CVE-2024-20381
Vulnerability from cvelistv5
Published
2024-09-11 16:38
Modified
2024-09-27 13:58
Severity ?
EPSS score ?
Summary
Cisco Network Services Orchestrator Configuration Update Authorization Bypass Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "network_services_orchestrator", "vendor": "cisco", "versions": [ { "status": "affected", "version": "5.4.1" }, { "status": "affected", "version": "5.3.1" } ] }, { "cpes": [ "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "small_business_rv_series_router_firmware", "vendor": "cisco", "versions": [ { "status": "affected", "version": "1.0.01.17" }, { "status": "affected", "version": "1.0.03.17" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xr", "vendor": "cisco", "versions": [ { "status": "affected", "version": "6.5.3" }, { "status": "affected", "version": "6.5.29" }, { "status": "affected", "version": "6.5.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.5.2" }, { "status": "affected", "version": "6.5.92" }, { "status": "affected", "version": "6.5.15" }, { "status": "affected", "version": "6.6.2" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "6.6.25" }, { "status": "affected", "version": "6.5.28" }, { "status": "affected", "version": "6.5.93" }, { "status": "affected", "version": "6.6.12" }, { "status": "affected", "version": "6.5.90" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.1.1" }, { "status": "affected", "version": "7.0.90" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.7.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.1.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "6.7.2" }, { "status": "affected", "version": "7.0.11" }, { "status": "affected", "version": "7.0.12" }, { "status": "affected", "version": "7.0.14" }, { "status": "affected", "version": "7.1.25" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "7.2.12" }, { "status": "affected", "version": "7.3.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20381", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T03:55:16.289362Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T13:58:21.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco IOS XR Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.5.3" }, { "status": "affected", "version": "6.5.29" }, { "status": "affected", "version": "6.5.1" }, { "status": "affected", "version": "6.6.1" }, { "status": "affected", "version": "6.5.2" }, { "status": "affected", "version": "6.5.92" }, { "status": "affected", "version": "6.5.15" }, { "status": "affected", "version": "6.6.2" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "6.6.25" }, { "status": "affected", "version": "6.5.26" }, { "status": "affected", "version": "6.6.11" }, { "status": "affected", "version": "6.5.25" }, { "status": "affected", "version": "6.5.28" }, { "status": "affected", "version": "6.5.93" }, { "status": "affected", "version": "6.6.12" }, { "status": "affected", "version": "6.5.90" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "7.1.1" }, { "status": "affected", "version": "7.0.90" }, { "status": "affected", "version": "6.6.3" }, { "status": "affected", "version": "6.7.1" }, { "status": "affected", "version": "7.0.2" }, { "status": "affected", "version": "7.1.15" }, { "status": "affected", "version": "7.2.0" }, { "status": "affected", "version": "7.2.1" }, { "status": "affected", "version": "7.1.2" }, { "status": "affected", "version": "6.7.2" }, { "status": "affected", "version": "7.0.11" }, { "status": "affected", "version": "7.0.12" }, { "status": "affected", "version": "7.0.14" }, { "status": "affected", "version": "7.1.25" }, { "status": "affected", "version": "6.6.4" }, { "status": "affected", "version": "7.2.12" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "7.1.3" }, { "status": "affected", "version": "6.7.3" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.2.2" }, { "status": "affected", "version": "6.7.4" }, { "status": "affected", "version": "6.5.31" }, { "status": "affected", "version": "7.3.15" }, { "status": "affected", "version": "7.3.16" }, { "status": "affected", "version": "6.8.1" }, { "status": "affected", "version": "7.4.15" }, { "status": "affected", "version": "6.5.32" }, { "status": "affected", "version": "7.3.2" }, { "status": "affected", "version": "7.5.1" }, { "status": "affected", "version": "7.4.16" }, { "status": "affected", "version": "7.3.27" }, { "status": "affected", "version": "7.6.1" }, { "status": "affected", "version": "7.5.2" }, { "status": "affected", "version": "7.8.1" }, { "status": "affected", "version": "7.6.15" }, { "status": "affected", "version": "7.5.12" }, { "status": "affected", "version": "7.8.12" }, { "status": "affected", "version": "7.3.3" }, { "status": "affected", "version": "7.7.1" }, { "status": "affected", "version": "6.8.2" }, { "status": "affected", "version": "7.3.4" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "6.7.35" }, { "status": "affected", "version": "6.9.1" }, { "status": "affected", "version": "7.6.2" }, { "status": "affected", "version": "7.5.3" }, { "status": "affected", "version": "7.7.2" }, { "status": "affected", "version": "6.9.2" }, { "status": "affected", "version": "7.9.1" }, { "status": "affected", "version": "7.10.1" }, { "status": "affected", "version": "7.8.2" }, { "status": "affected", "version": "7.5.4" }, { "status": "affected", "version": "6.5.33" }, { "status": "affected", "version": "7.8.22" }, { "status": "affected", "version": "7.7.21" }, { "status": "affected", "version": "7.9.2" }, { "status": "affected", "version": "7.3.5" }, { "status": "affected", "version": "7.5.5" }, { "status": "affected", "version": "7.11.1" }, { "status": "affected", "version": "7.9.21" }, { "status": "affected", "version": "7.10.2" }, { "status": "affected", "version": "24.1.1" }, { "status": "affected", "version": "7.6.3" }, { "status": "affected", "version": "7.3.6" }, { "status": "affected", "version": "7.5.52" }, { "status": "affected", "version": "7.11.2" }, { "status": "affected", "version": "24.2.1" }, { "status": "affected", "version": "24.1.2" }, { "status": "affected", "version": "24.2.11" } ] }, { "defaultStatus": "unknown", "product": "Cisco Network Services Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "5.4.1" }, { "status": "affected", "version": "5.3.1" }, { "status": "affected", "version": "4.4.1" }, { "status": "affected", "version": "5.2.1.1" }, { "status": "affected", "version": "5.4.0.1" }, { "status": "affected", "version": "4.7.1" }, { "status": "affected", "version": "5.2.0.3" }, { "status": "affected", "version": "5.2.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.4" }, { "status": "affected", "version": "4.5.1" }, { "status": "affected", "version": "5.4.0.2" }, { "status": "affected", "version": "4.7.3" }, { "status": "affected", "version": "5.2.0.4" }, { "status": "affected", "version": "5.1.1.1" }, { "status": "affected", "version": "5.1.1.3" }, { "status": "affected", "version": "5.2.3.2" }, { "status": "affected", "version": "5.4.1.1" }, { "status": "affected", "version": "5.5" }, { "status": "affected", "version": "5.4.2" }, { "status": "affected", "version": "5.5.1" }, { "status": "affected", "version": "5.4.3" }, { "status": "affected", "version": "5.4.3.1" }, { "status": "affected", "version": "5.5.2" }, { "status": "affected", "version": "5.3.4.3" }, { "status": "affected", "version": "5.5.2.1" }, { "status": "affected", "version": "5.5.2.2" }, { "status": "affected", "version": "5.4.3.2" }, { "status": "affected", "version": "5.5.2.3" }, { "status": "affected", "version": "5.4.4" }, { "status": "affected", "version": "5.4.4.1" }, { "status": "affected", "version": "5.5.2.4" }, { "status": "affected", "version": "5.5.2.5" }, { "status": "affected", "version": "5.5.2.6" }, { "status": "affected", "version": "5.4.4.2" }, { "status": "affected", "version": "5.4.3.3" }, { "status": "affected", "version": "5.5.2.7" }, { "status": "affected", "version": "5.5.2.8" }, { "status": "affected", "version": "5.4.3.4" }, { "status": "affected", "version": "5.4.4.3" }, { "status": "affected", "version": "5.6" }, { "status": "affected", "version": "5.5.2.9" }, { "status": "affected", "version": "5.5.3" }, { "status": "affected", "version": "5.5.2.10" }, { "status": "affected", "version": "5.6.1" }, { "status": "affected", "version": "5.5.2.11" }, { "status": "affected", "version": "5.6.2" }, { "status": "affected", "version": "5.5.3.1" }, { "status": "affected", "version": "5.4.5" }, { "status": "affected", "version": "5.4.5.1" }, { "status": "affected", "version": "5.5.4" }, { "status": "affected", "version": "5.6.3" }, { "status": "affected", "version": "5.5.4.1" }, { "status": "affected", "version": "5.7" }, { "status": "affected", "version": "5.5.2.12" }, { "status": "affected", "version": "5.4.2.1" }, { "status": "affected", "version": "5.6.3.1" }, { "status": "affected", "version": "5.4.5.2" }, { "status": "affected", "version": "5.7.1" }, { "status": "affected", "version": "5.7.1.1" }, { "status": "affected", "version": "5.6.4" }, { "status": "affected", "version": "5.4.2.2" }, { "status": "affected", "version": "5.4.6" }, { "status": "affected", "version": "5.7.2" }, { "status": "affected", "version": "5.7.2.1" }, { "status": "affected", "version": "5.6.5" }, { "status": "affected", "version": "5.5.5" }, { "status": "affected", "version": "5.7.3" }, { "status": "affected", "version": "5.8" }, { "status": "affected", "version": "5.6.6.1" }, { "status": "affected", "version": "5.7.5.1" }, { "status": "affected", "version": "5.6.7.1" }, { "status": "affected", "version": "5.6.7" }, { "status": "affected", "version": "5.5.6.1" }, { "status": "affected", "version": "5.8.1" }, { "status": "affected", "version": "5.6.6" }, { "status": "affected", "version": "5.4.7" }, { "status": "affected", "version": "5.8.2.1" }, { "status": "affected", "version": "5.7.5" }, { "status": "affected", "version": "5.7.4" }, { "status": "affected", "version": "5.8.2" }, { "status": "affected", "version": "5.5.6" }, { "status": "affected", "version": "5.6.7.2" }, { "status": "affected", "version": "5.7.6" }, { "status": "affected", "version": "5.7.6.1" }, { "status": "affected", "version": "5.8.3" }, { "status": "affected", "version": "5.6.8" }, { "status": "affected", "version": "5.7.6.2" }, { "status": "affected", "version": "5.8.4" }, { "status": "affected", "version": "5.5.7" }, { "status": "affected", "version": "5.7.7" }, { "status": "affected", "version": "5.6.9" }, { "status": "affected", "version": "5.6.8.1" }, { "status": "affected", "version": "5.8.5" }, { "status": "affected", "version": "5.5.8" }, { "status": "affected", "version": "5.7.8" }, { "status": "affected", "version": "5.4.7.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "5.7.8.1" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "5.6.10" }, { "status": "affected", "version": "5.8.6" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "5.7.9" }, { "status": "affected", "version": "5.5.9" }, { "status": "affected", "version": "5.6.11" }, { "status": "affected", "version": "5.8.7" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "5.7.10" }, { "status": "affected", "version": "5.6.12" }, { "status": "affected", "version": "5.8.8" }, { "status": "affected", "version": "6.0.4" }, { "status": "affected", "version": "5.5.10" }, { "status": "affected", "version": "5.7.10.1" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "5.7.6.3" }, { "status": "affected", "version": "5.7.11" }, { "status": "affected", "version": "6.0.5" }, { "status": "affected", "version": "5.6.13" }, { "status": "affected", "version": "5.8.9" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "5.7.10.2" }, { "status": "affected", "version": "6.0.6" }, { "status": "affected", "version": "5.7.12" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "5.6.14" }, { "status": "affected", "version": "6.1.2.1" }, { "status": "affected", "version": "5.8.10" }, { "status": "affected", "version": "6.0.7" }, { "status": "affected", "version": "6.1.3" }, { "status": "affected", "version": "5.7.13" }, { "status": "affected", "version": "5.8.11" }, { "status": "affected", "version": "6.1.3.1" }, { "status": "affected", "version": "6.0.8" }, { "status": "affected", "version": "6.1.4" }, { "status": "affected", "version": "5.6.14.1" }, { "status": "affected", "version": "5.8.12" }, { "status": "affected", "version": "6.0.9" }, { "status": "affected", "version": "6.1.5" }, { "status": "affected", "version": "6.2" }, { "status": "affected", "version": "5.8.13" }, { "status": "affected", "version": "5.7.14" }, { "status": "affected", "version": "6.0.10" }, { "status": "affected", "version": "6.1.6" }, { "status": "affected", "version": "6.1.6.1" }, { "status": "affected", "version": "6.0.11" }, { "status": "affected", "version": "6.1.7" }, { "status": "affected", "version": "6.2.2" }, { "status": "affected", "version": "5.7.15" }, { "status": "affected", "version": "6.1.3.2" }, { "status": "affected", "version": "6.1.7.1" }, { "status": "affected", "version": "6.0.12" }, { "status": "affected", "version": "6.1.8" }, { "status": "affected", "version": "5.7.9.1" }, { "status": "affected", "version": "5.7.15.1" }, { "status": "affected", "version": "6.1.10" }, { "status": "affected", "version": "6.1.11" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "6.1.11.1" }, { "status": "affected", "version": "6.1.11.2" }, { "status": "affected", "version": "5.7.17" }, { "status": "affected", "version": "6.1.12" } ] }, { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.01.17" }, { "status": "affected", "version": "1.0.03.17" }, { "status": "affected", "version": "1.0.01.16" }, { "status": "affected", "version": "1.0.01.18" }, { "status": "affected", "version": "1.0.00.29" }, { "status": "affected", "version": "1.0.03.16" }, { "status": "affected", "version": "1.0.03.15" }, { "status": "affected", "version": "1.0.02.16" }, { "status": "affected", "version": "1.0.01.20" }, { "status": "affected", "version": "1.0.00.33" }, { "status": "affected", "version": "1.0.03.18" }, { "status": "affected", "version": "1.0.03.19" }, { "status": "affected", "version": "1.0.03.20" }, { "status": "affected", "version": "1.0.03.21" }, { "status": "affected", "version": "1.0.03.22" }, { "status": "affected", "version": "1.0.03.24" }, { "status": "affected", "version": "1.0.03.26" }, { "status": "affected", "version": "1.0.03.27" }, { "status": "affected", "version": "1.0.03.28" }, { "status": "affected", "version": "1.0.03.29" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\u0026nbsp;\r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:24:52.271Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nso-auth-bypass-QnTEesp", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp" } ], "source": { "advisory": "cisco-sa-nso-auth-bypass-QnTEesp", "defects": [ "CSCwj26769" ], "discovery": "INTERNAL" }, "title": "Cisco Network Services Orchestrator Configuration Update Authorization Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20381", "datePublished": "2024-09-11T16:38:42.096Z", "dateReserved": "2023-11-08T15:08:07.656Z", "dateUpdated": "2024-09-27T13:58:21.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-20381\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-09-11T17:15:12.403\",\"lastModified\":\"2024-10-08T21:43:28.757\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\u0026nbsp;\\r\\n\\r\\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la funci\u00f3n API JSON-RPC en ConfD que utilizan las interfaces de administraci\u00f3n basadas en web de Cisco Crosswork Network Services Orchestrator (NSO), Cisco Optical Site Manager y Cisco RV340 Dual WAN Gigabit VPN Routers podr\u00eda permitir que un atacante remoto autenticado modifique la configuraci\u00f3n de una aplicaci\u00f3n o dispositivo afectado. Esta vulnerabilidad se debe a comprobaciones de autorizaci\u00f3n incorrectas en la API. Un atacante con privilegios suficientes para acceder a la aplicaci\u00f3n o dispositivo afectado podr\u00eda explotar esta vulnerabilidad enviando solicitudes maliciosas a la API JSON-RPC. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar modificaciones no autorizadas a la configuraci\u00f3n de la aplicaci\u00f3n o dispositivo afectado, incluida la creaci\u00f3n de nuevas cuentas de usuario o la elevaci\u00f3n de sus propios privilegios en un sistema afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2FD2C84-CD64-4C1C-BC38-2F7A2A6EEF45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DE98B34-501B-449A-843A-58F297EDBE1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E05C3F-4095-4B9C-8C11-E32567EB14AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582B1A3D-68F5-4047-98B2-FEC2A9569828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDAABB7C-DD62-418F-9CD3-B868913453AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECAACAE-0DFF-43CE-83AF-84FEABAB2CAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9EE8F5-2F17-45E8-91BD-9DB5EE97B0CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C1199B-57C2-4076-A612-5F75AE46B3D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB20C4D-F8AD-4887-8B73-07495439BA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE3676F8-475D-4C5D-A932-633E55A1C115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E2915D-36F8-4AFE-A2E0-59A8DF87A101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6FF116-1FFB-4960-942E-A1A16ACEA7F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFC77F8-4131-42E1-93A4-13149BDCDC1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"676F3DD0-6081-4C37-8E4F-210BC59C3C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54EA6C52-E541-4426-A3DF-2FA88CA28BA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8AE8971-5003-4A39-8173-E17CE9C2523F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36944A2B-E4F5-41DE-AC4D-55BFA603BE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E6EA55E-05BA-483F-AAE1-DD573D22D6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC51CBC1-3303-43EF-B617-AD0C59E36000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C710E576-B368-41C9-88A8-75D88E00F4B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC7F758-5AB7-4A45-A889-BE9DD8D0474E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB06AB15-7F91-4B17-BBBD-AC4E4D1EBF9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D7FA61-7D81-4FF3-827C-A97D35AB541B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"870B498C-3358-4EC0-B75A-B9A5D1DD40DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BB2A02-11B4-48C1-97D7-25A9DF28ABB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5CEC350-6245-453D-BB6D-79D444E1A5FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"004286E0-375F-4385-87EB-0C74BD9CAF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B255442-4F12-41A1-8050-B805AAE65947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FBA2B4-490F-4A00-8967-063F91F197E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93125F1D-0CE5-423F-A73E-46F2A91E5FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00D33162-F298-4B99-A3D4-283A2A4FA091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82AF763B-9299-4EDC-B42D-B83736839CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F70AB37-3C0B-40A8-BC37-5A79DA5F45F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B3622-76A3-4D9F-936C-25A965CE1A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56092600-ABD2-4703-BA00-9DD0AE09B46D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B7EEF2-9B6A-43FC-8DBE-F82B8E01BCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E5C0909-27D8-4B6E-A644-9B8ADFA24266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B842317-A5DB-4890-948A-DD26B7AE2540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EA89C8-AAE8-48F1-91E4-7AE46083A802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48928FFF-871C-4C07-8352-8C802FAD8F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FDB11D-C54D-4654-8142-B50D306A6A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BABFE7-1350-4FB0-B9ED-5F08E386BC40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7FE3667-1B5E-48FB-B3BB-1C1854FFEE72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0370A9-E422-4109-81A3-DE2118A20827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E20F814-87D4-41A5-B0A0-30AC6C6F2BB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82CD7F68-9569-43F4-88ED-96F9A15C065D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2C4C062-F816-41FE-ADAD-F994F4FA4A07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07E9C56-D143-45FA-99FF-30F54A828BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F406EAA7-0607-419F-97E3-7ACEC8A3FA5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9D0641-28F8-4CCB-AEC3-205409D1704A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ECA7B4C-8FDD-4053-B37B-E5E0969C0CB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D21DEFD5-EC43-496B-BBE1-C71C6055BC04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83150BDE-63B7-4B36-8584-E2E950E878CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.3.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8511927B-4297-47BA-BC02-6250BC40DF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C6D7C4-A5D9-4365-9664-EF35586925AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC41A004-2029-4E22-A88F-2B93D9786B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E19F529-B25B-4B4B-879B-872D45C7C3B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D501F5A6-4E23-4A9F-A550-37BB94691687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F7D7FD-24A8-4DD4-8280-A18244059F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7448D1-BC19-45AB-BF6F-3434F8CA2CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A057808-1BCA-4C7C-A2D9-0BD5B09D20F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D09FC0-73C5-4F7A-8013-0B0E5CC834FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFA4A8AF-348D-4F90-B1CB-AE784E0A6EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A66FF7-9BAB-40DA-8B90-C3C271D7E893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88776859-57A0-4422-8D23-A09D64E72F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C95648D-A37A-446B-B106-12612C00A34D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF31489-C029-4D4C-8401-26873FC469E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F79CAFA-73B0-4589-9938-B7898071279C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AA14EF-3240-442E-935A-DF455FB107D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1807BE16-BAA9-4BC6-B98A-13D584A12821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"375746CB-695E-4019-89C9-42ED37A5E958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7D05C0-4065-448B-AAC6-F29E379F3DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8ADA2B1-FD5A-4900-953B-30951C8EF9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B4C7223-3EFB-48C2-BE22-941F60826D0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A14959D-63E1-4B5A-BB7F-A9A2AF3F1137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE83701-C0B7-4ED2-866B-44B7F54FCA0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164B241C-397A-4921-BC5B-F928A21E91C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD3875D-D283-4961-BE31-750FDF9CDF56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87EF9DC5-4BE2-429D-B9BA-EF9F29E7E0F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAEC28C0-8091-49F9-88D1-CB96234BF52A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1ED2B72-A65C-47E4-87B3-D83F29428396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8904CAA5-4E01-462C-AE57-067902CD95FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7750EA99-EC55-4F94-8730-18583647BBBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCE8E968-111F-4F57-93D3-E509AB540B87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B342A550-8600-45CF-8B9A-530770C9A0F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D64E1C4D-46B0-4A18-B8EE-BEA732CBF1F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11288A28-F0CF-4FEC-A0B7-3D93866F01FE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E443700B-7420-4959-8781-29A961DE3144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A41FC95-2C56-41FE-9C1B-853E7D685024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41EF180-BDD5-459B-A3FA-3A34E34A8672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2714BDA1-C8C6-46FB-9467-8AE2E4545753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E525F90-EC23-4625-9A9F-0A924D0C4D6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F07294F0-BDB0-426B-8C37-737C9EB4E605\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF1323A-CD68-4CD9-A8D8-7966399DB432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2331E2-7ED7-49A4-93DE-A7D3D5E63CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FC7C531-EB15-48CB-B38E-2BA17D6637FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BCD116-1AE8-4DA4-9B64-B552EFF23C2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"413626AE-64BD-4A3D-8D59-ADD65EFCCA44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A71B27F-1A89-4E35-BA75-695DE524B4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E8040D-FA4A-44BD-BD20-2A76CC6507AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"765BBD25-32E8-486B-8380-67A5424E4943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CCEB57-23E8-455F-A2EC-2C4478E1CCE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53CA675-2B6A-4AF0-B47A-9CF131914D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F1E3B6-75B4-4A65-A94C-14A5BE5D646E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F91B24FC-A609-4EE9-8D34-CD1B299E7B31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F4C10EB-D35C-4A89-98A8-91AE7294A704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"802BC39C-C12B-457F-9146-6714EB3A6B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6BBC9B-3CF2-4FCC-B05E-9CCFEAEB0444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF3DDC-D4DE-4C57-A268-3F76D5C187AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82400920-83E5-4CEA-B82C-3565F51A8AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D60C892-4637-4C1D-A409-D387293148E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58DBD73-7EB9-4037-9958-AB86B1B89FF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B54847A-2DDA-4732-83CA-A7C5B712F8D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8EDA7A-2225-434C-92FB-46811B86E8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"156A30C4-43FE-4FEB-B02E-091D52219FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD917986-623C-40F0-9259-7C1C8DAB7FE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A252665A-9552-4E5A-8E2D-91367935243A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EEC76C9-943E-493D-8CB3-52CFF1A72B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CAC133-30EF-46B7-891A-A9BB491A28BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0610DF-ED6B-4CE0-B370-BBB0E304F4EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B0392BF-9CE5-4100-B693-63396A0B4B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBF62D1-DF1B-4AF6-BC49-AB9466308EB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF057C73-364F-4F2D-962B-2AA1D85ED7AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DBC58D-9DCD-42A5-99D6-07D3596795A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E6BA26-1B17-4E73-A296-F54961B0ACF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F85FA2F-AEBF-4E2C-957E-DE7A9A1C02EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB4824C6-B348-44B9-A8AD-CAC1F6A563CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABACE44-9BAE-4095-9295-91C07DBE595D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64EB1AD9-9113-4B16-AE62-C0F0DFBEB018\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CE49FB-254A-4E44-B517-6C288B711F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF11B736-689B-4C7F-A1F3-CD97A094F43F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D3D6E8-5143-4628-84FA-848621ADEC63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2E2B31-CB8A-4951-AF08-CFA80E8B27FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7116FF-1330-4A46-AF91-2C5D27B1318D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7154C5-A846-4886-81FF-64214FED7D4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295C0732-456E-4F07-8A38-5957948817EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403FE9A9-E2A3-433E-B548-8D95651E7C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C835D3D2-E6AD-440E-A2F5-082F4C99153B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F8CDAD-EAEC-4797-A21D-8ABF16B32475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1B0F01-0271-4BBD-9889-DEE18BAD5AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F66603-F8EF-4CA1-9879-42E99C210BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309CA68A-C1F4-439A-98D3-741935B8CC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA46058-3BE0-4BC1-82CA-0AE53A80F3FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"144C1FCD-2447-4E07-BD2B-871EC06354F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87EFD8DD-FD2B-4E0A-8303-17DB29E7F5B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FA1FB8-C19E-43D6-84A7-F897160C26A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71D5A54-601E-42A0-AB91-D1E761E0744E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C6998BB-36BA-4810-9B71-ECA7F33E0016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3ACECC-02D8-4BC3-B078-1BADA71E1DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA03D9B-31BC-45F5-990A-874AE3DCAA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCA19CDA-271E-4595-AD80-770B4538BA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D050B2A-27E4-44BF-93B5-0E6BB468D7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70FC4BAB-3B19-4BCA-9D42-1B98F9838152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84A3BFC-6EB7-4033-98DA-29AEBD99CC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C093AC95-6AF3-4DC0-908F-ADF772E4F666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6E5028C-382E-4A03-9A43-F7209BD97539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72232584-47D2-4F3F-BFB8-1095E6724C28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9443CC5-E05C-4A18-ACD9-C19B6E6418BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA243285-5232-4A98-B9BE-B12CD3587FF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB01732E-6DB7-412B-A637-48E0172E6C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B68999-C474-4B21-9111-3260E0F18BE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"932CCBCA-DF46-452F-ABCB-C5C3175FA85F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D92B9DB-E9C5-4001-8447-5C2472688194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C0DDE0-E180-4AE2-940A-0C89EF7DB4B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC224D85-8E47-4A58-A4C9-5D41DDB9D73A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199C8B23-6D39-492C-993E-6225286A0A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9399BB6-714F-4DEA-8ECC-2D0893B672DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98602BBC-C114-418B-B88D-D4AD339B290A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CBD78F0-B77C-4148-A3B2-0C6016930939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F05686-485D-439C-BEA9-926FAB21F12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73C8D395-56A0-4566-847B-7D5C4B2C42B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D92EC730-B1F6-4EAC-BBEF-B5D9C4C85E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1145978F-E24C-47ED-84FC-2AFFBC272DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF994951-C059-4EE9-8591-0695A96A0BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDEC30FD-F737-4E66-9C01-95BA35514568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CA4D17C-F749-4EB5-8286-E0E4AA44493A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"391047D2-AF48-422D-972E-F223291ABD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49A79FA-8AEF-44C3-8699-4CEC4D766904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AE4D74-EC42-4B22-A797-61BDBCADF924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF753CA-96BE-48AD-B270-759B5A18DAF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F189855-3A32-41EB-9443-FDDE4A89F5A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1025F731-68B9-45AD-A241-5D1495A29BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800E3600-ADCA-4E34-9577-C72D16A2066E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"705000A2-856C-4D55-8110-2CBFF703C8D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C68D55F-DA33-4399-9B7D-9554BFAB406C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B622A5A-E399-41D8-8793-AFBB8EE75B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90BA565B-2CA1-450C-B70A-674E0ADDF064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D70D77E-525B-4BC6-B3AE-F8A44FEC61AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"918BA5DD-7471-435D-B63B-502EB376F85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0317414-CCA7-4FAC-913D-F4C00705EA57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E065BC8-435E-4839-9567-E5FDBF661205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4FCC3F-F93C-42B2-B8D2-99BCF4DEB635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179C0976-C7FC-42C7-83E5-86EC9B5D532C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCE317C-C735-42E2-9DB3-BD196BA76D78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AC45034-E4BE-4F06-8309-E549E0D9B562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E05877D6-C2C6-41CD-A991-744D118D3002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C166F45B-D549-4923-AB36-92B3CA62CBB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F97DD8-908D-463E-A450-6C779654F000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E92D58-E51B-4342-964F-C000BD71BF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.7.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BE2AA5-4CF8-4D0A-B352-BE14726F3BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF61782-327C-4318-A4D1-DCB18CD835B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E8DD03-132C-4817-B933-2407B5E0AD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85101BB8-0B1C-4427-8036-9010D1ECE540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"496BA920-9C48-421C-A57F-BE9D915AD579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C9ADE2-55B2-4DF0-8260-442FE5A9793E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B88C8BB-4F6A-46A8-A497-9C60ECEE1007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE403468-28B3-4D77-A9D7-1EE6D76CE471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF76BE52-F087-4CA5-8C24-8BC2F1C97095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4AA8354-B5EF-4531-BAD5-DD93B2B3D4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C21305D6-69A0-404F-89DC-A0E86F80E697\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE99795F-00D9-42F4-815D-19E521082BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C6B391-8090-4497-9EC9-4FD94AAC68DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151E7ABB-C721-4D6A-B3BD-68940759E82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDAA2184-FAEF-4922-9BAB-852877668DBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:5.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C051D85-8C16-491B-85A9-0FC1E145C26C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12372956-7A20-41A8-99AC-681CEAF3CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"068388B1-70D0-4564-A522-674DC5841A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30FAE307-7F0B-4EE2-952C-ECC8BA23182D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44965AAD-ED9A-4B36-B3BD-BE7847F4B792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB064EC-1DFE-4867-996A-07B5A79DCF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68BF41E7-5FDF-4CC6-8FF0-CFE38F6389CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4EABC1-BBBD-4071-B2CA-907B6308860E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A75324A4-4D55-4BB6-9339-A03043180792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"219EC420-2380-4F9D-B82F-5CFA269775A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"990B90E2-10A8-42EA-B4EB-F732DED56228\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32CF825B-3833-4C72-B184-7A632EDBD44F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA216821-8CBB-4516-8A14-D2BCF5788370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1579B285-C10F-41AB-A1AD-EC5F90B20B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63F2B96F-260C-4B52-B13A-062829EC9606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5D03E31-1D49-4E2C-B4D1-36C5FDEB49A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC39C270-F394-45D7-AEF1-90B0BD79196F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F637D6-B3E9-4360-BF15-4DF0578FB44E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E7F783-AB7E-4AAC-AB55-2A583F12F304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88604B7A-5229-4AE0-A9CE-26807EE8462F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF72DE28-B9B9-4610-9134-815F9ECA91B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9E6216-ABF2-423C-AF6A-8CA2A59C727F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CE392E-4967-4642-8684-255D3F1495A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7278073E-4120-4F18-B1F2-BB7CD3906036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D43C8648-6252-4F46-83F6-2AB426B9EE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A0DC561-807C-403D-8411-10D29452B556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9F82F88-BF9E-46F6-89EE-EF40A52AC3DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BAB7B15-928C-46EE-9492-5A90F90B2AEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11EA9560-627B-481F-9D4A-50D3405EECD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3F11CA7-FDA9-4619-8348-6D64AE7F0B6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A9E632-E565-495C-9320-B60C0453255E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF233BA-F8C3-42A4-8B4A-4B8E30D8BFA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88FEF411-FBD1-4325-80B7-7332404E394D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96648453-E5C8-4918-8F41-96D42E1BFFD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450ADE1F-34F3-4D70-9751-2F5B218E4DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48EF6BA-EAA4-4003-AEE9-022640F2DE17\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.00.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786614DB-8964-4884-9E0A-193C89D417D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.00.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36B965F4-8FB6-407C-9B88-53FE29DEF602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD660011-2247-4F85-BA11-1DB838506AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01EFE926-5578-40D7-851D-001F16CE28A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743F3329-FAB7-482C-BD92-5C0C619BA53E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12716096-EB28-4677-AAA9-53F522450BBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.02.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BB289D6-3B6F-4390-A48D-1585C4D17771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE174F74-9CA2-4099-9C36-62F442F17EFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A8DA1B-25AC-4720-A9F2-0F0C20FB064B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F21E0381-D214-42C2-824D-140DC25961F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"058A5EA8-4B92-4FC9-B7A2-2C0AD98E86F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFAA7D9-44BC-4E66-8E5C-C09077A6B9B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543D0D44-2738-4879-A175-B062B6DD4F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29D4A2D7-7FE7-48D5-A851-AC4A182A4C74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B7A5F1-31FA-4E38-BCB4-4BBA3EA043E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61782FA1-1755-4EDE-AEF1-242576D42D5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB56C4B6-49B4-4F2D-8C9A-A2C2CEE6B08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BABC34E-7579-4ABF-A67C-15E781400A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"274BDB13-1477-44BB-A71E-965491FE63A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D6D4EA-3873-4A3E-8226-0B2FBD91D85F\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.