CVE-2020-3425
Vulnerability from cvelistv5
Published
2020-09-24 18:01
Modified
2024-11-13 17:56
Summary
Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:30:58.396Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200924 Cisco IOS XE Software Privilege Escalation Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3425",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T17:17:47.499518Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T17:56:44.147Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE Software 16.1.1",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-09-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-24T18:01:18",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200924 Cisco IOS XE Software Privilege Escalation Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ios-webui-priv-esc-K8zvEWM",
        "defect": [
          [
            "CSCvs40347",
            "CSCvu90974"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS XE Software Privilege Escalation Vulnerabilities",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-09-24T16:00:00",
          "ID": "CVE-2020-3425",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS XE Software Privilege Escalation Vulnerabilities"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE Software 16.1.1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.8",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200924 Cisco IOS XE Software Privilege Escalation Vulnerabilities",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-ios-webui-priv-esc-K8zvEWM",
          "defect": [
            [
              "CSCvs40347",
              "CSCvu90974"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3425",
    "datePublished": "2020-09-24T18:01:18.802569Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-13T17:56:44.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ED5527C-A638-4E20-9928-099E32E17743\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A685A9A-235D-4D74-9D6C-AC49E75709CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43052998-0A27-4E83-A884-A94701A3F4CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89526731-B712-43D3-B451-D7FC503D2D65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"302933FE-4B6A-48A3-97F0-4B943251B717\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"296636F1-9242-429B-8472-90352C056106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77993343-0394-413F-ABF9-C1215E9AD800\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"283971DD-DD58-4A76-AC2A-F316534ED416\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F324A5-4830-482E-A684-AB3B6594CEAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8120196-8648-49D0-8262-CD4C9C90C37A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E7CCE2-C685-4019-9B55-B3BECB3E5F76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0699DD6E-BA74-4814-93AB-300329C9D032\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2E2D781-2684-45F1-AC52-636572A0DCA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"479FB47B-AF2E-4FCB-8DE0-400BF325666C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF2B4C78-5C31-4F3D-9639-305E15576E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77E8AF15-AB46-4EAB-8872-8C55E8601599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"957318BE-55D4-4585-AA52-C813301D01C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F11B703-8A0F-47ED-AA70-951FF78B94A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE7B2557-821D-4E05-B5C3-67192573D97D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"187F699A-AF2F-42B0-B855-27413140C384\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62EDEC28-661E-42EF-88F0-F62D0220D2E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9B825E6-5929-4890-BDBA-4CF4BD2314C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65020120-491D-46CD-8C73-974B6F4C11E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ADDCD0A-6168-45A0-A885-76CC70FE2FC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F35C623-6043-43A6-BBAA-478E185480CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D83E34F4-F4DD-49CC-9C95-93F9D4D26B42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2833EAE-94C8-4279-A244-DDB6E2D15DC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B688E46-5BAD-4DEC-8B13-B184B141B169\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C8F50DB-3A80-4D89-9F7B-86766D37338B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F13F583-F645-4DF0-A075-B4F19D71D128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"623BF701-ADC9-4F24-93C5-043A6A7FEF5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5311FBE-12BF-41AC-B8C6-D86007834863\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FB055E-72F9-4CB7-A51D-BF096BD1A55D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FBD681F-7969-42BE-A47E-7C287755DCB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98255E6F-3056-487D-9157-403836EFB9D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"521ACFB0-4FB2-44DB-AD7B-C27F9059DE66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57D4F634-03D5-4D9F-901C-7E9CE45F2F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4463A1D1-E169-4F0B-91B2-FA126BB444CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDD58C58-1B0C-4A71-8C02-F555CEF9C253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96852D16-AF50-4C70-B125-D2349E6765D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A15B882A-BA60-4932-A55E-F4A798B30EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C9C585C-A6EC-4385-B915-046C110BF95F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47DBE4ED-1CD8-4134-9B33-17A91F44F17B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"119A964D-ABC8-424D-8097-85B832A833BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0375BF9E-D04B-4E5B-9051-536806ECA44E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2266E5A2-B3F6-4389-B8E2-42CB845EC7F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"012A6CF7-9104-4882-9C95-E6D4458AB778\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78DE7780-4E8B-4BB6-BDEB-58032EC65851\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F29CEE37-4044-4A3C-9685-C9C021FD346A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5292764A-7D1C-4E04-86EF-809CB68EDD25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F84AE35F-D016-4B8F-8FE2-C2ACB200DFED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4BF9829-F80E-4837-A420-39B291C4E17B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D07F9539-CFBE-46F7-9F5E-93A68169797D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5AB80E7-0714-44ED-9671-12C877B36A1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10182B94-6831-461E-B0FC-9476EAB6EBEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D136D2BC-FFB5-4912-A3B1-BD96148CB9A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CD5B3AB-27C2-4055-A3B7-0112D089FDA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04081A51-E08F-4114-9276-584E836181D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A46516-CEB7-48D4-879B-341963A1FA31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6EF98FA-6DF9-4935-9639-143E08462BC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A443E93-6C4B-4F86-BA7C-7C2A929E795A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"314C7763-A64D-4023-9F3F-9A821AE4151F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5820D71D-FC93-45AA-BC58-A26A1A39C936\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B53E377A-0296-4D7A-B97C-576B0026543D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C98DED36-D4B5-48D6-964E-EEEE97936700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD98C9E8-3EA6-4160-970D-37C389576516\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9027A528-2588-4C06-810B-5BB313FE4323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7745ED34-D59D-49CC-B174-96BCA03B3374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19AF4CF3-6E79-4EA3-974D-CD451A192BA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"313BD54C-073C-4F27-82D5-C99EFC3A20F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93B96E01-3777-4C33-9225-577B469A6CE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5019B59-508E-40B0-9C92-2C26F58E2FBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E306B09C-CB48-4067-B60C-5F738555EEAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD446C51-E713-4E46-8328-0A0477D140D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51FA707-8DB1-4596-9122-D4BFEF17F400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C04DF35A-1B6F-420A-8D84-74EB41BF3700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"211CC9B2-6108-4C50-AB31-DC527C43053E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EB8A757-7888-4AC2-BE44-B89DB83C6C77\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B80890A8-E3D3-462C-B125-9E9BC6525B02\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0547E196-5991-4C33-823A-342542E9DFD3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"802CBFC1-8A2F-4BF7-A1D3-00622C33BE16\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D916389F-54DB-44CB-91DD-7CE3C7059350\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C8AED7C-DDA3-4C29-BB95-6518C02C551A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9421DBEF-AE42-4234-B49F-FCC34B804D7F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5419CB9F-241F-4431-914F-2659BE27BEA5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5720462A-BE6B-4E84-A1A1-01E80BBA86AD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"818CEFA6-208C-43C3-8E43-474A93ADCF21\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8B60888-6E2B-494E-AC65-83337661EE7D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7594E307-AC80-41EC-AE94-07E664A7D701\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09C913FF-63D5-43FB-8B39-598EF436BA5A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD2794BD-C8CE-46EF-9857-1723FCF04E46\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"444F688F-79D0-4F22-B530-7BD520080B8F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55DD2272-10C2-43B9-9F13-6DC41DBE179B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7428E0A8-1641-47FB-9CA9-34311DEF660D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE7401B7-094C-46EB-9869-2F0372E8B26B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"854D9594-FE84-4E7B-BA21-A3287F2DC302\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B9ED0E5-CB20-4106-9CF2-8EB587B33543\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B0E620C-8E09-4F7C-A326-26013173B993\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF93F1C8-669F-4ECB-8D81-ECDA7B550175\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E0BA345-B7D7-4975-9199-4DC7875BBFD0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18736C74-F68F-4D0B-AE2B-4BC1834EF794\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D223C2AB-22A4-42B5-8BBB-78E2CBF23B40\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDD3EAA2-8F25-4099-B76F-5ACC3BE34610\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE9BD57F-BDAC-46DD-AF87-8914B29670F2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFCEBFFC-DD60-4CB1-A7F2-9AC09977BA4F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9F7B21F-1DAA-45C7-8C24-D3A19F1C5459\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C4F9918-E075-4F78-AFD7-0BB7FA97C1F6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7E00A0B-A58E-472F-B107-0FE106751F2D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCB45406-5216-4A11-B8D3-C44639DC26B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"215D01AE-3767-482A-85C5-3361506F0AC3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A06E37A8-166F-4534-9089-D20B1227F4DD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9D6DAE3-BAD0-46D8-B899-45B955F532F7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"327167E8-4B65-4F9D-8760-34CDA03887CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0DA2253-C6A9-4749-B313-6552628A96F3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C925086A-94B9-4FE0-9FEB-3242C1217453\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EB14B34-4035-41D2-834B-7FB069264207\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F257D2BE-7618-4B6A-AFCE-6D9D0084FA1D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BA927CE-9D8E-4BC0-9EA6-641E7C4F71B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A46D298-1685-410E-879C-2EBC45C185AC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4ACF54-E576-4D8A-A4E6-17A37EEC53DA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"196A7C06-8371-479D-973D-591DEB181739\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE42511E-9883-4779-A8E5-FC3E16EF2793\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB06AD21-91A7-46B8-8F44-683828A5422D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DA169AF-3743-4051-B63B-FF6E1ADCD886\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D13CF5B-4482-4C7D-8D6A-E220F3E4F868\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92134C0A-4E5B-43EF-8439-484DF504C43C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26ECF9BD-F632-4A02-8993-C0D44B91289C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48730DB5-94AF-4BE7-8047-52B8B47CE35A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3A88142-3284-4C25-8774-36004B5F9087\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EB76311-4B6D-4897-A683-4244E92BD570\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDDA2975-CDB7-4182-A03E-D34F15CDF6F1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35B9D0B5-4BE1-490E-9A68-00A3D357BC3D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71FA2F5A-6146-4142-96A8-552118E4BB67\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEF786D6-F28F-49D8-A15C-BFD0AA934355\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA32B0AC-1B0A-4ED8-8532-9C7BE6E059D4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BFEE45F-C5AC-483D-9DE6-4CEB98D80A0C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6F5BBC-4627-4A3E-B827-3CEE7EE969D0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B2E41E2-00CE-42C4-8C91-9307D76F5D7A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98CB2D23-B5F8-4FA9-8431-3B0124CE2140\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8A8BA9F-3361-43CD-8031-A5DF0AD68BEB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DFE4BB6-FC9A-42B3-B8A0-2610D71BB9B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D13F1D-345D-45D5-9000-DAFE8A85D71B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CFB064E-E390-47B5-AA76-5D3D2E368055\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CCB8270-A01D-40A6-BF4B-26BAF65E68F3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5361C70A-C036-4254-9698-BC58F48C465B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75310844-0DEA-4F0B-B9DB-AA55AA3EED17\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-12x48ur:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28D2AC87-9D6C-4E49-8923-F6B5C73B18F6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-12x48uz:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0A51E5D-501F-4EDE-8566-A6C217D4C7C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-24pd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFB1635F-48C9-47A4-8284-953DFA0B1C89\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-24pdm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE619CD8-98F9-4CAC-BFB7-EB4DD84040B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-24ps:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE323F9B-C767-4B8E-82C2-1387F29444BC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-24td:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5124B311-935A-4267-B360-08C8F0BE8691\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-24ts:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E92A4C9B-B5AA-4112-9136-D6E187057BE7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48fd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E328765-1E27-4E50-9DE0-556D4A349151\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48fq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8528780-0254-4D21-8172-71BD01988608\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48fqm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97203BEC-044F-4263-A4EA-536486BBEC6A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48fs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3AAB4D4-6986-4055-B68D-AA9E306DA5BD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48pd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F821C98D-B8E3-44A9-8534-ACBDD4BEB5F3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48pq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"733850D4-DD9D-40B8-BB7F-FF9C26818FAC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48ps:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"276373D2-CB95-43F8-A4C4-5A0E1B0046F7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48td:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77599A2E-3149-4C7B-90A2-C95E4FAAC3E1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48tq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A14F739-1643-4425-8C9E-4A7FB831F4B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-48ts:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E1D0F90-14C7-404F-9F75-9D9937E489D9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3650-8x24uq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCE19812-3A07-4561-BB1A-0B43C11F5FA3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA292FB5-7589-4E22-8AE1-CEE4E987CD9E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-12s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C0BCC2C-20D6-40EB-9334-C83FC5F69A93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-12x48u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F3EC00D-ACEA-49DE-A7A8-42CCA6569D2A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-12xs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1341B21E-49E9-4219-B1B0-592B180D5D09\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EAF61B9-CE12-40E9-9DCE-D3411E74BBB3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-24s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1DB530A-74B9-43DA-B8E8-A761E6A159F1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-24t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B8C8EA0-7767-4CC1-88BE-B678FAFD96C2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-24u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56929D47-3994-4008-87DA-F64AAB7EB12D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-24xs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C0CE864-1B46-4040-87F3-3CFE3517422C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-24xu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7EFF383-6194-41C0-A6FE-DBF17D43EDDD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-48f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA9254CA-6616-4743-B146-A120D97350A2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D75A217-8CDF-40B5-BB48-D018FFC6BCBA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-48t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C1CD87D-3AAA-4474-8C90-26552FF5C90B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-48u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AE2EAFB-83D9-4517-9B17-3A6D3D846D9F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3850-48xs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"819E8E03-F31D-47BF-9725-6F352924F002\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ws-c3860:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"108BC078-8FD8-42BF-850D-D0B5E1653800\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades en el framework de administraci\\u00f3n web de Cisco IOS XE Software, podr\\u00edan permitir a un atacante remoto autenticado con privilegios de solo lectura elevar los privilegios al nivel de un usuario administrador en un dispositivo afectado.\u0026#xa0;Para m\\u00e1s informaci\\u00f3n sobre estas vulnerabilidades, consulte la secci\\u00f3n Detalles de este aviso.\"}]",
      "id": "CVE-2020-3425",
      "lastModified": "2024-11-21T05:31:02.570",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2020-09-24T18:15:19.213",
      "references": "[{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-3425\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2020-09-24T18:15:19.213\",\"lastModified\":\"2024-11-21T05:31:02.570\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en el framework de administraci\u00f3n web de Cisco IOS XE Software, podr\u00edan permitir a un atacante remoto autenticado con privilegios de solo lectura elevar los privilegios al nivel de un usuario administrador en un dispositivo afectado.\u0026#xa0;Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED5527C-A638-4E20-9928-099E32E17743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A685A9A-235D-4D74-9D6C-AC49E75709CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43052998-0A27-4E83-A884-A94701A3F4CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89526731-B712-43D3-B451-D7FC503D2D65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"302933FE-4B6A-48A3-97F0-4B943251B717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"296636F1-9242-429B-8472-90352C056106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77993343-0394-413F-ABF9-C1215E9AD800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"283971DD-DD58-4A76-AC2A-F316534ED416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F324A5-4830-482E-A684-AB3B6594CEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8120196-8648-49D0-8262-CD4C9C90C37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E7CCE2-C685-4019-9B55-B3BECB3E5F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0699DD6E-BA74-4814-93AB-300329C9D032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E2D781-2684-45F1-AC52-636572A0DCA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479FB47B-AF2E-4FCB-8DE0-400BF325666C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2B4C78-5C31-4F3D-9639-305E15576E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E8AF15-AB46-4EAB-8872-8C55E8601599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957318BE-55D4-4585-AA52-C813301D01C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F11B703-8A0F-47ED-AA70-951FF78B94A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B2557-821D-4E05-B5C3-67192573D97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187F699A-AF2F-42B0-B855-27413140C384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EDEC28-661E-42EF-88F0-F62D0220D2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B825E6-5929-4890-BDBA-4CF4BD2314C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65020120-491D-46CD-8C73-974B6F4C11E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADDCD0A-6168-45A0-A885-76CC70FE2FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F35C623-6043-43A6-BBAA-478E185480CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D83E34F4-F4DD-49CC-9C95-93F9D4D26B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2833EAE-94C8-4279-A244-DDB6E2D15DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B688E46-5BAD-4DEC-8B13-B184B141B169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8F50DB-3A80-4D89-9F7B-86766D37338B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F13F583-F645-4DF0-A075-B4F19D71D128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623BF701-ADC9-4F24-93C5-043A6A7FEF5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5311FBE-12BF-41AC-B8C6-D86007834863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FB055E-72F9-4CB7-A51D-BF096BD1A55D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FBD681F-7969-42BE-A47E-7C287755DCB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98255E6F-3056-487D-9157-403836EFB9D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521ACFB0-4FB2-44DB-AD7B-C27F9059DE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D4F634-03D5-4D9F-901C-7E9CE45F2F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4463A1D1-E169-4F0B-91B2-FA126BB444CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD58C58-1B0C-4A71-8C02-F555CEF9C253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96852D16-AF50-4C70-B125-D2349E6765D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15B882A-BA60-4932-A55E-F4A798B30EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9C585C-A6EC-4385-B915-046C110BF95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DBE4ED-1CD8-4134-9B33-17A91F44F17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A964D-ABC8-424D-8097-85B832A833BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0375BF9E-D04B-4E5B-9051-536806ECA44E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2266E5A2-B3F6-4389-B8E2-42CB845EC7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012A6CF7-9104-4882-9C95-E6D4458AB778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DE7780-4E8B-4BB6-BDEB-58032EC65851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29CEE37-4044-4A3C-9685-C9C021FD346A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5292764A-7D1C-4E04-86EF-809CB68EDD25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84AE35F-D016-4B8F-8FE2-C2ACB200DFED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BF9829-F80E-4837-A420-39B291C4E17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07F9539-CFBE-46F7-9F5E-93A68169797D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5AB80E7-0714-44ED-9671-12C877B36A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10182B94-6831-461E-B0FC-9476EAB6EBEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D136D2BC-FFB5-4912-A3B1-BD96148CB9A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD5B3AB-27C2-4055-A3B7-0112D089FDA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04081A51-E08F-4114-9276-584E836181D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A46516-CEB7-48D4-879B-341963A1FA31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6EF98FA-6DF9-4935-9639-143E08462BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A443E93-6C4B-4F86-BA7C-7C2A929E795A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314C7763-A64D-4023-9F3F-9A821AE4151F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5820D71D-FC93-45AA-BC58-A26A1A39C936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53E377A-0296-4D7A-B97C-576B0026543D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD98C9E8-3EA6-4160-970D-37C389576516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9027A528-2588-4C06-810B-5BB313FE4323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7745ED34-D59D-49CC-B174-96BCA03B3374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AF4CF3-6E79-4EA3-974D-CD451A192BA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"313BD54C-073C-4F27-82D5-C99EFC3A20F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B96E01-3777-4C33-9225-577B469A6CE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5019B59-508E-40B0-9C92-2C26F58E2FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E306B09C-CB48-4067-B60C-5F738555EEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD446C51-E713-4E46-8328-0A0477D140D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51FA707-8DB1-4596-9122-D4BFEF17F400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04DF35A-1B6F-420A-8D84-74EB41BF3700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"211CC9B2-6108-4C50-AB31-DC527C43053E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB8A757-7888-4AC2-BE44-B89DB83C6C77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B80890A8-E3D3-462C-B125-9E9BC6525B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0547E196-5991-4C33-823A-342542E9DFD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"802CBFC1-8A2F-4BF7-A1D3-00622C33BE16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D916389F-54DB-44CB-91DD-7CE3C7059350\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8AED7C-DDA3-4C29-BB95-6518C02C551A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9421DBEF-AE42-4234-B49F-FCC34B804D7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5419CB9F-241F-4431-914F-2659BE27BEA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5720462A-BE6B-4E84-A1A1-01E80BBA86AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"818CEFA6-208C-43C3-8E43-474A93ADCF21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B60888-6E2B-494E-AC65-83337661EE7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7594E307-AC80-41EC-AE94-07E664A7D701\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C913FF-63D5-43FB-8B39-598EF436BA5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD2794BD-C8CE-46EF-9857-1723FCF04E46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"444F688F-79D0-4F22-B530-7BD520080B8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55DD2272-10C2-43B9-9F13-6DC41DBE179B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7428E0A8-1641-47FB-9CA9-34311DEF660D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7401B7-094C-46EB-9869-2F0372E8B26B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"854D9594-FE84-4E7B-BA21-A3287F2DC302\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9ED0E5-CB20-4106-9CF2-8EB587B33543\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0E620C-8E09-4F7C-A326-26013173B993\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF93F1C8-669F-4ECB-8D81-ECDA7B550175\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0BA345-B7D7-4975-9199-4DC7875BBFD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18736C74-F68F-4D0B-AE2B-4BC1834EF794\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D223C2AB-22A4-42B5-8BBB-78E2CBF23B40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDD3EAA2-8F25-4099-B76F-5ACC3BE34610\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE9BD57F-BDAC-46DD-AF87-8914B29670F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCEBFFC-DD60-4CB1-A7F2-9AC09977BA4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F7B21F-1DAA-45C7-8C24-D3A19F1C5459\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4F9918-E075-4F78-AFD7-0BB7FA97C1F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E00A0B-A58E-472F-B107-0FE106751F2D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB45406-5216-4A11-B8D3-C44639DC26B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215D01AE-3767-482A-85C5-3361506F0AC3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E37A8-166F-4534-9089-D20B1227F4DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D6DAE3-BAD0-46D8-B899-45B955F532F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327167E8-4B65-4F9D-8760-34CDA03887CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0DA2253-C6A9-4749-B313-6552628A96F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C925086A-94B9-4FE0-9FEB-3242C1217453\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB14B34-4035-41D2-834B-7FB069264207\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F257D2BE-7618-4B6A-AFCE-6D9D0084FA1D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA927CE-9D8E-4BC0-9EA6-641E7C4F71B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A46D298-1685-410E-879C-2EBC45C185AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4ACF54-E576-4D8A-A4E6-17A37EEC53DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196A7C06-8371-479D-973D-591DEB181739\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE42511E-9883-4779-A8E5-FC3E16EF2793\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB06AD21-91A7-46B8-8F44-683828A5422D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA169AF-3743-4051-B63B-FF6E1ADCD886\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D13CF5B-4482-4C7D-8D6A-E220F3E4F868\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92134C0A-4E5B-43EF-8439-484DF504C43C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26ECF9BD-F632-4A02-8993-C0D44B91289C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48730DB5-94AF-4BE7-8047-52B8B47CE35A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A88142-3284-4C25-8774-36004B5F9087\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB76311-4B6D-4897-A683-4244E92BD570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDA2975-CDB7-4182-A03E-D34F15CDF6F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B9D0B5-4BE1-490E-9A68-00A3D357BC3D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FA2F5A-6146-4142-96A8-552118E4BB67\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF786D6-F28F-49D8-A15C-BFD0AA934355\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA32B0AC-1B0A-4ED8-8532-9C7BE6E059D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BFEE45F-C5AC-483D-9DE6-4CEB98D80A0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6F5BBC-4627-4A3E-B827-3CEE7EE969D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B2E41E2-00CE-42C4-8C91-9307D76F5D7A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CB2D23-B5F8-4FA9-8431-3B0124CE2140\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A8BA9F-3361-43CD-8031-A5DF0AD68BEB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFE4BB6-FC9A-42B3-B8A0-2610D71BB9B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D13F1D-345D-45D5-9000-DAFE8A85D71B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFB064E-E390-47B5-AA76-5D3D2E368055\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CCB8270-A01D-40A6-BF4B-26BAF65E68F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5361C70A-C036-4254-9698-BC58F48C465B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75310844-0DEA-4F0B-B9DB-AA55AA3EED17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-12x48ur:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D2AC87-9D6C-4E49-8923-F6B5C73B18F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-12x48uz:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A51E5D-501F-4EDE-8566-A6C217D4C7C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB1635F-48C9-47A4-8284-953DFA0B1C89\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24pdm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE619CD8-98F9-4CAC-BFB7-EB4DD84040B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE323F9B-C767-4B8E-82C2-1387F29444BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24td:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5124B311-935A-4267-B360-08C8F0BE8691\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E92A4C9B-B5AA-4112-9136-D6E187057BE7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E328765-1E27-4E50-9DE0-556D4A349151\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8528780-0254-4D21-8172-71BD01988608\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fqm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97203BEC-044F-4263-A4EA-536486BBEC6A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48fs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AAB4D4-6986-4055-B68D-AA9E306DA5BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821C98D-B8E3-44A9-8534-ACBDD4BEB5F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"733850D4-DD9D-40B8-BB7F-FF9C26818FAC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276373D2-CB95-43F8-A4C4-5A0E1B0046F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48td:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77599A2E-3149-4C7B-90A2-C95E4FAAC3E1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48tq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A14F739-1643-4425-8C9E-4A7FB831F4B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1D0F90-14C7-404F-9F75-9D9937E489D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3650-8x24uq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE19812-3A07-4561-BB1A-0B43C11F5FA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA292FB5-7589-4E22-8AE1-CEE4E987CD9E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-12s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0BCC2C-20D6-40EB-9334-C83FC5F69A93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-12x48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3EC00D-ACEA-49DE-A7A8-42CCA6569D2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-12xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1341B21E-49E9-4219-B1B0-592B180D5D09\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EAF61B9-CE12-40E9-9DCE-D3411E74BBB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DB530A-74B9-43DA-B8E8-A761E6A159F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B8C8EA0-7767-4CC1-88BE-B678FAFD96C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56929D47-3994-4008-87DA-F64AAB7EB12D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0CE864-1B46-4040-87F3-3CFE3517422C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-24xu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7EFF383-6194-41C0-A6FE-DBF17D43EDDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9254CA-6616-4743-B146-A120D97350A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D75A217-8CDF-40B5-BB48-D018FFC6BCBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1CD87D-3AAA-4474-8C90-26552FF5C90B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AE2EAFB-83D9-4517-9B17-3A6D3D846D9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3850-48xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"819E8E03-F31D-47BF-9725-6F352924F002\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ws-c3860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108BC078-8FD8-42BF-850D-D0B5E1653800\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"name\": \"20200924 Cisco IOS XE Software Privilege Escalation Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:30:58.396Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3425\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-13T17:17:47.499518Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-13T17:20:07.098Z\"}}], \"cna\": {\"title\": \"Cisco IOS XE Software Privilege Escalation Vulnerabilities\", \"source\": {\"defect\": [[\"CSCvs40347\", \"CSCvu90974\"]], \"advisory\": \"cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XE Software 16.1.1\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"datePublic\": \"2020-09-24T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"name\": \"20200924 Cisco IOS XE Software Privilege Escalation Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-09-24T18:01:18\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"8.8\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}}, \"source\": {\"defect\": [[\"CSCvs40347\", \"CSCvu90974\"]], \"advisory\": \"cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco IOS XE Software 16.1.1\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM\", \"name\": \"20200924 Cisco IOS XE Software Privilege Escalation Vulnerabilities\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to the level of an Administrator user on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3425\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS XE Software Privilege Escalation Vulnerabilities\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-09-24T16:00:00\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2020-3425\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-13T17:56:44.147Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-09-24T18:01:18.802569Z\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.