63387",
"CSAFPID-63388",
"CSAFPID-63389",
"CSAFPID-63498",
"CSAFPID-63499",
"CSAFPID-63501",
"CSAFPID-63937",
"CSAFPID-65434",
"CSAFPID-65435",
"CSAFPID-65437",
"CSAFPID-65439",
"CSAFPID-65440",
"CSAFPID-65453",
"CSAFPID-65454",
"CSAFPID-65455",
"CSAFPID-65470",
"CSAFPID-65471",
"CSAFPID-65488",
"CSAFPID-65490",
"CSAFPID-65491",
"CSAFPID-65509",
"CSAFPID-65510",
"CSAFPID-65511",
"CSAFPID-65513",
"CSAFPID-65514",
"CSAFPID-65517",
"CSAFPID-65518",
"CSAFPID-65520",
"CSAFPID-65527",
"CSAFPID-65528",
"CSAFPID-65529",
"CSAFPID-65530",
"CSAFPID-65532",
"CSAFPID-65535",
"CSAFPID-65536",
"CSAFPID-65538",
"CSAFPID-65539",
"CSAFPID-65542",
"CSAFPID-65543",
"CSAFPID-65544",
"CSAFPID-65545",
"CSAFPID-65546",
"CSAFPID-65549",
"CSAFPID-65551",
"CSAFPID-65552",
"CSAFPID-65554",
"CSAFPID-65557",
"CSAFPID-65559",
"CSAFPID-65560",
"CSAFPID-65561",
"CSAFPID-65562",
"CSAFPID-65899",
"CSAFPID-65900",
"CSAFPID-66054",
"CSAFPID-66055",
"CSAFPID-66056",
"CSAFPID-66058",
"CSAFPID-66059",
"CSAFPID-66062",
"CSAFPID-66207",
"CSAFPID-66213",
"CSAFPID-66328",
"CSAFPID-69484",
"CSAFPID-69755",
"CSAFPID-69756",
"CSAFPID-69757",
"CSAFPID-69758",
"CSAFPID-69759",
"CSAFPID-69760",
"CSAFPID-69761",
"CSAFPID-69762",
"CSAFPID-69763",
"CSAFPID-69764",
"CSAFPID-69776",
"CSAFPID-81746",
"CSAFPID-83376",
"CSAFPID-92384",
"CSAFPID-99645",
"CSAFPID-99647"
]
}
],
"title": "Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability"
}
]
}
GHSA-P7J7-5CQQ-J6M7
Vulnerability from github – Published: 2022-05-13 01:35 – Updated: 2025-10-22 00:31A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.
{
"affected": [],
"aliases": [
"CVE-2018-0159"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-03-28T22:29:00Z",
"severity": "HIGH"
},
"details": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.",
"id": "GHSA-p7j7-5cqq-j6m7",
"modified": "2025-10-22T00:31:30Z",
"published": "2022-05-13T01:35:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0159"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/103562"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1040595"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
VAR-201803-1378
Vulnerability from variot - Updated: 2023-12-26 22:55A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916. Cisco IOS software Cisco IOS XE The software contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuj73916 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The vulnerability stems from a program failing to properly verify IKEv1 packets
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201803-1378",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios xe",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "15.3\\(3\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "15.3\\(3\\)s"
},
{
"model": "ios xe",
"scope": null,
"trust": 1.4,
"vendor": "cisco",
"version": null
},
{
"model": "ios",
"scope": null,
"trust": 1.4,
"vendor": "cisco",
"version": null
},
{
"model": "me 3800x-24fs-m switch router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "me 3600x-24ts-m switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "me 3600x-24fs-m switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "me 3600x-24cx-m switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "ios xe software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "ios 15.3 s",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-6cz-ft-d router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-6cz-ft-a router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-6cz-f-d router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-6cz-f-a router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-4c-ft-d router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-4c-f-d router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-12c-ft-d router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "asr 901-12c-f-d router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "BID",
"id": "103562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:15.3\\(3\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-0159"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "103562"
}
],
"trust": 0.3
},
"cve": "CVE-2018-0159",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-0159",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-08185",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-118361",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-0159",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-0159",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-08185",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201803-1031",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-118361",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2018-0159",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "VULHUB",
"id": "VHN-118361"
},
{
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916. Cisco IOS software Cisco IOS XE The software contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuj73916 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The vulnerability stems from a program failing to properly verify IKEv1 packets",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "BID",
"id": "103562"
},
{
"db": "VULHUB",
"id": "VHN-118361"
},
{
"db": "VULMON",
"id": "CVE-2018-0159"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-0159",
"trust": 3.5
},
{
"db": "BID",
"id": "103562",
"trust": 2.1
},
{
"db": "SECTRACK",
"id": "1040595",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-08185",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-118361",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2018-0159",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "VULHUB",
"id": "VHN-118361"
},
{
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"db": "BID",
"id": "103562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"id": "VAR-201803-1378",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "VULHUB",
"id": "VHN-118361"
}
],
"trust": 1.32263757
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
}
]
},
"last_update_date": "2023-12-26T22:55:17.665000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20180328-ike-dos",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-ike-dos"
},
{
"title": "Cisco IOS Software and IOSXESoftware enter patches for verification vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/126847"
},
{
"title": "Cisco IOS Software and IOS XE Software Enter the fix for the verification vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=79499"
},
{
"title": "Cisco: Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20180328-ike-dos"
},
{
"title": "Known Exploited Vulnerabilities Detector",
"trust": 0.1,
"url": "https://github.com/ostorlab/kev "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-118361"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "NVD",
"id": "CVE-2018-0159"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-ike-dos"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/103562"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1040595"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0159"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-0159"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/ostorlab/kev"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "VULHUB",
"id": "VHN-118361"
},
{
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"db": "BID",
"id": "103562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"db": "VULHUB",
"id": "VHN-118361"
},
{
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"db": "BID",
"id": "103562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"date": "2018-03-28T00:00:00",
"db": "VULHUB",
"id": "VHN-118361"
},
{
"date": "2018-03-28T00:00:00",
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"date": "2018-03-28T00:00:00",
"db": "BID",
"id": "103562"
},
{
"date": "2018-05-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"date": "2018-03-28T22:29:00.593000",
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"date": "2018-03-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-04-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-08185"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-118361"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULMON",
"id": "CVE-2018-0159"
},
{
"date": "2018-03-28T00:00:00",
"db": "BID",
"id": "103562"
},
{
"date": "2018-05-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-003427"
},
{
"date": "2019-10-09T23:31:21.347000",
"db": "NVD",
"id": "CVE-2018-0159"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco IOS software Cisco IOS XE Software input validation vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-003427"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input Validation Error",
"sources": [
{
"db": "BID",
"id": "103562"
},
{
"db": "CNNVD",
"id": "CNNVD-201803-1031"
}
],
"trust": 0.9
}
}
CNVD-2018-08185
Vulnerability from cnvd - Published: 2018-04-24目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos
| Name | ['Cisco IOS XE', 'Cisco IOS'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-0159",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0159"
}
},
"description": "Cisco IOS Software\u548cIOS XE Software\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS Software\u548cIOS XE Software\u4e2d\u7684Internet Key Exchange Version 1 (IKEv1)\u529f\u80fd\u5b9e\u73b0\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u6821\u9a8cIKEv1\u6570\u636e\u5305\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u53d1\u9001\u7279\u5236\u7684IKEv1\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u8bbe\u5907\u91cd\u65b0\u52a0\u8f7d\uff09\u3002",
"discovererName": "Cisco",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-08185",
"openTime": "2018-04-24",
"patchDescription": "Cisco IOS Software\u548cIOS XE Software\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS Software\u548cIOS XE Software\u4e2d\u7684Internet Key Exchange Version 1 (IKEv1)\u529f\u80fd\u5b9e\u73b0\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u6821\u9a8cIKEv1\u6570\u636e\u5305\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u53d1\u9001\u7279\u5236\u7684IKEv1\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u8bbe\u5907\u91cd\u65b0\u52a0\u8f7d\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS Software\u548cIOS XE Software\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco IOS XE",
"Cisco IOS"
]
},
"referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
"serverity": "\u9ad8",
"submitTime": "2018-04-03",
"title": "Cisco IOS Software\u548cIOS XE Software\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e"
}
CERTFR-2018-AVI-156
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Catalyst 4500 Supervisor Engine 6L-E (K10) | ||
| Cisco | N/A | Catalyst 4900M Switch (K5) | ||
| Cisco | IOS XE | Cisco IOS XE versions 16.x | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 8-E (K10) | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 8L-E (K10) | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 6-E (K5) | ||
| Cisco | IOS XE | Cisco Catalyst 3850 et Cisco Catalyst 3650 exécutant Cisco IOS XE version 16.1.1 ou postérieure | ||
| Cisco | IOS | Cisco ISM-VPN installé sur une version vulnérable de Cisco IOS | ||
| Cisco | IOS XE | Cisco IOS ou Cisco IOS XE avec le protocole Internet Security Association and Key Management Protocol (ISAKMP) activé | ||
| Cisco | N/A | Cisco Catalyst Digital Building Series Switches – 8U | ||
| Cisco | N/A | Cisco Catalyst 2960-L Series Switches | ||
| Cisco | N/A | Cisco Catalyst Digital Building Series Switches – 8P | ||
| Cisco | IOS XE | Cisco IOS XE utilisant la fonctionnalité Zone-Based Policy Firewall et exécutant une des versions Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 7L-E (K10) | ||
| Cisco | N/A | Cisco IOS, Cisco IOS XE ou Cisco IOS XR configurés pour utiliser LLDP | ||
| Cisco | N/A | Catalyst 4500-X Series Switches (K10) | ||
| Cisco | IOS XE | Cisco IOS ou IOS XE | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 7-E (K10) | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 9-E (K10) | ||
| Cisco | N/A | Catalyst 4948E Ethernet Switch (K5) | ||
| Cisco | IOS XE | Cisco IOS ou IOS XE avec la fonctionnalité Smart Install client activée |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Catalyst 4500 Supervisor Engine 6L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4900M Switch (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE versions 16.x",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 8-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 8L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 6-E (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 3850 et Cisco Catalyst 3650 ex\u00e9cutant Cisco IOS XE version 16.1.1 ou post\u00e9rieure",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ISM-VPN install\u00e9 sur une version vuln\u00e9rable de Cisco IOS",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou Cisco IOS XE avec le protocole Internet Security Association and Key Management Protocol (ISAKMP) activ\u00e9",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst Digital Building Series Switches \u2013 8U",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 2960-L Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst Digital Building Series Switches \u2013 8P",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE utilisant la fonctionnalit\u00e9 Zone-Based Policy Firewall et ex\u00e9cutant une des versions Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 7L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS, Cisco IOS XE ou Cisco IOS XR configur\u00e9s pour utiliser LLDP",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500-X Series Switches (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou IOS XE",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 7-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 9-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4948E Ethernet Switch (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou IOS XE avec la fonctionnalit\u00e9 Smart Install client activ\u00e9e",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0171"
},
{
"name": "CVE-2018-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0157"
},
{
"name": "CVE-2018-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0174"
},
{
"name": "CVE-2018-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0158"
},
{
"name": "CVE-2018-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0167"
},
{
"name": "CVE-2018-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0169"
},
{
"name": "CVE-2018-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0165"
},
{
"name": "CVE-2018-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0151"
},
{
"name": "CVE-2018-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0176"
},
{
"name": "CVE-2018-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0154"
},
{
"name": "CVE-2018-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0172"
},
{
"name": "CVE-2018-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0150"
},
{
"name": "CVE-2018-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0170"
},
{
"name": "CVE-2018-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0160"
},
{
"name": "CVE-2018-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0159"
},
{
"name": "CVE-2018-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0156"
},
{
"name": "CVE-2018-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0161"
},
{
"name": "CVE-2018-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0152"
},
{
"name": "CVE-2018-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0173"
},
{
"name": "CVE-2018-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0177"
},
{
"name": "CVE-2018-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0175"
},
{
"name": "CVE-2018-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0155"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-156",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-lldp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr2 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-snmp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-fwip du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-bfd du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-opendns-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-privesc1 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-igmp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ike du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr3 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-qos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-xepriv du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ipv4 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-snmp-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-xesc du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-smi2 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ike-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr1 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-smi du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
}
]
}
CERTFR-2018-AVI-156
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Catalyst 4500 Supervisor Engine 6L-E (K10) | ||
| Cisco | N/A | Catalyst 4900M Switch (K5) | ||
| Cisco | IOS XE | Cisco IOS XE versions 16.x | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 8-E (K10) | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 8L-E (K10) | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 6-E (K5) | ||
| Cisco | IOS XE | Cisco Catalyst 3850 et Cisco Catalyst 3650 exécutant Cisco IOS XE version 16.1.1 ou postérieure | ||
| Cisco | IOS | Cisco ISM-VPN installé sur une version vulnérable de Cisco IOS | ||
| Cisco | IOS XE | Cisco IOS ou Cisco IOS XE avec le protocole Internet Security Association and Key Management Protocol (ISAKMP) activé | ||
| Cisco | N/A | Cisco Catalyst Digital Building Series Switches – 8U | ||
| Cisco | N/A | Cisco Catalyst 2960-L Series Switches | ||
| Cisco | N/A | Cisco Catalyst Digital Building Series Switches – 8P | ||
| Cisco | IOS XE | Cisco IOS XE utilisant la fonctionnalité Zone-Based Policy Firewall et exécutant une des versions Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 7L-E (K10) | ||
| Cisco | N/A | Cisco IOS, Cisco IOS XE ou Cisco IOS XR configurés pour utiliser LLDP | ||
| Cisco | N/A | Catalyst 4500-X Series Switches (K10) | ||
| Cisco | IOS XE | Cisco IOS ou IOS XE | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 7-E (K10) | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 9-E (K10) | ||
| Cisco | N/A | Catalyst 4948E Ethernet Switch (K5) | ||
| Cisco | IOS XE | Cisco IOS ou IOS XE avec la fonctionnalité Smart Install client activée |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Catalyst 4500 Supervisor Engine 6L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4900M Switch (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE versions 16.x",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 8-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 8L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 6-E (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 3850 et Cisco Catalyst 3650 ex\u00e9cutant Cisco IOS XE version 16.1.1 ou post\u00e9rieure",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ISM-VPN install\u00e9 sur une version vuln\u00e9rable de Cisco IOS",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou Cisco IOS XE avec le protocole Internet Security Association and Key Management Protocol (ISAKMP) activ\u00e9",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst Digital Building Series Switches \u2013 8U",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 2960-L Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst Digital Building Series Switches \u2013 8P",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE utilisant la fonctionnalit\u00e9 Zone-Based Policy Firewall et ex\u00e9cutant une des versions Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 7L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS, Cisco IOS XE ou Cisco IOS XR configur\u00e9s pour utiliser LLDP",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500-X Series Switches (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou IOS XE",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 7-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 9-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4948E Ethernet Switch (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou IOS XE avec la fonctionnalit\u00e9 Smart Install client activ\u00e9e",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0171"
},
{
"name": "CVE-2018-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0157"
},
{
"name": "CVE-2018-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0174"
},
{
"name": "CVE-2018-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0158"
},
{
"name": "CVE-2018-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0167"
},
{
"name": "CVE-2018-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0169"
},
{
"name": "CVE-2018-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0165"
},
{
"name": "CVE-2018-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0151"
},
{
"name": "CVE-2018-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0176"
},
{
"name": "CVE-2018-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0154"
},
{
"name": "CVE-2018-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0172"
},
{
"name": "CVE-2018-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0150"
},
{
"name": "CVE-2018-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0170"
},
{
"name": "CVE-2018-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0160"
},
{
"name": "CVE-2018-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0159"
},
{
"name": "CVE-2018-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0156"
},
{
"name": "CVE-2018-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0161"
},
{
"name": "CVE-2018-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0152"
},
{
"name": "CVE-2018-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0173"
},
{
"name": "CVE-2018-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0177"
},
{
"name": "CVE-2018-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0175"
},
{
"name": "CVE-2018-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0155"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-156",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-lldp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr2 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-snmp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-fwip du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-bfd du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-opendns-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-privesc1 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-igmp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ike du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr3 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-qos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-xepriv du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ipv4 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-snmp-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-xesc du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-smi2 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ike-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr1 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-smi du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
}
]
}
WID-SEC-W-2025-1871
Vulnerability from csaf_certbund - Published: 2018-03-28 22:00 - Updated: 2025-08-20 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Cisco IOS XE
Cisco
|
cpe:/o:cisco:ios_xe:-
|
— | |
|
Cisco IOS
Cisco
|
cpe:/o:cisco:ios:-
|
— |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://tools.cisco.com/security/center/content/C… | external |
| https://sec.cloudapps.cisco.com/security/center/c… | external |
| http://www.ic3.gov/PSA/2025/PSA250820 | external |
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das f\u00fcr Cisco Ger\u00e4te wie z. B. Router und Switches eingesetzt wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Cisco IOS und Cisco IOS XE ausnutzen, um Daten zu manipulieren, vertrauliche Daten einzusehen, einen Denial of Service Angriff durchzuf\u00fchren, seine Privilegien zu erweitern, Cross-Site Scripting Angriffe durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen oder beliebigen Code mit administrativen Privilegien zur Ausf\u00fchrung zu bringen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- CISCO Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1871 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2025-1871.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1871 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1871"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-webuixss vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-sisf vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-sisf"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-cmdinj vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-FIB-dos vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-FIB-dos"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-igmp vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-wfw vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-wfw"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-qos vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-slogin vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-dot1x vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-snmp-dos vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-opendns-dos vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-ike-dos vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-xesc vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-rest vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-rest"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-xepriv vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-ike vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-dos vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-privesc3 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc3"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-privesc2 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc2"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-privesc1 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-dhcpr3 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-dhcpr2 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-dhcpr1 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-smi2 vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-smi vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-snmp vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-fwip vom 2018-03-28",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip"
},
{
"category": "external",
"summary": "Cisco Security Advisory: cisco-sa-20180409-smi",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180409-smi"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180328-smi2 vom 2025-08-20",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2"
},
{
"category": "external",
"summary": "FBI Alert I-082025-PSA vom 2025-08-20",
"url": "http://www.ic3.gov/PSA/2025/PSA250820"
}
],
"source_lang": "en-US",
"title": "Cisco IOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-20T22:00:00.000+00:00",
"generator": {
"date": "2025-08-21T05:20:23.951+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1871",
"initial_release_date": "2018-03-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2018-03-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-03-28T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "4",
"summary": "CVE-2018-0171 wird ausgenutzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Cisco IOS",
"product": {
"name": "Cisco IOS",
"product_id": "T001045",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IOS XE",
"product": {
"name": "Cisco IOS XE",
"product_id": "T001605",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:ios_xe:-"
}
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0179",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0179"
},
{
"cve": "CVE-2018-0150",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0150"
},
{
"cve": "CVE-2018-0151",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0151"
},
{
"cve": "CVE-2018-0152",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0152"
},
{
"cve": "CVE-2018-0154",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0154"
},
{
"cve": "CVE-2018-0156",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0156"
},
{
"cve": "CVE-2018-0157",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0157"
},
{
"cve": "CVE-2018-0158",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0158"
},
{
"cve": "CVE-2018-0159",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0159"
},
{
"cve": "CVE-2018-0160",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0160"
},
{
"cve": "CVE-2018-0161",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0161"
},
{
"cve": "CVE-2018-0163",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0163"
},
{
"cve": "CVE-2018-0164",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0164"
},
{
"cve": "CVE-2018-0165",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0165"
},
{
"cve": "CVE-2018-0169",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0169"
},
{
"cve": "CVE-2018-0170",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0170"
},
{
"cve": "CVE-2018-0171",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0171"
},
{
"cve": "CVE-2018-0172",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0172"
},
{
"cve": "CVE-2018-0173",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0173"
},
{
"cve": "CVE-2018-0174",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0174"
},
{
"cve": "CVE-2018-0176",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0176"
},
{
"cve": "CVE-2018-0180",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0180"
},
{
"cve": "CVE-2018-0182",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0182"
},
{
"cve": "CVE-2018-0183",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0183"
},
{
"cve": "CVE-2018-0184",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0184"
},
{
"cve": "CVE-2018-0185",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0185"
},
{
"cve": "CVE-2018-0186",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0186"
},
{
"cve": "CVE-2018-0188",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0188"
},
{
"cve": "CVE-2018-0189",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0189"
},
{
"cve": "CVE-2018-0190",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0190"
},
{
"cve": "CVE-2018-0193",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0193"
},
{
"cve": "CVE-2018-0194",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0194"
},
{
"cve": "CVE-2018-0195",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0195"
},
{
"cve": "CVE-2018-0196",
"product_status": {
"known_affected": [
"T001605",
"T001045"
]
},
"release_date": "2018-03-28T22:00:00.000+00:00",
"title": "CVE-2018-0196"
}
]
}
FKIE_CVE-2018-0159
Vulnerability from fkie_nvd - Published: 2018-03-28 22:29 - Updated: 2026-01-14 18:447.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/103562 | Broken Link, Third Party Advisory, VDB Entry | |
| psirt@cisco.com | http://www.securitytracker.com/id/1040595 | Broken Link, Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103562 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040595 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos | Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159 | US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 15.3\(3\)s | |
| cisco | asr_901-12c-f-d | - | |
| cisco | asr_901-12c-ft-d | - | |
| cisco | asr_901-4c-f-d | - | |
| cisco | asr_901-4c-ft-d | - | |
| cisco | asr_901-6cz-f-a | - | |
| cisco | asr_901-6cz-f-d | - | |
| cisco | asr_901-6cz-ft-a | - | |
| cisco | asr_901-6cz-ft-d | - | |
| cisco | me_3600x-24cx-m | - | |
| cisco | me_3600x-24fs-m | - | |
| cisco | me_3600x-24ts-m | - | |
| cisco | me_3800x-24fs-m | - | |
| cisco | ios_xe | 15.3\(3\)s | |
| cisco | asr_901-12c-f-d | - | |
| cisco | asr_901-12c-ft-d | - | |
| cisco | asr_901-4c-f-d | - | |
| cisco | asr_901-4c-ft-d | - | |
| cisco | asr_901-6cz-f-a | - | |
| cisco | asr_901-6cz-f-d | - | |
| cisco | asr_901-6cz-ft-a | - | |
| cisco | asr_901-6cz-ft-d | - | |
| cisco | me_3600x-24cx-m | - | |
| cisco | me_3600x-24fs-m | - | |
| cisco | me_3600x-24ts-m | - | |
| cisco | me_3800x-24fs-m | - |
{
"cisaActionDue": "2022-03-17",
"cisaExploitAdd": "2022-03-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "AB84CE04-F2D0-4A37-B2BA-25126D1824D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6279A69-2F9D-4CD9-9C19-62E701C3C4F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB1A95C-8513-4CC7-8CDF-012B212FF02F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C2A515C-797D-47EE-8051-F3FBE417BCE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E673A75F-EFF8-4591-8E0F-A21083563DBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C03D362E-8431-46D9-A214-9BF421299095",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D49393A-23B1-4B8A-8057-BA08745C9764",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD4E0EA-5F54-4916-B379-5FDA231BC6A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA69BC08-9866-4B72-8491-A8E3FFCEF541",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:15.3\\(3\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE8D4E6-7906-4680-A1DF-71FF3D43716F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6279A69-2F9D-4CD9-9C19-62E701C3C4F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB1A95C-8513-4CC7-8CDF-012B212FF02F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C2A515C-797D-47EE-8051-F3FBE417BCE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E673A75F-EFF8-4591-8E0F-A21083563DBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C03D362E-8431-46D9-A214-9BF421299095",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D49393A-23B1-4B8A-8057-BA08745C9764",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD4E0EA-5F54-4916-B379-5FDA231BC6A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA69BC08-9866-4B72-8491-A8E3FFCEF541",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la implementaci\u00f3n de la funcionalidad Internet Key Exchange Version 1 (IKEv1) de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado provoque el reinicio de un dispositivo afectado, lo que da como resultado una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la validaci\u00f3n incorrecta de paquetes IKEv1 espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes IKEv1 manipulados al dispositivo afectado durante una negociaci\u00f3n IKE. Un exploit con \u00e9xito, podr\u00eda permitir que el atacante consiga que el dispositivo afectado se reinicie, lo que provoca una denegaci\u00f3n de servicio. Cisco Bug IDs: CSCuj73916."
}
],
"id": "CVE-2018-0159",
"lastModified": "2026-01-14T18:44:13.093",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2018-03-28T22:29:00.593",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103562"
},
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040595"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040595"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2018-0159
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-0159",
"description": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.",
"id": "GSD-2018-0159"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-0159"
],
"details": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.",
"id": "GSD-2018-0159",
"modified": "2023-12-13T01:22:24.862810Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2018-0159",
"dateAdded": "2022-03-03",
"dueDate": "2022-03-17",
"product": "IOS Software and Cisco IOS XE Software",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial-of-service (DoS) condition.",
"vendorProject": "CIsco",
"vulnerabilityName": "Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0159",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS and IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103562"
},
{
"name": "1040595",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040595"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:15.3\\(3\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0159"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"name": "1040595",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040595"
},
{
"name": "103562",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103562"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-10-09T23:31Z",
"publishedDate": "2018-03-28T22:29Z"
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.