CVE-2020-3393
Vulnerability from cvelistv5
Published
2020-09-24 18:02
Modified
2024-11-13 17:54
Severity ?
EPSS score ?
Summary
Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco IOS XE Software |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200924 Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3393", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:17:38.455307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:54:13.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-24T18:02:31", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200924 Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt" } ], "source": { "advisory": "cisco-sa-iosxe-iox-app-host-mcZcnsBt", "defect": [ [ "CSCvr56862", "CSCvr69240" ] ], "discovery": "INTERNAL" }, "title": "Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-09-24T16:00:00", "ID": "CVE-2020-3393", "STATE": "PUBLIC", "TITLE": "Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS XE Software", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.0", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "20200924 Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt" } ] }, "source": { "advisory": "cisco-sa-iosxe-iox-app-host-mcZcnsBt", "defect": [ [ "CSCvr56862", "CSCvr69240" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3393", "datePublished": "2020-09-24T18:02:31.669408Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-13T17:54:13.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-3393\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2020-09-24T18:15:17.587\",\"lastModified\":\"2023-11-07T03:22:39.840\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el subsistema de alojamiento de aplicaciones de Cisco IOS XE Software, podr\u00eda permitir a un atacante local autenticado elevar los privilegios a root en un dispositivo afectado.\u0026#xa0;El atacante podr\u00eda ejecutar comandos de IOS XE fuera del contenedor Docker del subsistema de alojamiento de aplicaciones, as\u00ed como en el sistema operativo Linux subyacente.\u0026#xa0;Estos comandos se pueden ejecutar como usuario root.\u0026#xa0;La vulnerabilidad es debido a una combinaci\u00f3n de dos factores: (a) comprobaci\u00f3n de entrada incompleta de la carga \u00fatil del usuario de los comandos de CLI, y (b) control de acceso basado en roles (RBAC) inadecuado cuando los comandos se emiten en la l\u00ednea de comandos dentro del subsistema hosting de la aplicaci\u00f3n.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante un comando de la CLI con una entrada del usuario dise\u00f1ada.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante con menos privilegios ejecutar comandos CLI arbitrarios con privilegios root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F77CD6A-83DA-4F31-A128-AD6DAECD623B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62564BB8-1282-4597-A645-056298BE7CCB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D2305B-B69E-4F74-A44E-07B3205CE9F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B68B363-3C57-4E95-8B13-0F9B59D551F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAD4397-6DCF-493A-BD61-3A890F6F3AB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB8A757-7888-4AC2-BE44-B89DB83C6C77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB9229F3-7BCE-46C4-9879-D57B5BAAE44E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B80890A8-E3D3-462C-B125-9E9BC6525B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0547E196-5991-4C33-823A-342542E9DFD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"802CBFC1-8A2F-4BF7-A1D3-00622C33BE16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D916389F-54DB-44CB-91DD-7CE3C7059350\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8AED7C-DDA3-4C29-BB95-6518C02C551A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5419CB9F-241F-4431-914F-2659BE27BEA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5720462A-BE6B-4E84-A1A1-01E80BBA86AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82225D40-537F-41D2-B1C4-1B7D06466B06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B60888-6E2B-494E-AC65-83337661EE7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2182E7-C813-4966-A36C-E648A9344299\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED7C321E-F083-4AB6-96A0-D6358980441E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C913FF-63D5-43FB-8B39-598EF436BA5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4376E56-A21C-4642-A85D-439C8E21CD7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"444F688F-79D0-4F22-B530-7BD520080B8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55DD2272-10C2-43B9-9F13-6DC41DBE179B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7428E0A8-1641-47FB-9CA9-34311DEF660D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"854D9594-FE84-4E7B-BA21-A3287F2DC302\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C24227E-9FF6-4757-A342-958CA4B8BF63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E529335-18D1-4CEC-A8D5-CC1CA33D64F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9FBFB5C-347B-4F73-93BE-4D3137D8F93A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F040372-CDAD-4AC4-9B7C-BFF9658B6BF2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33862F1-652A-4F60-BD3E-A6B3733E56A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"130205FD-CA31-4E49-B8C4-181840270C70\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"908A56D8-64AF-4813-9D4D-C429C0603A31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53DAF422-7E0B-44EB-AD8D-4643A9711739\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F7F661E-335C-4123-9363-E2E5D51846C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9ED0E5-CB20-4106-9CF2-8EB587B33543\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0E620C-8E09-4F7C-A326-26013173B993\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF93F1C8-669F-4ECB-8D81-ECDA7B550175\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0BA345-B7D7-4975-9199-4DC7875BBFD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18736C74-F68F-4D0B-AE2B-4BC1834EF794\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D223C2AB-22A4-42B5-8BBB-78E2CBF23B40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDD3EAA2-8F25-4099-B76F-5ACC3BE34610\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE9BD57F-BDAC-46DD-AF87-8914B29670F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCEBFFC-DD60-4CB1-A7F2-9AC09977BA4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F7B21F-1DAA-45C7-8C24-D3A19F1C5459\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4F9918-E075-4F78-AFD7-0BB7FA97C1F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E00A0B-A58E-472F-B107-0FE106751F2D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB45406-5216-4A11-B8D3-C44639DC26B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215D01AE-3767-482A-85C5-3361506F0AC3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E37A8-166F-4534-9089-D20B1227F4DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D6DAE3-BAD0-46D8-B899-45B955F532F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327167E8-4B65-4F9D-8760-34CDA03887CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0DA2253-C6A9-4749-B313-6552628A96F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C925086A-94B9-4FE0-9FEB-3242C1217453\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB14B34-4035-41D2-834B-7FB069264207\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F257D2BE-7618-4B6A-AFCE-6D9D0084FA1D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA927CE-9D8E-4BC0-9EA6-641E7C4F71B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A46D298-1685-410E-879C-2EBC45C185AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4ACF54-E576-4D8A-A4E6-17A37EEC53DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196A7C06-8371-479D-973D-591DEB181739\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE42511E-9883-4779-A8E5-FC3E16EF2793\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB06AD21-91A7-46B8-8F44-683828A5422D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA169AF-3743-4051-B63B-FF6E1ADCD886\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D13CF5B-4482-4C7D-8D6A-E220F3E4F868\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92134C0A-4E5B-43EF-8439-484DF504C43C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26ECF9BD-F632-4A02-8993-C0D44B91289C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48730DB5-94AF-4BE7-8047-52B8B47CE35A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A88142-3284-4C25-8774-36004B5F9087\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB76311-4B6D-4897-A683-4244E92BD570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDA2975-CDB7-4182-A03E-D34F15CDF6F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B9D0B5-4BE1-490E-9A68-00A3D357BC3D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FA2F5A-6146-4142-96A8-552118E4BB67\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF786D6-F28F-49D8-A15C-BFD0AA934355\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA32B0AC-1B0A-4ED8-8532-9C7BE6E059D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FEFF895-6E4A-4108-BD25-D7DC83154832\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A485A9A0-2EEC-4C13-846C-0DE2265B2A31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9F1ACA-9D67-4BF0-A357-40D39A61ED00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BFEE45F-C5AC-483D-9DE6-4CEB98D80A0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6F5BBC-4627-4A3E-B827-3CEE7EE969D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B2E41E2-00CE-42C4-8C91-9307D76F5D7A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CB2D23-B5F8-4FA9-8431-3B0124CE2140\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A8BA9F-3361-43CD-8031-A5DF0AD68BEB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFE4BB6-FC9A-42B3-B8A0-2610D71BB9B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D13F1D-345D-45D5-9000-DAFE8A85D71B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFB064E-E390-47B5-AA76-5D3D2E368055\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7A99113-21C8-4DC4-865B-BEE7401B7720\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75310844-0DEA-4F0B-B9DB-AA55AA3EED17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-12x48ur:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D2AC87-9D6C-4E49-8923-F6B5C73B18F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-12x48uz:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A51E5D-501F-4EDE-8566-A6C217D4C7C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB1635F-48C9-47A4-8284-953DFA0B1C89\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24pdm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE619CD8-98F9-4CAC-BFB7-EB4DD84040B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE323F9B-C767-4B8E-82C2-1387F29444BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24td:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5124B311-935A-4267-B360-08C8F0BE8691\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E92A4C9B-B5AA-4112-9136-D6E187057BE7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E328765-1E27-4E50-9DE0-556D4A349151\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8528780-0254-4D21-8172-71BD01988608\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fqm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97203BEC-044F-4263-A4EA-536486BBEC6A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AAB4D4-6986-4055-B68D-AA9E306DA5BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821C98D-B8E3-44A9-8534-ACBDD4BEB5F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"733850D4-DD9D-40B8-BB7F-FF9C26818FAC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276373D2-CB95-43F8-A4C4-5A0E1B0046F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48td:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77599A2E-3149-4C7B-90A2-C95E4FAAC3E1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48tq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A14F739-1643-4425-8C9E-4A7FB831F4B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1D0F90-14C7-404F-9F75-9D9937E489D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-8x24uq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE19812-3A07-4561-BB1A-0B43C11F5FA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA292FB5-7589-4E22-8AE1-CEE4E987CD9E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-12s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0BCC2C-20D6-40EB-9334-C83FC5F69A93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-12x48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3EC00D-ACEA-49DE-A7A8-42CCA6569D2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-12xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1341B21E-49E9-4219-B1B0-592B180D5D09\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EAF61B9-CE12-40E9-9DCE-D3411E74BBB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DB530A-74B9-43DA-B8E8-A761E6A159F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B8C8EA0-7767-4CC1-88BE-B678FAFD96C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56929D47-3994-4008-87DA-F64AAB7EB12D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0CE864-1B46-4040-87F3-3CFE3517422C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24xu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7EFF383-6194-41C0-A6FE-DBF17D43EDDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9254CA-6616-4743-B146-A120D97350A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D75A217-8CDF-40B5-BB48-D018FFC6BCBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1CD87D-3AAA-4474-8C90-26552FF5C90B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AE2EAFB-83D9-4517-9B17-3A6D3D846D9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"819E8E03-F31D-47BF-9725-6F352924F002\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.