Action not permitted
Modal body text goes here.
cve-2017-12237
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/101037 | Broken Link, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039460 | Broken Link, Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike | Vendor Advisory |
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-03-03
Due date: 2022-03-24
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12237
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "name": "1039460", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039460" }, { "name": "101037", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101037" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-12237", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:32:46.130874Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12237" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:57:00.594Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-09-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-29T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "name": "1039460", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039460" }, { "name": "101037", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101037" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "name": "1039460", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039460" }, { "name": "101037", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101037" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-12237", "datePublished": "2017-09-28T07:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-11-15T17:57:00.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2017-12237", "cwes": "[\"CWE-399\"]", "dateAdded": "2022-03-03", "dueDate": "2022-03-24", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12237", "product": "IOS and IOS XE Software", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS and Cisco IOS XE could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS and IOS XE Software Internet Key Exchange Denial-of-Service Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-12237\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2017-09-29T01:34:48.967\",\"lastModified\":\"2024-07-16T17:27:01.587\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"cisaExploitAdd\":\"2022-03-03\",\"cisaActionDue\":\"2022-03-24\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Cisco IOS and IOS XE Software Internet Key Exchange Denial-of-Service Vulnerability\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el m\u00f3dulo Internet Key Exchange Version 2 (IKEv2) de Cisco IOS desde la versi\u00f3n 15.0 hasta la 15.6 y Cisco IOS XE desde la versi\u00f3n 3.5 hasta la 16.5 podr\u00eda permitir que un atacante remoto no autenticado provoque que haya un consumo elevado de recursos de CPU, que pueda leer trazas del sistema o que reinicie el dispositivo afectado para provocar una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la manera en la que el dispositivo afectado procesa ciertos paquetes IKEv2. Un atacante podr\u00eda explotar esta vulnerabilidad enviando unos paquetes IKEv2 espec\u00edficos al dispositivo afectado para que los procese. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar que haya un consumo elevado de recursos de CPU, que pueda leer trazas del sistema o que reinicie el dispositivo afectado para provocar una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad afecta a dispositivos de Cisco que tienen habilitado ISAKMP (Internet Security Association and Key Management Protocol). Aunque solo se pueden utilizar paquetes IKEv2 para desencadenar esta vulnerabilidad, los dispositivos que ejecuten Cisco IOS o Cisco IOS XE ser\u00edan tambi\u00e9n vulnerables cuando ISAKMP est\u00e1 habilitado. No se necesita configurar los dispositivos con ninguna caracter\u00edstica espec\u00edfica de IKEv2 para que sean vulnerables. Muchas caracter\u00edsticas utilizan IKEv2, incluyendo diferentes tipos de VPN como los mostrados a continuaci\u00f3n: LAN-to-LAN VPN; Remote-access VPN, excepto SSL VPN; Dynamic Multipoint VPN (DMVPN) y FlexVPN. Cisco Bug IDs: CSCvc41277.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0\",\"versionEndIncluding\":\"15.6\",\"matchCriteriaId\":\"650EB42C-D85F-482B-972D-7DCAC210DC48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0e\",\"versionEndIncluding\":\"16.5\",\"matchCriteriaId\":\"F6F88B83-D6C8-4B41-94B2-F95E6E6E5248\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4856E07-B3C2-4674-9584-866F6AF643B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4g\\\\/6g_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F668B9-2C1D-4306-8286-35E67D0F67C7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F77CD6A-83DA-4F31-A128-AD6DAECD623B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62564BB8-1282-4597-A645-056298BE7CCB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D2305B-B69E-4F74-A44E-07B3205CE9F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B68B363-3C57-4E95-8B13-0F9B59D551F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAD4397-6DCF-493A-BD61-3A890F6F3AB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB8A757-7888-4AC2-BE44-B89DB83C6C77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB9229F3-7BCE-46C4-9879-D57B5BAAE44E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B80890A8-E3D3-462C-B125-9E9BC6525B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0547E196-5991-4C33-823A-342542E9DFD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3F374DC-B9F7-4515-A064-01BB436CA984\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D916389F-54DB-44CB-91DD-7CE3C7059350\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5E48D7-2266-4649-90A9-62C476AFE6DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99581637-E184-4A02-8313-57C7C31E5479\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C6D4A90-31B9-4B6C-ADAC-44C49DB44115\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3AF3F75-0BD8-4AA6-B696-3624BEE86681\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C58CEA6-69F8-4021-98C9-4676C70AB167\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF156D97-7C39-49CF-9938-D9681066FF05\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871AC0F6-5C01-43A1-8436-7885439BD81F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2147DBF8-B733-4F76-90C5-9D94F1E93625\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9222CA59-F4FD-478D-83C9-566B389140B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A273EE-41C1-41E9-9002-46F83FC6533F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8AED7C-DDA3-4C29-BB95-6518C02C551A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321\\\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C90C43-2D7D-43F8-AD7F-421878909AE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321\\\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"445597DA-7EEC-470D-9A71-BC43A9F7DE5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321\\\\/k9_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86049773-C88D-4A26-A0D3-D40F3C312AEC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9421DBEF-AE42-4234-B49F-FCC34B804D7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331\\\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB4B7C2-4D45-4267-BCBB-57D36C6104A3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331\\\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B8A4630-8B21-4994-8EF5-E105593A64E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331\\\\/k9_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F799DC02-EB06-458C-8545-A174475FE7A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5419CB9F-241F-4431-914F-2659BE27BEA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351\\\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B89FBA68-A8ED-4C5A-916E-A68468F59730\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351\\\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351\\\\/k9_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC278B77-AD63-42AD-B9E8-EE4DE97E27E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5720462A-BE6B-4E84-A1A1-01E80BBA86AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697BEF89-6D9B-4870-BE85-9090152F3E6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"818CEFA6-208C-43C3-8E43-474A93ADCF21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82225D40-537F-41D2-B1C4-1B7D06466B06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B60888-6E2B-494E-AC65-83337661EE7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E055F58F-F9FB-4B27-841E-61ECAB5F42B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B832863-E366-46ED-BC35-838762F0CE29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34DAD43-0C95-4830-8078-EFE3E6C0A930\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F5CBF0-7F55-44C0-B321-896BDBA22679\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D381E343-416F-42AF-A780-D330954F238F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4318C0-0FD0-46B3-8E23-94EC53A34A20\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FC6220-78E1-44A6-A596-6368D3EF7CC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCAEDE0A-E6F9-4727-8DC2-F47579220BE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6655851F-58D9-49D9-A56E-8440A7F7BB45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E2AE67-DED3-4414-A194-386ADB2C8DC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3920133A-684D-4A9F-B65A-FF4EAE5052E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED06361-5A68-4656-AEA5-240C290594CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE2514A1-486C-40F7-8746-56E2B973CBE6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C3816C-95F4-443C-9C79-72F0251528F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1810C73-93B8-4EB5-85FC-3585AD5256BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2BC76E-A166-4E71-B058-F49FF84A9E19\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542244A0-300C-4630-812A-BF45F61E38DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91209C16-A620-44A0-9134-8AA456343F29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2182E7-C813-4966-A36C-E648A9344299\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED7C321E-F083-4AB6-96A0-D6358980441E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7594E307-AC80-41EC-AE94-07E664A7D701\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33208B25-0CBB-4E31-A892-60B7B5625155\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C913FF-63D5-43FB-8B39-598EF436BA5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241EEBD9-76E4-4AE6-96B8-1C1ACD834F17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4376E56-A21C-4642-A85D-439C8E21CD7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD2794BD-C8CE-46EF-9857-1723FCF04E46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC03A84F-C8F2-4225-9A00-8FA35368CD57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"444F688F-79D0-4F22-B530-7BD520080B8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51F2A755-556C-4C5E-8622-96D124319AF7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55DD2272-10C2-43B9-9F13-6DC41DBE179B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7428E0A8-1641-47FB-9CA9-34311DEF660D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7401B7-094C-46EB-9869-2F0372E8B26B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"854D9594-FE84-4E7B-BA21-A3287F2DC302\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C81CC6E3-B989-4730-820E-46734E3E608D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7814FA61-CAF1-46DE-9D84-CEBE6480EA03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE4F60E-DF3D-4839-8731-7CF16DA8FF26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA5EEE3-A084-46B4-84C0-ADFD69800649\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"592F67D5-344B-49AF-A277-1089A40AC2FD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7434059A-25B8-4FAC-A756-6E571348B76E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2A5355-BF40-437C-8683-A7A81DEE362C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F4B90E-3499-45D4-864D-18505E2149F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858FEECF-CC69-4E68-8E8A-674643021964\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE5FCCFF-E491-474F-9B86-AB51D8244582\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8464F8-D6D2-4165-ADE8-B40F7D8556C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61007628-A81B-43E0-86DE-1F7DDAD9F1A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B9F022-4C3D-493E-9418-E9CDDAFEC9B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39F250E-6A89-4537-BD31-1FB81734A9A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8904EAF5-25E7-4A6B-8117-1859F913B83B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A369CD35-1242-4556-A83D-BD69CC149CFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"784A1499-1F33-493D-B433-EB2550C03C19\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A990D6-B748-4AFD-B924-1D19680BD3DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFC88D-5480-46E4-BF74-E11A514A8BDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54D16A8-0407-41E3-9599-9A6F57E1AA75\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF3818CC-8653-4A9E-A57B-950A15914D6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EDC790B-B42D-45DB-ACF5-A789F76C2BC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A6BC84-91F2-437D-9D2E-F8B3F5966767\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F331F13-5D05-4213-B442-D48D8E22287B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E312F4-90DA-40E4-BCD1-92F41BEEEECF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA32EA3F-946D-430D-B00F-939D828DD72C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D239A09C-34D2-4418-B538-03A1080B8479\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C84561E-DD99-4433-9EF2-083F7C300123\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29871BE-CA7D-4108-B46A-CBD539C9A2B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39CD9189-6524-4157-B90E-FF6A81DE3599\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF1B702-643A-4AF2-B0AD-3C540CF85F2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96269625-CB31-4850-872B-B2C1321B13B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"426B68A6-3A41-43DB-846F-AEFBA62E221B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDE086A-3FE5-46E3-BD66-23D0AE5089BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA53775A-D3ED-4D34-8338-A384DBEB94E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7D4522-D6BB-467F-AF5D-4D753A89D524\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C96215F-A300-4B4E-9D3A-C32E484BFC5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C680534-C663-40B0-A4AA-7F292EE60FE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF4F233-7B47-46ED-BDC5-A589BCFC0B39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A528EC0-4650-4787-BE52-A588E7E38A31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53898E96-03D6-43A2-AE05-46C62464BD26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465917E5-8BF0-4BBB-85A0-DE8F516880C9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9FA66D9-E465-406E-A95C-608A1BE34D74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1456B204-A2A5-4790-A684-7F50D692EC9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD715BDD-7C74-4785-BEDF-75918F6FB37A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD10664-94D0-48C0-92EF-E8EA66841245\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"071A47F9-FF35-4F2C-BF5D-897CAC8BC08A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E988448-36C9-47E0-9356-DA400EB824E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D067EF9-00DB-4979-B12E-55749059A083\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9FA300A-44B1-44EE-8111-C1296EB0B638\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8598A543-B30B-4BD4-9974-F432FFFDCDD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DEBBAD-D28D-4784-BBD8-9FAD1710A919\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC516-6B48-4D77-B26D-FA097AC91D1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7437E4-5C09-436C-AFBC-F6B6747A4339\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBC0277-4990-4DE7-AD80-20E8A6F561D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7DAF69-662B-4999-A6AD-AA528B53EAF7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28306B1-3DDE-4444-9784-522B3D2163EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9257D187-1F2D-40F4-8C87-78978DB56C3F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AF8261-74E0-4F53-B82C-A7BA7559D7CB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25AE251E-E99F-4546-85B0-C57834B040B7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C62FFCB9-4253-459B-9298-C252DA9177DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"991CBDFB-6836-4D1F-80A9-14EBCE3F855F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4C0250-DA0D-4CEE-99F4-C211163C6653\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D453BF6-AB9F-4D47-B4DF-C25C67358FFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005F5347-A5E6-4954-ACAB-E4DF29119724\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2A8413-DF92-4690-8BC1-A21001BDF76B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882B8D8F-E154-45C3-BB47-5353167C9776\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54B4EB4-EB41-4522-B7AB-C30F96099EA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD7BE51-0BA6-4750-B274-A6E33D32B484\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2305B8A-B8F2-4AF4-A86A-EFF11541D62D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C3EF8E-DF88-46DC-8E06-B009F346D1D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E87F823-D924-4718-AD81-248A6C619531\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA01B5E-9E7B-4EE6-9480-A82B753BBB82\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAC93E0-F982-4E37-866E-43B7BC5AC82E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC866C9-BB98-4320-9FFA-F0960C560DA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AD7495-3DA2-4596-9620-CD36D7C561AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E492F3F8-4188-41E4-9A84-5E30C4AC3378\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718F2FDC-9EA4-4C4C-8821-B15E56AF8101\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC5CB558-BD42-4615-BC31-41CCF25DE5C9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC04072A-9BBE-4A9D-AE39-054D93E0C6D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45BCCD0-65BB-431F-B448-221C1595CD92\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F33BA722-0680-4074-8D03-41657F8CDCC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295C46B4-5E9F-4DD8-861B-00BA43923306\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431570C7-74A1-4F7E-8FD0-690AEF0F823B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D22E15-E1E8-4115-A55F-5743CA9C5947\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F840171D-CA1C-4E25-BD41-6B871C47BB84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B240B20-CF48-4A72-9653-9D04D59C1391\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D6AC73-67C9-4FA2-A361-FF08B0E3AF47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58430463-EA77-4DC9-ACDE-4DCF92CA2FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CCD143-3D6E-4880-B275-ECF5B04238C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D3784F-C572-4A6F-83B9-BCF64D339BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09C466B-CE87-4A57-B40B-88C94BAAF36B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D58FF034-8E07-4518-A858-5F16F22217E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376AD386-373D-4B24-966F-D11F76C9020F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2280CAA3-03F6-4168-8E50-A6B7132A3B0E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0C1174-C789-4547-9899-F7FCD0905F92\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC366801-655A-403B-ACD9-3BB43802A3C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF5463D0-A8D3-43EC-8CFF-F659A8C84436\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD50BB2-BFD8-42F2-8C23-0D95187B01F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05D4D7E4-B195-46D8-8A6B-6AA4B8357618\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39600E51-4A21-4E5B-9FF9-E7C00AE86646\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E4D5A8-7E4A-44C5-81DC-84712781206D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D6D50-D0FA-4527-BED3-52560DDD5253\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"965BF315-D833-4711-97FC-512151113367\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0ADEBE-3DA2-4850-8115-0AC937FB0A94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04072C0F-78A2-4D10-87B2-52DC2537BA89\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD5C080E-D5C4-47B2-A46C-4EB3051C5221\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CEBEE0-DA67-4EE5-9BCF-263843053A8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD262F58-C47F-439E-A9FF-D1C60120D306\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35490BDE-DF21-495E-9F8A-7631FCB32A1F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EFB5B8-4A38-48C5-A363-3C7F7763C1D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE9EABE0-5FB0-4277-A389-87732E750B7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7E8914-7B25-4097-8B22-6928C1F03D5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B207857B-C483-47DF-9FC7-6A05B866BF60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB16CCE-1E89-4707-86C1-97F2FB5B62B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04AB61E9-0148-495E-BD21-64D52DE60A6C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D2C587-E95B-4E74-88CF-5930072258D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74270062-2030-45A0-9C93-C1F3B7C88E8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F403859-F034-4DD9-9CA5-708EADECB380\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4A5C56-0D08-4423-AEBD-33EDF172FCF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7670A322-31C2-4A8A-86E9-09D63C52E4C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6376BE-3A69-469C-B6A9-2EFB55A3B87F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0972076B-5C87-44B3-90EC-4C200B89318A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74AED057-2458-4DE0-8D51-ABD766D07F68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19538C03-5FB8-4401-8B21-489C629D7E7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B26D7061-F471-4DF0-A892-ED132958B84A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"033ED443-80E7-4012-9825-07AAC0D44B96\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F3CC6-A349-47B1-B282-B6458683C191\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB24EF21-1C10-48A7-BC68-FFC842A28D12\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED0625A2-BF14-4552-83D8-AEE0A04EA023\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21AFDC0D-7629-424E-827B-C8A8767324C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A263CFF2-A659-405B-90EA-51E49B25C6D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEFBD449-217D-4569-99F7-D56B853A3E07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED668FC-D1A5-4175-A234-23760BA6E788\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D650C48-9241-42F7-87A9-20733329489A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED16A65-9AFF-4825-95D1-162FBA0F566D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82D345E7-8208-41AC-B11A-4425D29E98A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E386D461-F1C1-4970-B056-D6119E74D449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99F3A466-F665-4132-ABC4-2DFC0A7E2B55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3395168-FF2E-4CB6-AABE-5E36DEB241CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226F985C-4669-4D0A-9DB4-CB1465B37B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B736A43-6F4E-40A9-84E4-D9E251489234\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2FF888F-46F5-4A79-BB88-BB2EC2D27E24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E99CA124-7D86-463B-A31E-A7836B7493E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E014B028-8DD9-428C-B705-8F428F145932\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C44229-A842-49B2-AD3E-79C83DB63EBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C0441D-A7AC-4B4E-970A-3A441C2F66B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5306E847-C718-4C83-9C97-8AB498DC4A88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18287CEF-B574-4498-A256-567CA6E6CA7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E9AAA2C-495E-4FD1-9050-264FDC25254B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5713043E-2535-4540-B3EF-41FAC40BECE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67701D77-8B03-446A-AE22-4B8CCCD6F029\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A2390-7170-4FC0-A95E-3DAB1791017D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F788CBC4-782F-4A43-AC80-4AEF1C43A22D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493989DC-8F1B-45C9-AD11-38B97B958C9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F168FB20-0C44-4A5B-910A-04B9517545C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"737F22AB-C5A9-4A18-BA3D-38A222491397\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E5DCFD5-2B46-4D06-9E4C-B2325F440F02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5508320-8318-41A8-8026-4A61907C1CD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD337D8-8C72-4025-A8C3-E63598DE7BDB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"176ACF88-6112-4179-8492-50C50577B300\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07FC868-0B38-4F24-BA40-87966FF80AB7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C19A801D-02D7-40B0-88E8-FE7BA8630E60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA59279-3504-417D-9E86-E5886EE198BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4035136-CC10-4DDD-92AF-9DC41D19CF8A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF93F1C8-669F-4ECB-8D81-ECDA7B550175\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0BA345-B7D7-4975-9199-4DC7875BBFD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86879AC0-890E-42F4-9561-6851F38FE0AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19017B10-F630-42CD-ACD2-E817FEF0E7F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A41A34-58D2-4DBC-ABC9-20A62BC8A838\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF0025D-8DE1-437D-9A4E-72C3AC6B46CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CCBE67-E509-43EC-9AFB-8A9B6A115126\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA015C4-7163-4FCD-ADE1-D5481B10EACA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D19136-4ECB-437F-BA8A-E2FE35A39BF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5361C70A-C036-4254-9698-BC58F48C465B\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/101037\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039460\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
cisco-sa-20170927-ike
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition.\r\n\r\nThe vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition.\r\n\r\nCisco has released software updates that address this vulnerability. There is a workaround that addresses this vulnerability.\r\n\r\n\r\n\r\nThis advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-63410\"].", "title": "Summary" }, { "category": "general", "text": "This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS Software or Cisco IOS XE Software and have the Internet Security Association and Key Management Protocol (ISAKMP) enabled.\r\n\r\nFor information about which Cisco IOS and IOS XE Software releases are vulnerable, see the Fixed Software [\"#fixed\"] section of this advisory.\r\n\r\nAlthough only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled.\r\n\r\nA device does not need to be configured with any IKEv2-specific features to be vulnerable.\r\n\r\nMany features use IKEv2, including different types of VPNs such as the following:\r\n\r\nLAN-to-LAN VPN\r\nRemote-access VPN, excluding SSL VPN\r\nDynamic Multipoint VPN (DMVPN)\r\nFlexVPN\r\n\r\nThe preferred method to determine whether a device has been configured for IKE is to issue the show ip sockets or show udp EXEC command in the CLI. If UDP port 500, UDP port 848, or UDP port 4500 is open on a device, the device is processing IKE packets.\r\n\r\nIn the following example, the device is processing IKE packets on UDP port 500 and UDP port 4500, using either IPv4 or IPv6:\r\n\r\n\r\nrouter# show udp\r\n Proto Remote Port Local Port In Out Stat TTY OutputIF 17 --listen-- 192.168.130.21 500 0 0 1001011 0 17(v6) --listen-- UNKNOWN 500 0 0 1020011 0 17 --listen-- 192.168.130.21 4500 0 0 1001011 0 17(v6) --listen-- UNKNOWN 4500 0 0 1020011 0 . . . router#\r\n\r\n\r\nDetermining the Cisco IOS Software Release\r\nTo determine which Cisco IOS Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software. The banner also displays the installed image name in parentheses, followed by the Cisco IOS Software release number and release name. Some Cisco devices do not support the show version command or may provide different output.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS Software Release 15.5(2)T1 and has an installed image name of C2951-UNIVERSALK9-M:\r\n\r\n\r\nRouter\u003e show version\r\n Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2015 by Cisco Systems, Inc. Compiled Mon 22-Jun-15 09:32 by prod_rel_team . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS Software releases, see White Paper: Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].\r\nDetermining the Cisco IOS XE Software Release\r\nTo determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M:\r\n\r\n\r\nios-xe-device# show version\r\n Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2016 by Cisco Systems, Inc. Compiled Sun 27-Mar-16 21:47 by mcpre . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS XE Software releases, see White Paper: Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].", "title": "Vulnerable Products" }, { "category": "general", "text": "No other Cisco products are currently known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco IOS XR Software or Cisco NX-OS Software.\r\n\r\nCisco has also confirmed that this vulnerability does not affect Cisco ASA 5500 Series Adaptive Security Appliances.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The IKEv2 protocol is used in the IPsec protocol suite to negotiate cryptographic attributes that will be used to encrypt or authenticate the communication session. These attributes include the cryptographic algorithm, mode, and shared keys. The result of an IKE negotiation is a shared session secret that will be used to derive cryptographic keys.\r\n\r\nCisco IOS Software and Cisco IOS XE Software support IKEv2 for IPv4 and IPv6 communications. IKEv2 communications can use the following UDP ports:\r\n\r\nUDP port 500\r\nUDP port 848, Group Domain of Interpretation (GDOI)\r\nUDP port 4500, Network Address Translation Traversal (NAT-T)\r\n\r\nOnly IKEv2 packets can trigger this vulnerability. Although IKEv2 is automatically enabled on Cisco IOS Software and Cisco IOS XE Software when ISAKMP is enabled, the vulnerability can be triggered only by sending IKEv2 packets.\r\n\r\nAn attacker could exploit this vulnerability using either IPv4 or IPv6 on any of the listed UDP ports.", "title": "Details" }, { "category": "general", "text": "Depending on the platform and exploit used, impacts of exploitation may differ by platform, including high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition.\r\n\r\nThis vulnerability could lead to high CPU utilization by the Crypto IKEv2 process. The following example shows high CPU utilization that may be caused by this vulnerability:\r\n\r\n\r\nRouter# sh proc cpu sorted\r\n CPU utilization for five seconds: 99%/6%; one minute: 64%; five minutes: 52% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 391 2949388 188131 15677 83.72% 53.79% 43.27% 0 Crypto IKEv2\r\n\r\nTraceback messages triggered by this vulnerability would note CPUHOG indicators for the Crypto IKEv2 process. The following example shows a traceback message that may be caused by this vulnerability:\r\n\r\n\r\ndate-time: %SYS-3-CPUHOG: Task is running for (2275)msecs, more than (2000)msecs (0/0),process = Crypto IKEv2\r\n\r\nIf the device reloads because of this vulnerability, the resulting message would indicate that the Crypto IKEv2 process caused the reload. The following example shows a device reload that results from this vulnerability:\r\n\r\n\r\nIOSXE-WATCHDOG: Process = Crypto IKEv2", "title": "Indicators of Compromise" }, { "category": "general", "text": "If the software release on the device supports the crypto ikev2 limit queue sa-init configuration command (see Cisco bug CSCvc12306 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc12306\"]), using this command is equivalent to performing an upgrade to a fixed release. Otherwise, there are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n\r\nCustomers Without Service Contracts\r\n\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides a tool, the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/selectIOSVersion.x\"], that identifies any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use this tool to perform the following tasks:\r\n\r\nInitiate a search by choosing one or more releases from a drop-down menu or uploading a file from a local system for the tool to parse\r\nEnter the output of the show version command for the tool to parse\r\nCreate a custom search by including all previously published Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication\r\n\r\nTo determine whether a release is affected by any published Cisco Security Advisory, use the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/selectIOSVersion.x\"] on Cisco.com or enter a Cisco IOS Software or Cisco IOS XE Software release-for example, 15.1(4)M2 or 3.13.8S-in the following field:\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "In March 2022, the Cisco Product Security Incident Response Team (PSIRT) became aware of additional attempted exploitation of this vulnerability in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "category": "external", "summary": "Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-63410" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "White Paper: Cisco IOS and NX-OS Software Reference Guide", "url": "https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html" }, { "category": "external", "summary": "CSCvc12306", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc12306" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Cisco IOS Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/selectIOSVersion.x" }, { "category": "external", "summary": "Cisco IOS XE 2 Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032" }, { "category": "external", "summary": "Cisco IOS XE 3S Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754" }, { "category": "external", "summary": "Cisco IOS XE 3SG Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252" } ], "title": "Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability", "tracking": { "current_release_date": "2022-12-17T05:27:48+00:00", "generator": { "date": "2022-12-17T05:27:52+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-20170927-ike", "initial_release_date": "2017-09-27T16:00:00+00:00", "revision_history": [ { "date": "2017-09-27T14:57:54+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2022-12-17T05:27:48+00:00", "number": "1.1.0", "summary": "Updated exploitation information." } ], "status": "final", "version": "1.1.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "15.2(2)S", "product": { "name": "15.2(2)S", "product_id": "CSAFPID-107861" } }, { "category": "service_pack", "name": "15.2(4)S", "product": { "name": "15.2(4)S", "product_id": "CSAFPID-112424" } }, { "category": "service_pack", "name": "15.2(2)S1", "product": { "name": "15.2(2)S1", "product_id": "CSAFPID-114419" } }, { "category": "service_pack", "name": "15.2(2)S2", "product": { "name": "15.2(2)S2", "product_id": "CSAFPID-115687" } }, { "category": "service_pack", "name": "15.2(2)S0a", "product": { "name": "15.2(2)S0a", "product_id": "CSAFPID-116082" } }, { "category": "service_pack", "name": "15.2(2)S0c", "product": { "name": "15.2(2)S0c", "product_id": "CSAFPID-116772" } }, { "category": "service_pack", "name": "15.2(2)S0d", "product": { "name": "15.2(2)S0d", "product_id": "CSAFPID-117359" } }, { "category": "service_pack", "name": "15.2(4)S1", "product": { "name": "15.2(4)S1", "product_id": "CSAFPID-183813" } }, { "category": "service_pack", "name": "15.2(4)S4", "product": { "name": "15.2(4)S4", "product_id": "CSAFPID-183835" } }, { "category": "service_pack", "name": "15.2(4)S6", "product": { "name": "15.2(4)S6", "product_id": "CSAFPID-183836" } }, { "category": "service_pack", "name": "15.2(4)S2", "product": { "name": "15.2(4)S2", "product_id": "CSAFPID-183837" } }, { "category": "service_pack", "name": "15.2(4)S5", "product": { "name": "15.2(4)S5", "product_id": "CSAFPID-183838" } }, { "category": "service_pack", "name": "15.2(4)S3", "product": { "name": "15.2(4)S3", "product_id": "CSAFPID-183839" } }, { "category": "service_pack", "name": "15.2(4)S0c", "product": { "name": "15.2(4)S0c", "product_id": "CSAFPID-184933" } }, { "category": "service_pack", "name": "15.2(4)S1c", "product": { "name": "15.2(4)S1c", "product_id": "CSAFPID-188198" } }, { "category": "service_pack", "name": "15.2(4)S3a", "product": { "name": "15.2(4)S3a", "product_id": "CSAFPID-191686" } }, { "category": "service_pack", "name": "15.2(4)S4a", "product": { "name": "15.2(4)S4a", "product_id": "CSAFPID-195062" } }, { "category": "service_pack", "name": "15.2(4)S7", "product": { "name": "15.2(4)S7", "product_id": "CSAFPID-209059" } }, { "category": "service_pack", "name": "15.2(4)S8", "product": { "name": "15.2(4)S8", "product_id": "CSAFPID-210344" } } ], "category": "product_version", "name": "15.2S" }, { "branches": [ { "category": "service_pack", "name": "15.3(1)T", "product": { "name": "15.3(1)T", "product_id": "CSAFPID-103851" } }, { "category": "service_pack", "name": "15.3(2)T", "product": { "name": "15.3(2)T", "product_id": "CSAFPID-111023" } }, { "category": "service_pack", "name": "15.3(1)T1", "product": { "name": "15.3(1)T1", "product_id": "CSAFPID-187231" } }, { "category": "service_pack", "name": "15.3(1)T2", "product": { "name": "15.3(1)T2", "product_id": "CSAFPID-187232" } }, { "category": "service_pack", "name": "15.3(1)T3", "product": { "name": "15.3(1)T3", "product_id": "CSAFPID-187425" } }, { "category": "service_pack", "name": "15.3(1)T4", "product": { "name": "15.3(1)T4", "product_id": "CSAFPID-189617" } }, { "category": "service_pack", "name": "15.3(2)T1", "product": { "name": "15.3(2)T1", "product_id": "CSAFPID-190432" } }, { "category": "service_pack", "name": "15.3(2)T2", "product": { "name": "15.3(2)T2", "product_id": "CSAFPID-190493" } }, { "category": "service_pack", "name": "15.3(2)T3", "product": { "name": "15.3(2)T3", "product_id": "CSAFPID-191942" } }, { "category": "service_pack", "name": "15.3(2)T4", "product": { "name": "15.3(2)T4", "product_id": "CSAFPID-194942" } } ], "category": "product_version", "name": "15.3T" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SE1", "product": { "name": "15.0(2)SE1", "product_id": "CSAFPID-115939" } }, { "category": "service_pack", "name": "15.0(2)SE2", "product": { "name": "15.0(2)SE2", "product_id": "CSAFPID-116083" } }, { "category": "service_pack", "name": "15.0(2)SE3", "product": { "name": "15.0(2)SE3", "product_id": "CSAFPID-189455" } }, { "category": "service_pack", "name": "15.0(2)SE4", "product": { "name": "15.0(2)SE4", "product_id": "CSAFPID-190635" } }, { "category": "service_pack", "name": "15.0(2)SE5", "product": { "name": "15.0(2)SE5", "product_id": "CSAFPID-192706" } }, { "category": "service_pack", "name": "15.0(2)SE6", "product": { "name": "15.0(2)SE6", "product_id": "CSAFPID-195770" } }, { "category": "service_pack", "name": "15.0(2)SE7", "product": { "name": "15.0(2)SE7", "product_id": "CSAFPID-204097" } }, { "category": "service_pack", "name": "15.0(2)SE8", "product": { "name": "15.0(2)SE8", "product_id": "CSAFPID-209028" } }, { "category": "service_pack", "name": "15.0(2)SE9", "product": { "name": "15.0(2)SE9", "product_id": "CSAFPID-209029" } }, { "category": "service_pack", "name": "15.0(2a)SE9", "product": { "name": "15.0(2a)SE9", "product_id": "CSAFPID-212329" } }, { "category": "service_pack", "name": "15.0(2)SE10", "product": { "name": "15.0(2)SE10", "product_id": "CSAFPID-213788" } }, { "category": "service_pack", "name": "15.0(2)SE11", "product": { "name": "15.0(2)SE11", "product_id": "CSAFPID-220466" } }, { "category": "service_pack", "name": "15.0(2)SE10a", "product": { "name": "15.0(2)SE10a", "product_id": "CSAFPID-222342" } }, { "category": "service_pack", "name": "15.0(2)SE12", "product": { "name": "15.0(2)SE12", "product_id": "CSAFPID-234926" } }, { "category": "service_pack", "name": "15.0(2)SE13", "product": { "name": "15.0(2)SE13", "product_id": "CSAFPID-245380" } }, { "category": "service_pack", "name": "15.0(2)SE13a", "product": { "name": "15.0(2)SE13a", "product_id": "CSAFPID-274199" } }, { "category": "service_pack", "name": "15.0(2)SE13b", "product": { "name": "15.0(2)SE13b", "product_id": "CSAFPID-280778" } }, { "category": "service_pack", "name": "15.0(2)SE13c", "product": { "name": "15.0(2)SE13c", "product_id": "CSAFPID-286843" } } ], "category": "product_version", "name": "15.0SE" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)M", "product": { "name": "15.2(4)M", "product_id": "CSAFPID-106899" } }, { "category": "service_pack", "name": "15.2(4)M1", "product": { "name": "15.2(4)M1", "product_id": "CSAFPID-116774" } }, { "category": "service_pack", "name": "15.2(4)M2", "product": { "name": "15.2(4)M2", "product_id": "CSAFPID-117681" } }, { "category": "service_pack", "name": "15.2(4)M4", "product": { "name": "15.2(4)M4", "product_id": "CSAFPID-117682" } }, { "category": "service_pack", "name": "15.2(4)M3", "product": { "name": "15.2(4)M3", "product_id": "CSAFPID-117683" } }, { "category": "service_pack", "name": "15.2(4)M5", "product": { "name": "15.2(4)M5", "product_id": "CSAFPID-117789" } }, { "category": "service_pack", "name": "15.2(4)M8", "product": { "name": "15.2(4)M8", "product_id": "CSAFPID-117800" } }, { "category": "service_pack", "name": "15.2(4)M10", "product": { "name": "15.2(4)M10", "product_id": "CSAFPID-117801" } }, { "category": "service_pack", "name": "15.2(4)M7", "product": { "name": "15.2(4)M7", "product_id": "CSAFPID-117802" } }, { "category": "service_pack", "name": "15.2(4)M6", "product": { "name": "15.2(4)M6", "product_id": "CSAFPID-117803" } }, { "category": "service_pack", "name": "15.2(4)M9", "product": { "name": "15.2(4)M9", "product_id": "CSAFPID-117804" } }, { "category": "service_pack", "name": "15.2(4)M6b", "product": { "name": "15.2(4)M6b", "product_id": "CSAFPID-200506" } }, { "category": "service_pack", "name": "15.2(4)M6a", "product": { "name": "15.2(4)M6a", "product_id": "CSAFPID-202559" } }, { "category": "service_pack", "name": "15.2(4)M11", "product": { "name": "15.2(4)M11", "product_id": "CSAFPID-210407" } } ], "category": "product_version", "name": "15.2M" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EX", "product": { "name": "15.0(2)EX", "product_id": "CSAFPID-189064" } }, { "category": "service_pack", "name": "15.0(2)EX1", "product": { "name": "15.0(2)EX1", "product_id": "CSAFPID-189115" } }, { "category": "service_pack", "name": "15.0(2)EX2", "product": { "name": "15.0(2)EX2", "product_id": "CSAFPID-192910" } }, { "category": "service_pack", "name": "15.0(2)EX3", "product": { "name": "15.0(2)EX3", "product_id": "CSAFPID-194540" } }, { "category": "service_pack", "name": "15.0(2)EX4", "product": { "name": "15.0(2)EX4", "product_id": "CSAFPID-194913" } }, { "category": "service_pack", "name": "15.0(2)EX5", "product": { "name": "15.0(2)EX5", "product_id": "CSAFPID-195943" } }, { "category": "service_pack", "name": "15.0(2)EX6", "product": { "name": "15.0(2)EX6", "product_id": "CSAFPID-200496" } }, { "category": "service_pack", "name": "15.0(2)EX7", "product": { "name": "15.0(2)EX7", "product_id": "CSAFPID-201366" } }, { "category": "service_pack", "name": "15.0(2)EX8", "product": { "name": "15.0(2)EX8", "product_id": "CSAFPID-204831" } }, { "category": "service_pack", "name": "15.0(2a)EX5", "product": { "name": "15.0(2a)EX5", "product_id": "CSAFPID-205064" } } ], "category": "product_version", "name": "15.0EX" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)GC", "product": { "name": "15.2(2)GC", "product_id": "CSAFPID-116219" } }, { "category": "service_pack", "name": "15.2(3)GC", "product": { "name": "15.2(3)GC", "product_id": "CSAFPID-116726" } }, { "category": "service_pack", "name": "15.2(3)GC1", "product": { "name": "15.2(3)GC1", "product_id": "CSAFPID-189765" } }, { "category": "service_pack", "name": "15.2(4)GC", "product": { "name": "15.2(4)GC", "product_id": "CSAFPID-193316" } }, { "category": "service_pack", "name": "15.2(4)GC1", "product": { "name": "15.2(4)GC1", "product_id": "CSAFPID-197495" } }, { "category": "service_pack", "name": "15.2(4)GC2", "product": { "name": "15.2(4)GC2", "product_id": "CSAFPID-200634" } }, { "category": "service_pack", "name": "15.2(4)GC3", "product": { "name": "15.2(4)GC3", "product_id": "CSAFPID-203066" } } ], "category": "product_version", "name": "15.2GC" }, { "branches": [ { "category": "service_pack", "name": "15.1(1)SY", "product": { "name": "15.1(1)SY", "product_id": "CSAFPID-112489" } }, { "category": "service_pack", "name": "15.1(1)SY1", "product": { "name": "15.1(1)SY1", "product_id": "CSAFPID-115285" } }, { "category": "service_pack", "name": "15.1(2)SY", "product": { "name": "15.1(2)SY", "product_id": "CSAFPID-184932" } }, { "category": "service_pack", "name": "15.1(2)SY1", "product": { "name": "15.1(2)SY1", "product_id": "CSAFPID-188061" } }, { "category": "service_pack", "name": "15.1(2)SY2", "product": { "name": "15.1(2)SY2", "product_id": "CSAFPID-189219" } }, { "category": "service_pack", "name": "15.1(1)SY2", "product": { "name": "15.1(1)SY2", "product_id": "CSAFPID-191635" } }, { "category": "service_pack", "name": "15.1(1)SY3", "product": { "name": "15.1(1)SY3", "product_id": "CSAFPID-194944" } }, { "category": "service_pack", "name": "15.1(2)SY3", "product": { "name": "15.1(2)SY3", "product_id": "CSAFPID-198059" } }, { "category": "service_pack", "name": "15.1(1)SY4", "product": { "name": "15.1(1)SY4", "product_id": "CSAFPID-198426" } }, { "category": "service_pack", "name": "15.1(2)SY4", "product": { "name": "15.1(2)SY4", "product_id": "CSAFPID-201019" } }, { "category": "service_pack", "name": "15.1(1)SY5", "product": { "name": "15.1(1)SY5", "product_id": "CSAFPID-204109" } }, { "category": "service_pack", "name": "15.1(2)SY5", "product": { "name": "15.1(2)SY5", "product_id": "CSAFPID-204110" } }, { "category": "service_pack", "name": "15.1(2)SY4a", "product": { "name": "15.1(2)SY4a", "product_id": "CSAFPID-204832" } }, { "category": "service_pack", "name": "15.1(1)SY6", "product": { "name": "15.1(1)SY6", "product_id": "CSAFPID-209043" } }, { "category": "service_pack", "name": "15.1(2)SY6", "product": { "name": "15.1(2)SY6", "product_id": "CSAFPID-209044" } }, { "category": "service_pack", "name": "15.1(2)SY7", "product": { "name": "15.1(2)SY7", "product_id": "CSAFPID-210406" } }, { "category": "service_pack", "name": "15.1(2)SY8", "product": { "name": "15.1(2)SY8", "product_id": "CSAFPID-214052" } }, { "category": "service_pack", "name": "15.1(2)SY9", "product": { "name": "15.1(2)SY9", "product_id": "CSAFPID-220440" } }, { "category": "service_pack", "name": "15.1(2)SY10", "product": { "name": "15.1(2)SY10", "product_id": "CSAFPID-222650" } } ], "category": "product_version", "name": "15.1SY" }, { "branches": [ { "category": "service_pack", "name": "15.3(1)S", "product": { "name": "15.3(1)S", "product_id": "CSAFPID-113970" } }, { "category": "service_pack", "name": "15.3(2)S", "product": { "name": "15.3(2)S", "product_id": "CSAFPID-116256" } }, { "category": "service_pack", "name": "15.3(3)S", "product": { "name": "15.3(3)S", "product_id": "CSAFPID-117783" } }, { "category": "service_pack", "name": "15.3(1)S2", "product": { "name": "15.3(1)S2", "product_id": "CSAFPID-187962" } }, { "category": "service_pack", "name": "15.3(1)S1", "product": { "name": "15.3(1)S1", "product_id": "CSAFPID-188008" } }, { "category": "service_pack", "name": "15.3(2)S2", "product": { "name": "15.3(2)S2", "product_id": "CSAFPID-191331" } }, { "category": "service_pack", "name": "15.3(2)S1", "product": { "name": "15.3(2)S1", "product_id": "CSAFPID-191336" } }, { "category": "service_pack", "name": "15.3(1)S1e", "product": { "name": "15.3(1)S1e", "product_id": "CSAFPID-192443" } }, { "category": "service_pack", "name": "15.3(3)S1", "product": { "name": "15.3(3)S1", "product_id": "CSAFPID-193406" } }, { "category": "service_pack", "name": "15.3(3)S2", "product": { "name": "15.3(3)S2", "product_id": "CSAFPID-193407" } }, { "category": "service_pack", "name": "15.3(3)S3", "product": { "name": "15.3(3)S3", "product_id": "CSAFPID-193408" } }, { "category": "service_pack", "name": "15.3(3)S6", "product": { "name": "15.3(3)S6", "product_id": "CSAFPID-193409" } }, { "category": "service_pack", "name": "15.3(3)S4", "product": { "name": "15.3(3)S4", "product_id": "CSAFPID-194877" } }, { "category": "service_pack", "name": "15.3(3)S1a", "product": { "name": "15.3(3)S1a", "product_id": "CSAFPID-197457" } }, { "category": "service_pack", "name": "15.3(3)S5", "product": { "name": "15.3(3)S5", "product_id": "CSAFPID-197469" } }, { "category": "service_pack", "name": "15.3(3)S2a", "product": { "name": "15.3(3)S2a", "product_id": "CSAFPID-198066" } }, { "category": "service_pack", "name": "15.3(3)S7", "product": { "name": "15.3(3)S7", "product_id": "CSAFPID-209093" } }, { "category": "service_pack", "name": "15.3(3)S8", "product": { "name": "15.3(3)S8", "product_id": "CSAFPID-209268" } }, { "category": "service_pack", "name": "15.3(3)S6a", "product": { "name": "15.3(3)S6a", "product_id": "CSAFPID-213023" } }, { "category": "service_pack", "name": "15.3(3)S9", "product": { "name": "15.3(3)S9", "product_id": "CSAFPID-213032" } }, { "category": "service_pack", "name": "15.3(3)S8a", "product": { "name": "15.3(3)S8a", "product_id": "CSAFPID-220673" } } ], "category": "product_version", "name": "15.3S" }, { "branches": [ { "category": "service_pack", "name": "15.4(1)T", "product": { "name": "15.4(1)T", "product_id": "CSAFPID-115981" } }, { "category": "service_pack", "name": "15.4(2)T", "product": { "name": "15.4(2)T", "product_id": "CSAFPID-191997" } }, { "category": "service_pack", "name": "15.4(1)T2", "product": { "name": "15.4(1)T2", "product_id": "CSAFPID-196114" } }, { "category": "service_pack", "name": "15.4(1)T1", "product": { "name": "15.4(1)T1", "product_id": "CSAFPID-196255" } }, { "category": "service_pack", "name": "15.4(1)T3", "product": { "name": "15.4(1)T3", "product_id": "CSAFPID-196256" } }, { "category": "service_pack", "name": "15.4(2)T1", "product": { "name": "15.4(2)T1", "product_id": "CSAFPID-201189" } }, { "category": "service_pack", "name": "15.4(2)T3", "product": { "name": "15.4(2)T3", "product_id": "CSAFPID-202715" } }, { "category": "service_pack", "name": "15.4(2)T2", "product": { "name": "15.4(2)T2", "product_id": "CSAFPID-204095" } }, { "category": "service_pack", "name": "15.4(1)T4", "product": { "name": "15.4(1)T4", "product_id": "CSAFPID-204282" } }, { "category": "service_pack", "name": "15.4(2)T4", "product": { "name": "15.4(2)T4", "product_id": "CSAFPID-209101" } } ], "category": "product_version", "name": "15.4T" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)E", "product": { "name": "15.2(1)E", "product_id": "CSAFPID-183811" } }, { "category": "service_pack", "name": "15.2(2)E", "product": { "name": "15.2(2)E", "product_id": "CSAFPID-187057" } }, { "category": "service_pack", "name": "15.2(1)E1", "product": { "name": "15.2(1)E1", "product_id": "CSAFPID-195469" } }, { "category": "service_pack", "name": "15.2(3)E", "product": { "name": "15.2(3)E", "product_id": "CSAFPID-197483" } }, { "category": "service_pack", "name": "15.2(1)E2", "product": { "name": "15.2(1)E2", "product_id": "CSAFPID-198060" } }, { "category": "service_pack", "name": "15.2(1)E3", "product": { "name": "15.2(1)E3", "product_id": "CSAFPID-200488" } }, { "category": "service_pack", "name": "15.2(2)E1", "product": { "name": "15.2(2)E1", "product_id": "CSAFPID-201074" } }, { "category": "service_pack", "name": "15.2(2b)E", "product": { "name": "15.2(2b)E", "product_id": "CSAFPID-204102" } }, { "category": "service_pack", "name": "15.2(4)E", "product": { "name": "15.2(4)E", "product_id": "CSAFPID-204108" } }, { "category": "service_pack", "name": "15.2(3)E1", "product": { "name": "15.2(3)E1", "product_id": "CSAFPID-204186" } }, { "category": "service_pack", "name": "15.2(2)E2", "product": { "name": "15.2(2)E2", "product_id": "CSAFPID-204228" } }, { "category": "service_pack", "name": "15.2(2a)E1", "product": { "name": "15.2(2a)E1", "product_id": "CSAFPID-204818" } }, { "category": "service_pack", "name": "15.2(2)E3", "product": { "name": "15.2(2)E3", "product_id": "CSAFPID-205672" } }, { "category": "service_pack", "name": "15.2(2a)E2", "product": { "name": "15.2(2a)E2", "product_id": "CSAFPID-209045" } }, { "category": "service_pack", "name": "15.2(3)E2", "product": { "name": "15.2(3)E2", "product_id": "CSAFPID-209046" } }, { "category": "service_pack", "name": "15.2(3a)E", "product": { "name": "15.2(3a)E", "product_id": "CSAFPID-209047" } }, { "category": "service_pack", "name": "15.2(3)E3", "product": { "name": "15.2(3)E3", "product_id": "CSAFPID-209358" } }, { "category": "service_pack", "name": "15.2(3m)E2", "product": { "name": "15.2(3m)E2", "product_id": "CSAFPID-209359" } }, { "category": "service_pack", "name": "15.2(4)E1", "product": { "name": "15.2(4)E1", "product_id": "CSAFPID-209887" } }, { "category": "service_pack", "name": "15.2(2)E4", "product": { "name": "15.2(2)E4", "product_id": "CSAFPID-210766" } }, { "category": "service_pack", "name": "15.2(2)E5", "product": { "name": "15.2(2)E5", "product_id": "CSAFPID-211296" } }, { "category": "service_pack", "name": "15.2(4)E2", "product": { "name": "15.2(4)E2", "product_id": "CSAFPID-213610" } }, { "category": "service_pack", "name": "15.2(4m)E1", "product": { "name": "15.2(4m)E1", "product_id": "CSAFPID-214072" } }, { "category": "service_pack", "name": "15.2(3)E4", "product": { "name": "15.2(3)E4", "product_id": "CSAFPID-214078" } }, { "category": "service_pack", "name": "15.2(5)E", "product": { "name": "15.2(5)E", "product_id": "CSAFPID-214556" } }, { "category": "service_pack", "name": "15.2(3m)E7", "product": { "name": "15.2(3m)E7", "product_id": "CSAFPID-216295" } }, { "category": "service_pack", "name": "15.2(4)E3", "product": { "name": "15.2(4)E3", "product_id": "CSAFPID-217805" } }, { "category": "service_pack", "name": "15.2(2)E6", "product": { "name": "15.2(2)E6", "product_id": "CSAFPID-218891" } }, { "category": "service_pack", "name": "15.2(5a)E", "product": { "name": "15.2(5a)E", "product_id": "CSAFPID-218995" } }, { "category": "service_pack", "name": "15.2(5)E1", "product": { "name": "15.2(5)E1", "product_id": "CSAFPID-220441" } }, { "category": "service_pack", "name": "15.2(5b)E", "product": { "name": "15.2(5b)E", "product_id": "CSAFPID-220457" } }, { "category": "service_pack", "name": "15.2(4m)E3", "product": { "name": "15.2(4m)E3", "product_id": "CSAFPID-220664" } }, { "category": "service_pack", "name": "15.2(3m)E8", "product": { "name": "15.2(3m)E8", "product_id": "CSAFPID-220689" } }, { "category": "service_pack", "name": "15.2(2)E5a", "product": { "name": "15.2(2)E5a", "product_id": "CSAFPID-221033" } }, { "category": "service_pack", "name": "15.2(5c)E", "product": { "name": "15.2(5c)E", "product_id": "CSAFPID-221137" } }, { "category": "service_pack", "name": "15.2(2)E5b", "product": { "name": "15.2(2)E5b", "product_id": "CSAFPID-222436" } }, { "category": "service_pack", "name": "15.2(4n)E2", "product": { "name": "15.2(4n)E2", "product_id": "CSAFPID-222500" } }, { "category": "service_pack", "name": "15.2(4o)E2", "product": { "name": "15.2(4o)E2", "product_id": "CSAFPID-222924" } }, { "category": "service_pack", "name": "15.2(5a)E1", "product": { "name": "15.2(5a)E1", "product_id": "CSAFPID-223143" } }, { "category": "service_pack", "name": "15.2(4)E4", "product": { "name": "15.2(4)E4", "product_id": "CSAFPID-224553" } }, { "category": "service_pack", "name": "15.2(5)E2", "product": { "name": "15.2(5)E2", "product_id": "CSAFPID-225740" } }, { "category": "service_pack", "name": "15.2(4p)E1", "product": { "name": "15.2(4p)E1", "product_id": "CSAFPID-226077" } }, { "category": "service_pack", "name": "15.2(5)E2c", "product": { "name": "15.2(5)E2c", "product_id": "CSAFPID-228151" } }, { "category": "service_pack", "name": "15.2(4m)E2", "product": { "name": "15.2(4m)E2", "product_id": "CSAFPID-230588" } }, { "category": "service_pack", "name": "15.2(4o)E3", "product": { "name": "15.2(4o)E3", "product_id": "CSAFPID-230589" } }, { "category": "service_pack", "name": "15.2(4q)E1", "product": { "name": "15.2(4q)E1", "product_id": "CSAFPID-230590" } }, { "category": "service_pack", "name": "15.2(4s)E1", "product": { "name": "15.2(4s)E1", "product_id": "CSAFPID-241916" } }, { "category": "service_pack", "name": "15.2(4s)E2", "product": { "name": "15.2(4s)E2", "product_id": "CSAFPID-250628" } } ], "category": "product_version", "name": "15.2E" }, { "branches": [ { "category": "service_pack", "name": "15.4(1)S", "product": { "name": "15.4(1)S", "product_id": "CSAFPID-187147" } }, { "category": "service_pack", "name": "15.4(2)S", "product": { "name": "15.4(2)S", "product_id": "CSAFPID-190980" } }, { "category": "service_pack", "name": "15.4(3)S", "product": { "name": "15.4(3)S", "product_id": "CSAFPID-193544" } }, { "category": "service_pack", "name": "15.4(1)S1", "product": { "name": "15.4(1)S1", "product_id": "CSAFPID-197474" } }, { "category": "service_pack", "name": "15.4(1)S2", "product": { "name": "15.4(1)S2", "product_id": "CSAFPID-198067" } }, { "category": "service_pack", "name": "15.4(2)S1", "product": { "name": "15.4(2)S1", "product_id": "CSAFPID-200485" } }, { "category": "service_pack", "name": "15.4(1)S3", "product": { "name": "15.4(1)S3", "product_id": "CSAFPID-201259" } }, { "category": "service_pack", "name": "15.4(3)S1", "product": { "name": "15.4(3)S1", "product_id": "CSAFPID-201595" } }, { "category": "service_pack", "name": "15.4(2)S2", "product": { "name": "15.4(2)S2", "product_id": "CSAFPID-204105" } }, { "category": "service_pack", "name": "15.4(3)S2", "product": { "name": "15.4(3)S2", "product_id": "CSAFPID-204106" } }, { "category": "service_pack", "name": "15.4(3)S3", "product": { "name": "15.4(3)S3", "product_id": "CSAFPID-205670" } }, { "category": "service_pack", "name": "15.4(1)S4", "product": { "name": "15.4(1)S4", "product_id": "CSAFPID-209095" } }, { "category": "service_pack", "name": "15.4(2)S3", "product": { "name": "15.4(2)S3", "product_id": "CSAFPID-209096" } }, { "category": "service_pack", "name": "15.4(2)S4", "product": { "name": "15.4(2)S4", "product_id": "CSAFPID-209097" } }, { "category": "service_pack", "name": "15.4(3)S0d", "product": { "name": "15.4(3)S0d", "product_id": "CSAFPID-209098" } }, { "category": "service_pack", "name": "15.4(3)S4", "product": { "name": "15.4(3)S4", "product_id": "CSAFPID-209099" } }, { "category": "service_pack", "name": "15.4(3)S0e", "product": { "name": "15.4(3)S0e", "product_id": "CSAFPID-209569" } }, { "category": "service_pack", "name": "15.4(3)S5", "product": { "name": "15.4(3)S5", "product_id": "CSAFPID-211297" } }, { "category": "service_pack", "name": "15.4(3)S0f", "product": { "name": "15.4(3)S0f", "product_id": "CSAFPID-212635" } }, { "category": "service_pack", "name": "15.4(3)S6", "product": { "name": "15.4(3)S6", "product_id": "CSAFPID-213794" } }, { "category": "service_pack", "name": "15.4(3)S7", "product": { "name": "15.4(3)S7", "product_id": "CSAFPID-220445" } }, { "category": "service_pack", "name": "15.4(3)S6a", "product": { "name": "15.4(3)S6a", "product_id": "CSAFPID-220675" } } ], "category": "product_version", "name": "15.4S" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)M", "product": { "name": "15.3(3)M", "product_id": "CSAFPID-187412" } }, { "category": "service_pack", "name": "15.3(3)M1", "product": { "name": "15.3(3)M1", "product_id": "CSAFPID-193284" } }, { "category": "service_pack", "name": "15.3(3)M2", "product": { "name": "15.3(3)M2", "product_id": "CSAFPID-193315" } }, { "category": "service_pack", "name": "15.3(3)M3", "product": { "name": "15.3(3)M3", "product_id": "CSAFPID-193321" } }, { "category": "service_pack", "name": "15.3(3)M5", "product": { "name": "15.3(3)M5", "product_id": "CSAFPID-193347" } }, { "category": "service_pack", "name": "15.3(3)M4", "product": { "name": "15.3(3)M4", "product_id": "CSAFPID-195024" } }, { "category": "service_pack", "name": "15.3(3)M6", "product": { "name": "15.3(3)M6", "product_id": "CSAFPID-198065" } }, { "category": "service_pack", "name": "15.3(3)M7", "product": { "name": "15.3(3)M7", "product_id": "CSAFPID-209091" } }, { "category": "service_pack", "name": "15.3(3)M8", "product": { "name": "15.3(3)M8", "product_id": "CSAFPID-209455" } }, { "category": "service_pack", "name": "15.3(3)M9", "product": { "name": "15.3(3)M9", "product_id": "CSAFPID-216344" } }, { "category": "service_pack", "name": "15.3(3)M8a", "product": { "name": "15.3(3)M8a", "product_id": "CSAFPID-220650" } } ], "category": "product_version", "name": "15.3M" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EZ", "product": { "name": "15.0(2)EZ", "product_id": "CSAFPID-190637" } } ], "category": "product_version", "name": "15.0EZ" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)SC3", "product": { "name": "15.2(2)SC3", "product_id": "CSAFPID-209060" } } ], "category": "product_version", "name": "15.2SC" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)EY", "product": { "name": "15.2(1)EY", "product_id": "CSAFPID-191928" } } ], "category": "product_version", "name": "15.2EY" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EJ", "product": { "name": "15.0(2)EJ", "product_id": "CSAFPID-191948" } }, { "category": "service_pack", "name": "15.0(2)EJ1", "product": { "name": "15.0(2)EJ1", "product_id": "CSAFPID-197471" } } ], "category": "product_version", "name": "15.0EJ" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)SY", "product": { "name": "15.2(1)SY", "product_id": "CSAFPID-192726" } }, { "category": "service_pack", "name": "15.2(1)SY1", "product": { "name": "15.2(1)SY1", "product_id": "CSAFPID-204828" } }, { "category": "service_pack", "name": "15.2(1)SY0a", "product": { "name": "15.2(1)SY0a", "product_id": "CSAFPID-209063" } }, { "category": "service_pack", "name": "15.2(1)SY2", "product": { "name": "15.2(1)SY2", "product_id": "CSAFPID-209064" } }, { "category": "service_pack", "name": "15.2(2)SY", "product": { "name": "15.2(2)SY", "product_id": "CSAFPID-209065" } }, { "category": "service_pack", "name": "15.2(1)SY1a", "product": { "name": "15.2(1)SY1a", "product_id": "CSAFPID-209439" } }, { "category": "service_pack", "name": "15.2(2)SY1", "product": { "name": "15.2(2)SY1", "product_id": "CSAFPID-211976" } }, { "category": "service_pack", "name": "15.2(2)SY2", "product": { "name": "15.2(2)SY2", "product_id": "CSAFPID-214053" } }, { "category": "service_pack", "name": "15.2(1)SY3", "product": { "name": "15.2(1)SY3", "product_id": "CSAFPID-216259" } }, { "category": "service_pack", "name": "15.2(1)SY4", "product": { "name": "15.2(1)SY4", "product_id": "CSAFPID-222651" } }, { "category": "service_pack", "name": "15.2(2)SY3", "product": { "name": "15.2(2)SY3", "product_id": "CSAFPID-227285" } } ], "category": "product_version", "name": "15.2SY" }, { "branches": [ { "category": "service_pack", "name": "15.4(3)M", "product": { "name": "15.4(3)M", "product_id": "CSAFPID-193350" } }, { "category": "service_pack", "name": "15.4(3)M1", "product": { "name": "15.4(3)M1", "product_id": "CSAFPID-201713" } }, { "category": "service_pack", "name": "15.4(3)M2", "product": { "name": "15.4(3)M2", "product_id": "CSAFPID-204104" } }, { "category": "service_pack", "name": "15.4(3)M3", "product": { "name": "15.4(3)M3", "product_id": "CSAFPID-205721" } }, { "category": "service_pack", "name": "15.4(3)M4", "product": { "name": "15.4(3)M4", "product_id": "CSAFPID-209094" } }, { "category": "service_pack", "name": "15.4(3)M5", "product": { "name": "15.4(3)M5", "product_id": "CSAFPID-211618" } }, { "category": "service_pack", "name": "15.4(3)M6", "product": { "name": "15.4(3)M6", "product_id": "CSAFPID-214166" } }, { "category": "service_pack", "name": "15.4(3)M7", "product": { "name": "15.4(3)M7", "product_id": "CSAFPID-220443" } }, { "category": "service_pack", "name": "15.4(3)M6a", "product": { "name": "15.4(3)M6a", "product_id": "CSAFPID-220674" } }, { "category": "service_pack", "name": "15.4(3)M7a", "product": { "name": "15.4(3)M7a", "product_id": "CSAFPID-225668" } } ], "category": "product_version", "name": "15.4M" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)JAZ1", "product": { "name": "15.2(4)JAZ1", "product_id": "CSAFPID-200503" } } ], "category": "product_version", "name": "15.2JAZ" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)XB12", "product": { "name": "15.3(3)XB12", "product_id": "CSAFPID-195876" } } ], "category": "product_version", "name": "15.3XB" }, { "branches": [ { "category": "service_pack", "name": "15.4(1)CG", "product": { "name": "15.4(1)CG", "product_id": "CSAFPID-195977" } }, { "category": "service_pack", "name": "15.4(1)CG1", "product": { "name": "15.4(1)CG1", "product_id": "CSAFPID-200495" } }, { "category": "service_pack", "name": "15.4(2)CG", "product": { "name": "15.4(2)CG", "product_id": "CSAFPID-200499" } } ], "category": "product_version", "name": "15.4CG" }, { "branches": [ { "category": "service_pack", "name": "15.5(1)S", "product": { "name": "15.5(1)S", "product_id": "CSAFPID-196322" } }, { "category": "service_pack", "name": "15.5(2)S", "product": { "name": "15.5(2)S", "product_id": "CSAFPID-200487" } }, { "category": "service_pack", "name": "15.5(1)S1", "product": { "name": "15.5(1)S1", "product_id": "CSAFPID-204830" } }, { "category": "service_pack", "name": "15.5(3)S", "product": { "name": "15.5(3)S", "product_id": "CSAFPID-204901" } }, { "category": "service_pack", "name": "15.5(1)S2", "product": { "name": "15.5(1)S2", "product_id": "CSAFPID-209102" } }, { "category": "service_pack", "name": "15.5(1)S3", "product": { "name": "15.5(1)S3", "product_id": "CSAFPID-209103" } }, { "category": "service_pack", "name": "15.5(2)S1", "product": { "name": "15.5(2)S1", "product_id": "CSAFPID-209104" } }, { "category": "service_pack", "name": "15.5(2)S2", "product": { "name": "15.5(2)S2", "product_id": "CSAFPID-209105" } }, { "category": "service_pack", "name": "15.5(3)S1", "product": { "name": "15.5(3)S1", "product_id": "CSAFPID-210129" } }, { "category": "service_pack", "name": "15.5(3)S1a", "product": { "name": "15.5(3)S1a", "product_id": "CSAFPID-211603" } }, { "category": "service_pack", "name": "15.5(2)S3", "product": { "name": "15.5(2)S3", "product_id": "CSAFPID-211751" } }, { "category": "service_pack", "name": "15.5(3)S2", "product": { "name": "15.5(3)S2", "product_id": "CSAFPID-212127" } }, { "category": "service_pack", "name": "15.5(3)S0a", "product": { "name": "15.5(3)S0a", "product_id": "CSAFPID-213000" } }, { "category": "service_pack", "name": "15.5(3)S3", "product": { "name": "15.5(3)S3", "product_id": "CSAFPID-213594" } }, { "category": "service_pack", "name": "15.5(1)S4", "product": { "name": "15.5(1)S4", "product_id": "CSAFPID-214479" } }, { "category": "service_pack", "name": "15.5(2)S4", "product": { "name": "15.5(2)S4", "product_id": "CSAFPID-216577" } }, { "category": "service_pack", "name": "15.5(3)S4", "product": { "name": "15.5(3)S4", "product_id": "CSAFPID-218997" } }, { "category": "service_pack", "name": "15.5(3)S5", "product": { "name": "15.5(3)S5", "product_id": "CSAFPID-223085" } } ], "category": "product_version", "name": "15.5S" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EB", "product": { "name": "15.2(2)EB", "product_id": "CSAFPID-197462" } }, { "category": "service_pack", "name": "15.2(2)EB1", "product": { "name": "15.2(2)EB1", "product_id": "CSAFPID-209839" } }, { "category": "service_pack", "name": "15.2(2)EB2", "product": { "name": "15.2(2)EB2", "product_id": "CSAFPID-214218" } } ], "category": "product_version", "name": "15.2EB" }, { "branches": [ { "category": "service_pack", "name": "15.5(1)T", "product": { "name": "15.5(1)T", "product_id": "CSAFPID-197477" } }, { "category": "service_pack", "name": "15.5(1)T1", "product": { "name": "15.5(1)T1", "product_id": "CSAFPID-204279" } }, { "category": "service_pack", "name": "15.5(2)T", "product": { "name": "15.5(2)T", "product_id": "CSAFPID-205517" } }, { "category": "service_pack", "name": "15.5(1)T2", "product": { "name": "15.5(1)T2", "product_id": "CSAFPID-209109" } }, { "category": "service_pack", "name": "15.5(1)T3", "product": { "name": "15.5(1)T3", "product_id": "CSAFPID-209110" } }, { "category": "service_pack", "name": "15.5(2)T1", "product": { "name": "15.5(2)T1", "product_id": "CSAFPID-209111" } }, { "category": "service_pack", "name": "15.5(2)T2", "product": { "name": "15.5(2)T2", "product_id": "CSAFPID-209112" } }, { "category": "service_pack", "name": "15.5(2)T3", "product": { "name": "15.5(2)T3", "product_id": "CSAFPID-211408" } }, { "category": "service_pack", "name": "15.5(2)T4", "product": { "name": "15.5(2)T4", "product_id": "CSAFPID-213795" } }, { "category": "service_pack", "name": "15.5(1)T4", "product": { "name": "15.5(1)T4", "product_id": "CSAFPID-214480" } } ], "category": "product_version", "name": "15.5T" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EA", "product": { "name": "15.2(2)EA", "product_id": "CSAFPID-198063" } }, { "category": "service_pack", "name": "15.2(2)EA1", "product": { "name": "15.2(2)EA1", "product_id": "CSAFPID-209049" } }, { "category": "service_pack", "name": "15.2(2)EA2", "product": { "name": "15.2(2)EA2", "product_id": "CSAFPID-209050" } }, { "category": "service_pack", "name": "15.2(3)EA", "product": { "name": "15.2(3)EA", "product_id": "CSAFPID-209051" } }, { "category": "service_pack", "name": "15.2(4)EA", "product": { "name": "15.2(4)EA", "product_id": "CSAFPID-210203" } }, { "category": "service_pack", "name": "15.2(4)EA1", "product": { "name": "15.2(4)EA1", "product_id": "CSAFPID-210958" } }, { "category": "service_pack", "name": "15.2(2)EA3", "product": { "name": "15.2(2)EA3", "product_id": "CSAFPID-214217" } }, { "category": "service_pack", "name": "15.2(4)EA3", "product": { "name": "15.2(4)EA3", "product_id": "CSAFPID-214965" } }, { "category": "service_pack", "name": "15.2(5)EA", "product": { "name": "15.2(5)EA", "product_id": "CSAFPID-220038" } }, { "category": "service_pack", "name": "15.2(4)EA4", "product": { "name": "15.2(4)EA4", "product_id": "CSAFPID-220460" } }, { "category": "service_pack", "name": "15.2(4)EA2", "product": { "name": "15.2(4)EA2", "product_id": "CSAFPID-220507" } }, { "category": "service_pack", "name": "15.2(4)EA5", "product": { "name": "15.2(4)EA5", "product_id": "CSAFPID-222419" } } ], "category": "product_version", "name": "15.2EA" }, { "branches": [ { "category": "service_pack", "name": "15.4(2)SN", "product": { "name": "15.4(2)SN", "product_id": "CSAFPID-198309" } }, { "category": "service_pack", "name": "15.4(2)SN1", "product": { "name": "15.4(2)SN1", "product_id": "CSAFPID-198528" } }, { "category": "service_pack", "name": "15.4(3)SN1", "product": { "name": "15.4(3)SN1", "product_id": "CSAFPID-204107" } }, { "category": "service_pack", "name": "15.4(3)SN1a", "product": { "name": "15.4(3)SN1a", "product_id": "CSAFPID-209929" } } ], "category": "product_version", "name": "15.4SN" }, { "branches": [ { "category": "service_pack", "name": "15.5(3)M", "product": { "name": "15.5(3)M", "product_id": "CSAFPID-200509" } }, { "category": "service_pack", "name": "15.5(3)M1", "product": { "name": "15.5(3)M1", "product_id": "CSAFPID-209360" } }, { "category": "service_pack", "name": "15.5(3)M0a", "product": { "name": "15.5(3)M0a", "product_id": "CSAFPID-209936" } }, { "category": "service_pack", "name": "15.5(3)M2", "product": { "name": "15.5(3)M2", "product_id": "CSAFPID-211825" } }, { "category": "service_pack", "name": "15.5(3)M2a", "product": { "name": "15.5(3)M2a", "product_id": "CSAFPID-213633" } }, { "category": "service_pack", "name": "15.5(3)M3", "product": { "name": "15.5(3)M3", "product_id": "CSAFPID-213789" } }, { "category": "service_pack", "name": "15.5(3)M4", "product": { "name": "15.5(3)M4", "product_id": "CSAFPID-218996" } }, { "category": "service_pack", "name": "15.5(3)M4a", "product": { "name": "15.5(3)M4a", "product_id": "CSAFPID-221093" } }, { "category": "service_pack", "name": "15.5(3)M5", "product": { "name": "15.5(3)M5", "product_id": "CSAFPID-222988" } }, { "category": "service_pack", "name": "15.5(3)M4b", "product": { "name": "15.5(3)M4b", "product_id": "CSAFPID-222989" } }, { "category": "service_pack", "name": "15.5(3)M4c", "product": { "name": "15.5(3)M4c", "product_id": "CSAFPID-223189" } } ], "category": "product_version", "name": "15.5M" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JAA1", "product": { "name": "15.3(3)JAA1", "product_id": "CSAFPID-230594" } } ], "category": "product_version", "name": "15.3JAA" }, { "branches": [ { "category": "service_pack", "name": "15.5(1)SN", "product": { "name": "15.5(1)SN", "product_id": "CSAFPID-204281" } }, { "category": "service_pack", "name": "15.5(1)SN1", "product": { "name": "15.5(1)SN1", "product_id": "CSAFPID-209106" } }, { "category": "service_pack", "name": "15.5(2)SN", "product": { "name": "15.5(2)SN", "product_id": "CSAFPID-209107" } }, { "category": "service_pack", "name": "15.5(3)SN0a", "product": { "name": "15.5(3)SN0a", "product_id": "CSAFPID-209632" } }, { "category": "service_pack", "name": "15.5(3)SN", "product": { "name": "15.5(3)SN", "product_id": "CSAFPID-213001" } } ], "category": "product_version", "name": "15.5SN" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SQD7", "product": { "name": "15.0(2)SQD7", "product_id": "CSAFPID-227364" } } ], "category": "product_version", "name": "15.0SQD" }, { "branches": [ { "category": "service_pack", "name": "15.6(1)S", "product": { "name": "15.6(1)S", "product_id": "CSAFPID-204822" } }, { "category": "service_pack", "name": "15.6(2)S", "product": { "name": "15.6(2)S", "product_id": "CSAFPID-209113" } }, { "category": "service_pack", "name": "15.6(2)S1", "product": { "name": "15.6(2)S1", "product_id": "CSAFPID-211984" } }, { "category": "service_pack", "name": "15.6(1)S1", "product": { "name": "15.6(1)S1", "product_id": "CSAFPID-212407" } }, { "category": "service_pack", "name": "15.6(1)S2", "product": { "name": "15.6(1)S2", "product_id": "CSAFPID-214161" } }, { "category": "service_pack", "name": "15.6(2)S2", "product": { "name": "15.6(2)S2", "product_id": "CSAFPID-216961" } }, { "category": "service_pack", "name": "15.6(1)S3", "product": { "name": "15.6(1)S3", "product_id": "CSAFPID-222931" } }, { "category": "service_pack", "name": "15.6(2)S3", "product": { "name": "15.6(2)S3", "product_id": "CSAFPID-226076" } } ], "category": "product_version", "name": "15.6S" }, { "branches": [ { "category": "service_pack", "name": "15.6(1)T", "product": { "name": "15.6(1)T", "product_id": "CSAFPID-205516" } }, { "category": "service_pack", "name": "15.6(2)T", "product": { "name": "15.6(2)T", "product_id": "CSAFPID-209115" } }, { "category": "service_pack", "name": "15.6(1)T0a", "product": { "name": "15.6(1)T0a", "product_id": "CSAFPID-212118" } }, { "category": "service_pack", "name": "15.6(1)T1", "product": { "name": "15.6(1)T1", "product_id": "CSAFPID-212445" } }, { "category": "service_pack", "name": "15.6(2)T1", "product": { "name": "15.6(2)T1", "product_id": "CSAFPID-214938" } }, { "category": "service_pack", "name": "15.6(1)T2", "product": { "name": "15.6(1)T2", "product_id": "CSAFPID-216215" } }, { "category": "service_pack", "name": "15.6(2)T0a", "product": { "name": "15.6(2)T0a", "product_id": "CSAFPID-216239" } }, { "category": "service_pack", "name": "15.6(2)T2", "product": { "name": "15.6(2)T2", "product_id": "CSAFPID-216962" } }, { "category": "service_pack", "name": "15.6(1)T3", "product": { "name": "15.6(1)T3", "product_id": "CSAFPID-227613" } } ], "category": "product_version", "name": "15.6T" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JBB6a", "product": { "name": "15.3(3)JBB6a", "product_id": "CSAFPID-213770" } } ], "category": "product_version", "name": "15.3JBB" }, { "branches": [ { "category": "service_pack", "name": "15.3(1)SY", "product": { "name": "15.3(1)SY", "product_id": "CSAFPID-209532" } }, { "category": "service_pack", "name": "15.3(0)SY", "product": { "name": "15.3(0)SY", "product_id": "CSAFPID-212701" } }, { "category": "service_pack", "name": "15.3(1)SY1", "product": { "name": "15.3(1)SY1", "product_id": "CSAFPID-216258" } }, { "category": "service_pack", "name": "15.3(1)SY2", "product": { "name": "15.3(1)SY2", "product_id": "CSAFPID-220444" } } ], "category": "product_version", "name": "15.3SY" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNC4", "product": { "name": "15.3(3)JNC4", "product_id": "CSAFPID-225662" } } ], "category": "product_version", "name": "15.3JNC" }, { "branches": [ { "category": "service_pack", "name": "15.5(2)XB", "product": { "name": "15.5(2)XB", "product_id": "CSAFPID-213002" } } ], "category": "product_version", "name": "15.5XB" }, { "branches": [ { "category": "service_pack", "name": "15.6(2)SP", "product": { "name": "15.6(2)SP", "product_id": "CSAFPID-212321" } }, { "category": "service_pack", "name": "15.6(2)SP1", "product": { "name": "15.6(2)SP1", "product_id": "CSAFPID-220521" } }, { "category": "service_pack", "name": "15.6(2)SP2", "product": { "name": "15.6(2)SP2", "product_id": "CSAFPID-224566" } } ], "category": "product_version", "name": "15.6SP" }, { "branches": [ { "category": "service_pack", "name": "15.6(1)SN", "product": { "name": "15.6(1)SN", "product_id": "CSAFPID-213034" } }, { "category": "service_pack", "name": "15.6(1)SN1", "product": { "name": "15.6(1)SN1", "product_id": "CSAFPID-213086" } }, { "category": "service_pack", "name": "15.6(2)SN", "product": { "name": "15.6(2)SN", "product_id": "CSAFPID-216419" } }, { "category": "service_pack", "name": "15.6(1)SN2", "product": { "name": "15.6(1)SN2", "product_id": "CSAFPID-230612" } }, { "category": "service_pack", "name": "15.6(1)SN3", "product": { "name": "15.6(1)SN3", "product_id": "CSAFPID-230613" } }, { "category": "service_pack", "name": "15.6(3)SN", "product": { "name": "15.6(3)SN", "product_id": "CSAFPID-230614" } }, { "category": "service_pack", "name": "15.6(4)SN", "product": { "name": "15.6(4)SN", "product_id": "CSAFPID-230616" } }, { "category": "service_pack", "name": "15.6(5)SN", "product": { "name": "15.6(5)SN", "product_id": "CSAFPID-232093" } }, { "category": "service_pack", "name": "15.6(6)SN", "product": { "name": "15.6(6)SN", "product_id": "CSAFPID-236297" } }, { "category": "service_pack", "name": "15.6(7)SN", "product": { "name": "15.6(7)SN", "product_id": "CSAFPID-254081" } }, { "category": "service_pack", "name": "15.6(7)SN1", "product": { "name": "15.6(7)SN1", "product_id": "CSAFPID-262382" } }, { "category": "service_pack", "name": "15.6(7)SN2", "product": { "name": "15.6(7)SN2", "product_id": "CSAFPID-275327" } }, { "category": "service_pack", "name": "15.6(7)SN3", "product": { "name": "15.6(7)SN3", "product_id": "CSAFPID-278136" } } ], "category": "product_version", "name": "15.6SN" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPB", "product": { "name": "15.3(3)JPB", "product_id": "CSAFPID-213843" } } ], "category": "product_version", "name": "15.3JPB" }, { "branches": [ { "category": "service_pack", "name": "15.6(3)M", "product": { "name": "15.6(3)M", "product_id": "CSAFPID-214074" } }, { "category": "service_pack", "name": "15.6(3)M1", "product": { "name": "15.6(3)M1", "product_id": "CSAFPID-220396" } }, { "category": "service_pack", "name": "15.6(3)M0a", "product": { "name": "15.6(3)M0a", "product_id": "CSAFPID-220522" } }, { "category": "service_pack", "name": "15.6(3)M1a", "product": { "name": "15.6(3)M1a", "product_id": "CSAFPID-224327" } }, { "category": "service_pack", "name": "15.6(3)M1b", "product": { "name": "15.6(3)M1b", "product_id": "CSAFPID-224443" } }, { "category": "service_pack", "name": "15.6(3)M2", "product": { "name": "15.6(3)M2", "product_id": "CSAFPID-225667" } }, { "category": "service_pack", "name": "15.6(3)M2a", "product": { "name": "15.6(3)M2a", "product_id": "CSAFPID-227172" } } ], "category": "product_version", "name": "15.6M" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)EC1", "product": { "name": "15.2(4)EC1", "product_id": "CSAFPID-220461" } }, { "category": "service_pack", "name": "15.2(4)EC2", "product": { "name": "15.2(4)EC2", "product_id": "CSAFPID-223086" } } ], "category": "product_version", "name": "15.2EC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPC3", "product": { "name": "15.3(3)JPC3", "product_id": "CSAFPID-225167" } } ], "category": "product_version", "name": "15.3JPC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JND2", "product": { "name": "15.3(3)JND2", "product_id": "CSAFPID-226202" } } ], "category": "product_version", "name": "15.3JND" }, { "branches": [ { "category": "service_pack", "name": "15.4(1)SY", "product": { "name": "15.4(1)SY", "product_id": "CSAFPID-217807" } }, { "category": "service_pack", "name": "15.4(1)SY1", "product": { "name": "15.4(1)SY1", "product_id": "CSAFPID-220594" } }, { "category": "service_pack", "name": "15.4(1)SY2", "product": { "name": "15.4(1)SY2", "product_id": "CSAFPID-224611" } } ], "category": "product_version", "name": "15.4SY" }, { "branches": [ { "category": "service_pack", "name": "15.5(1)SY", "product": { "name": "15.5(1)SY", "product_id": "CSAFPID-225786" } } ], "category": "product_version", "name": "15.5SY" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JCA7", "product": { "name": "15.3(3)JCA7", "product_id": "CSAFPID-227250" } } ], "category": "product_version", "name": "15.3JCA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPI", "product": { "name": "15.3(3)JPI", "product_id": "CSAFPID-274202" } } ], "category": "product_version", "name": "15.3JPI" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPJ", "product": { "name": "15.3(3)JPJ", "product_id": "CSAFPID-275845" } } ], "category": "product_version", "name": "15.3JPJ" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPR1", "product": { "name": "15.3(3)JPR1", "product_id": "CSAFPID-300950" } } ], "category": "product_version", "name": "15.3JPR" } ], "category": "product_family", "name": "IOS" }, { "branches": [ { "branches": [ { "category": "service_pack", "name": "3.7.0S", "product": { "name": "3.7.0S", "product_id": "CSAFPID-184480" } }, { "category": "service_pack", "name": "3.7.1S", "product": { "name": "3.7.1S", "product_id": "CSAFPID-184481" } }, { "category": "service_pack", "name": "3.7.2S", "product": { "name": "3.7.2S", "product_id": "CSAFPID-194730" } }, { "category": "service_pack", "name": "3.7.3S", "product": { "name": "3.7.3S", "product_id": "CSAFPID-194731" } }, { "category": "service_pack", "name": "3.7.4S", "product": { "name": "3.7.4S", "product_id": "CSAFPID-194732" } }, { "category": "service_pack", "name": "3.7.5S", "product": { "name": "3.7.5S", "product_id": "CSAFPID-202541" } }, { "category": "service_pack", "name": "3.7.6S", "product": { "name": "3.7.6S", "product_id": "CSAFPID-202542" } }, { "category": "service_pack", "name": "3.7.7S", "product": { "name": "3.7.7S", "product_id": "CSAFPID-206188" } }, { "category": "service_pack", "name": "3.7.8S", "product": { "name": "3.7.8S", "product_id": "CSAFPID-213580" } }, { "category": "service_pack", "name": "3.7.4aS", "product": { "name": "3.7.4aS", "product_id": "CSAFPID-213798" } }, { "category": "service_pack", "name": "3.7.2tS", "product": { "name": "3.7.2tS", "product_id": "CSAFPID-213799" } }, { "category": "service_pack", "name": "3.7.0bS", "product": { "name": "3.7.0bS", "product_id": "CSAFPID-213955" } }, { "category": "service_pack", "name": "3.7.1aS", "product": { "name": "3.7.1aS", "product_id": "CSAFPID-213957" } } ], "category": "product_version", "name": "3.7S" }, { "branches": [ { "category": "service_pack", "name": "3.8.0S", "product": { "name": "3.8.0S", "product_id": "CSAFPID-194735" } }, { "category": "service_pack", "name": "3.8.1S", "product": { "name": "3.8.1S", "product_id": "CSAFPID-194736" } }, { "category": "service_pack", "name": "3.8.2S", "product": { "name": "3.8.2S", "product_id": "CSAFPID-194737" } } ], "category": "product_version", "name": "3.8S" }, { "branches": [ { "category": "service_pack", "name": "3.9.1S", "product": { "name": "3.9.1S", "product_id": "CSAFPID-194842" } }, { "category": "service_pack", "name": "3.9.0S", "product": { "name": "3.9.0S", "product_id": "CSAFPID-194843" } }, { "category": "service_pack", "name": "3.9.2S", "product": { "name": "3.9.2S", "product_id": "CSAFPID-202558" } }, { "category": "service_pack", "name": "3.9.0xaS", "product": { "name": "3.9.0xaS", "product_id": "CSAFPID-213815" } }, { "category": "service_pack", "name": "3.9.1aS", "product": { "name": "3.9.1aS", "product_id": "CSAFPID-213816" } }, { "category": "service_pack", "name": "3.9.0aS", "product": { "name": "3.9.0aS", "product_id": "CSAFPID-213825" } } ], "category": "product_version", "name": "3.9S" }, { "branches": [ { "category": "service_pack", "name": "3.5.0E", "product": { "name": "3.5.0E", "product_id": "CSAFPID-197145" } }, { "category": "service_pack", "name": "3.5.1E", "product": { "name": "3.5.1E", "product_id": "CSAFPID-206168" } }, { "category": "service_pack", "name": "3.5.2E", "product": { "name": "3.5.2E", "product_id": "CSAFPID-206169" } }, { "category": "service_pack", "name": "3.5.3E", "product": { "name": "3.5.3E", "product_id": "CSAFPID-206170" } } ], "category": "product_version", "name": "3.5E" }, { "branches": [ { "category": "service_pack", "name": "3.10.0S", "product": { "name": "3.10.0S", "product_id": "CSAFPID-198123" } }, { "category": "service_pack", "name": "3.10.1S", "product": { "name": "3.10.1S", "product_id": "CSAFPID-198124" } }, { "category": "service_pack", "name": "3.10.2S", "product": { "name": "3.10.2S", "product_id": "CSAFPID-198125" } }, { "category": "service_pack", "name": "3.10.3S", "product": { "name": "3.10.3S", "product_id": "CSAFPID-202539" } }, { "category": "service_pack", "name": "3.10.4S", "product": { "name": "3.10.4S", "product_id": "CSAFPID-202540" } }, { "category": "service_pack", "name": "3.10.5S", "product": { "name": "3.10.5S", "product_id": "CSAFPID-206159" } }, { "category": "service_pack", "name": "3.10.6S", "product": { "name": "3.10.6S", "product_id": "CSAFPID-206189" } }, { "category": "service_pack", "name": "3.10.1xcS", "product": { "name": "3.10.1xcS", "product_id": "CSAFPID-213469" } }, { "category": "service_pack", "name": "3.10.2aS", "product": { "name": "3.10.2aS", "product_id": "CSAFPID-213470" } }, { "category": "service_pack", "name": "3.10.2tS", "product": { "name": "3.10.2tS", "product_id": "CSAFPID-213471" } }, { "category": "service_pack", "name": "3.10.7S", "product": { "name": "3.10.7S", "product_id": "CSAFPID-213472" } }, { "category": "service_pack", "name": "3.10.1xbS", "product": { "name": "3.10.1xbS", "product_id": "CSAFPID-213642" } }, { "category": "service_pack", "name": "3.10.8S", "product": { "name": "3.10.8S", "product_id": "CSAFPID-217260" } }, { "category": "service_pack", "name": "3.10.8aS", "product": { "name": "3.10.8aS", "product_id": "CSAFPID-220687" } }, { "category": "service_pack", "name": "3.10.9S", "product": { "name": "3.10.9S", "product_id": "CSAFPID-225337" } } ], "category": "product_version", "name": "3.10S" }, { "branches": [ { "category": "service_pack", "name": "3.11.1S", "product": { "name": "3.11.1S", "product_id": "CSAFPID-200768" } }, { "category": "service_pack", "name": "3.11.2S", "product": { "name": "3.11.2S", "product_id": "CSAFPID-200771" } }, { "category": "service_pack", "name": "3.11.0S", "product": { "name": "3.11.0S", "product_id": "CSAFPID-203353" } }, { "category": "service_pack", "name": "3.11.3S", "product": { "name": "3.11.3S", "product_id": "CSAFPID-206160" } }, { "category": "service_pack", "name": "3.11.4S", "product": { "name": "3.11.4S", "product_id": "CSAFPID-206190" } } ], "category": "product_version", "name": "3.11S" }, { "branches": [ { "category": "service_pack", "name": "3.12.0S", "product": { "name": "3.12.0S", "product_id": "CSAFPID-200770" } }, { "category": "service_pack", "name": "3.12.1S", "product": { "name": "3.12.1S", "product_id": "CSAFPID-206161" } }, { "category": "service_pack", "name": "3.12.2S", "product": { "name": "3.12.2S", "product_id": "CSAFPID-206162" } }, { "category": "service_pack", "name": "3.12.3S", "product": { "name": "3.12.3S", "product_id": "CSAFPID-206176" } }, { "category": "service_pack", "name": "3.12.0aS", "product": { "name": "3.12.0aS", "product_id": "CSAFPID-213473" } }, { "category": "service_pack", "name": "3.12.4S", "product": { "name": "3.12.4S", "product_id": "CSAFPID-213474" } } ], "category": "product_version", "name": "3.12S" }, { "branches": [ { "category": "service_pack", "name": "3.13.0S", "product": { "name": "3.13.0S", "product_id": "CSAFPID-201495" } }, { "category": "service_pack", "name": "3.13.1S", "product": { "name": "3.13.1S", "product_id": "CSAFPID-206174" } }, { "category": "service_pack", "name": "3.13.2S", "product": { "name": "3.13.2S", "product_id": "CSAFPID-206175" } }, { "category": "service_pack", "name": "3.13.3S", "product": { "name": "3.13.3S", "product_id": "CSAFPID-210078" } }, { "category": "service_pack", "name": "3.13.4S", "product": { "name": "3.13.4S", "product_id": "CSAFPID-213475" } }, { "category": "service_pack", "name": "3.13.5S", "product": { "name": "3.13.5S", "product_id": "CSAFPID-213557" } }, { "category": "service_pack", "name": "3.13.2aS", "product": { "name": "3.13.2aS", "product_id": "CSAFPID-213661" } }, { "category": "service_pack", "name": "3.13.0aS", "product": { "name": "3.13.0aS", "product_id": "CSAFPID-213781" } }, { "category": "service_pack", "name": "3.13.5aS", "product": { "name": "3.13.5aS", "product_id": "CSAFPID-217261" } }, { "category": "service_pack", "name": "3.13.6S", "product": { "name": "3.13.6S", "product_id": "CSAFPID-217262" } }, { "category": "service_pack", "name": "3.13.7S", "product": { "name": "3.13.7S", "product_id": "CSAFPID-217263" } }, { "category": "service_pack", "name": "3.13.6aS", "product": { "name": "3.13.6aS", "product_id": "CSAFPID-220688" } }, { "category": "service_pack", "name": "3.13.6bS", "product": { "name": "3.13.6bS", "product_id": "CSAFPID-225568" } }, { "category": "service_pack", "name": "3.13.7aS", "product": { "name": "3.13.7aS", "product_id": "CSAFPID-225569" } } ], "category": "product_version", "name": "3.13S" }, { "branches": [ { "category": "service_pack", "name": "3.6.0E", "product": { "name": "3.6.0E", "product_id": "CSAFPID-206172" } }, { "category": "service_pack", "name": "3.6.1E", "product": { "name": "3.6.1E", "product_id": "CSAFPID-206173" } }, { "category": "service_pack", "name": "3.6.0aE", "product": { "name": "3.6.0aE", "product_id": "CSAFPID-210073" } }, { "category": "service_pack", "name": "3.6.0bE", "product": { "name": "3.6.0bE", "product_id": "CSAFPID-210074" } }, { "category": "service_pack", "name": "3.6.2aE", "product": { "name": "3.6.2aE", "product_id": "CSAFPID-210075" } }, { "category": "service_pack", "name": "3.6.2E", "product": { "name": "3.6.2E", "product_id": "CSAFPID-210264" } }, { "category": "service_pack", "name": "3.6.3E", "product": { "name": "3.6.3E", "product_id": "CSAFPID-212674" } }, { "category": "service_pack", "name": "3.6.4E", "product": { "name": "3.6.4E", "product_id": "CSAFPID-213790" } }, { "category": "service_pack", "name": "3.6.5E", "product": { "name": "3.6.5E", "product_id": "CSAFPID-217279" } }, { "category": "service_pack", "name": "3.6.6E", "product": { "name": "3.6.6E", "product_id": "CSAFPID-220357" } }, { "category": "service_pack", "name": "3.6.5aE", "product": { "name": "3.6.5aE", "product_id": "CSAFPID-221108" } }, { "category": "service_pack", "name": "3.6.5bE", "product": { "name": "3.6.5bE", "product_id": "CSAFPID-222435" } } ], "category": "product_version", "name": "3.6E" }, { "branches": [ { "category": "service_pack", "name": "3.14.0S", "product": { "name": "3.14.0S", "product_id": "CSAFPID-206178" } }, { "category": "service_pack", "name": "3.14.1S", "product": { "name": "3.14.1S", "product_id": "CSAFPID-206181" } }, { "category": "service_pack", "name": "3.14.2S", "product": { "name": "3.14.2S", "product_id": "CSAFPID-206191" } }, { "category": "service_pack", "name": "3.14.3S", "product": { "name": "3.14.3S", "product_id": "CSAFPID-206192" } }, { "category": "service_pack", "name": "3.14.4S", "product": { "name": "3.14.4S", "product_id": "CSAFPID-206193" } } ], "category": "product_version", "name": "3.14S" }, { "branches": [ { "category": "service_pack", "name": "3.15.0S", "product": { "name": "3.15.0S", "product_id": "CSAFPID-206180" } }, { "category": "service_pack", "name": "3.15.1S", "product": { "name": "3.15.1S", "product_id": "CSAFPID-210079" } }, { "category": "service_pack", "name": "3.15.2S", "product": { "name": "3.15.2S", "product_id": "CSAFPID-212268" } }, { "category": "service_pack", "name": "3.15.1cS", "product": { "name": "3.15.1cS", "product_id": "CSAFPID-213700" } }, { "category": "service_pack", "name": "3.15.3S", "product": { "name": "3.15.3S", "product_id": "CSAFPID-213776" } }, { "category": "service_pack", "name": "3.15.4S", "product": { "name": "3.15.4S", "product_id": "CSAFPID-217264" } } ], "category": "product_version", "name": "3.15S" }, { "branches": [ { "category": "service_pack", "name": "3.7.0E", "product": { "name": "3.7.0E", "product_id": "CSAFPID-206211" } }, { "category": "service_pack", "name": "3.7.1E", "product": { "name": "3.7.1E", "product_id": "CSAFPID-210076" } }, { "category": "service_pack", "name": "3.7.2E", "product": { "name": "3.7.2E", "product_id": "CSAFPID-210077" } }, { "category": "service_pack", "name": "3.7.3E", "product": { "name": "3.7.3E", "product_id": "CSAFPID-213797" } }, { "category": "service_pack", "name": "3.7.4E", "product": { "name": "3.7.4E", "product_id": "CSAFPID-217280" } }, { "category": "service_pack", "name": "3.7.5E", "product": { "name": "3.7.5E", "product_id": "CSAFPID-220290" } } ], "category": "product_version", "name": "3.7E" }, { "branches": [ { "category": "service_pack", "name": "3.16.0S", "product": { "name": "3.16.0S", "product_id": "CSAFPID-210081" } }, { "category": "service_pack", "name": "3.16.1S", "product": { "name": "3.16.1S", "product_id": "CSAFPID-212408" } }, { "category": "service_pack", "name": "3.16.0aS", "product": { "name": "3.16.0aS", "product_id": "CSAFPID-213476" } }, { "category": "service_pack", "name": "3.16.1aS", "product": { "name": "3.16.1aS", "product_id": "CSAFPID-213477" } }, { "category": "service_pack", "name": "3.16.2S", "product": { "name": "3.16.2S", "product_id": "CSAFPID-213478" } }, { "category": "service_pack", "name": "3.16.2aS", "product": { "name": "3.16.2aS", "product_id": "CSAFPID-213635" } }, { "category": "service_pack", "name": "3.16.0bS", "product": { "name": "3.16.0bS", "product_id": "CSAFPID-213777" } }, { "category": "service_pack", "name": "3.16.0cS", "product": { "name": "3.16.0cS", "product_id": "CSAFPID-213778" } }, { "category": "service_pack", "name": "3.16.3S", "product": { "name": "3.16.3S", "product_id": "CSAFPID-213779" } }, { "category": "service_pack", "name": "3.16.2bS", "product": { "name": "3.16.2bS", "product_id": "CSAFPID-217265" } }, { "category": "service_pack", "name": "3.16.3aS", "product": { "name": "3.16.3aS", "product_id": "CSAFPID-217266" } }, { "category": "service_pack", "name": "3.16.4S", "product": { "name": "3.16.4S", "product_id": "CSAFPID-217267" } }, { "category": "service_pack", "name": "3.16.4aS", "product": { "name": "3.16.4aS", "product_id": "CSAFPID-220993" } }, { "category": "service_pack", "name": "3.16.4bS", "product": { "name": "3.16.4bS", "product_id": "CSAFPID-222257" } }, { "category": "service_pack", "name": "3.16.4gS", "product": { "name": "3.16.4gS", "product_id": "CSAFPID-222693" } }, { "category": "service_pack", "name": "3.16.5S", "product": { "name": "3.16.5S", "product_id": "CSAFPID-222694" } }, { "category": "service_pack", "name": "3.16.4cS", "product": { "name": "3.16.4cS", "product_id": "CSAFPID-222925" } }, { "category": "service_pack", "name": "3.16.4dS", "product": { "name": "3.16.4dS", "product_id": "CSAFPID-223252" } }, { "category": "service_pack", "name": "3.16.4eS", "product": { "name": "3.16.4eS", "product_id": "CSAFPID-224702" } } ], "category": "product_version", "name": "3.16S" }, { "branches": [ { "category": "service_pack", "name": "3.17.0S", "product": { "name": "3.17.0S", "product_id": "CSAFPID-212411" } }, { "category": "service_pack", "name": "3.17.1S", "product": { "name": "3.17.1S", "product_id": "CSAFPID-212412" } }, { "category": "service_pack", "name": "3.17.2S", "product": { "name": "3.17.2S", "product_id": "CSAFPID-217234" } }, { "category": "service_pack", "name": "3.17.1aS", "product": { "name": "3.17.1aS", "product_id": "CSAFPID-217268" } }, { "category": "service_pack", "name": "3.17.3S", "product": { "name": "3.17.3S", "product_id": "CSAFPID-222942" } } ], "category": "product_version", "name": "3.17S" }, { "branches": [ { "category": "service_pack", "name": "16.1.1", "product": { "name": "16.1.1", "product_id": "CSAFPID-212436" } }, { "category": "service_pack", "name": "16.1.2", "product": { "name": "16.1.2", "product_id": "CSAFPID-213100" } }, { "category": "service_pack", "name": "16.1.3", "product": { "name": "16.1.3", "product_id": "CSAFPID-214993" } } ], "category": "product_version", "name": "16.1" }, { "branches": [ { "category": "service_pack", "name": "16.2.1", "product": { "name": "16.2.1", "product_id": "CSAFPID-213809" } }, { "category": "service_pack", "name": "16.2.2", "product": { "name": "16.2.2", "product_id": "CSAFPID-217253" } } ], "category": "product_version", "name": "16.2" }, { "branches": [ { "category": "service_pack", "name": "3.8.0E", "product": { "name": "3.8.0E", "product_id": "CSAFPID-213811" } }, { "category": "service_pack", "name": "3.8.1E", "product": { "name": "3.8.1E", "product_id": "CSAFPID-213812" } }, { "category": "service_pack", "name": "3.8.2E", "product": { "name": "3.8.2E", "product_id": "CSAFPID-217283" } }, { "category": "service_pack", "name": "3.8.3E", "product": { "name": "3.8.3E", "product_id": "CSAFPID-220489" } }, { "category": "service_pack", "name": "3.8.4E", "product": { "name": "3.8.4E", "product_id": "CSAFPID-222695" } } ], "category": "product_version", "name": "3.8E" }, { "branches": [ { "category": "service_pack", "name": "16.3.1", "product": { "name": "16.3.1", "product_id": "CSAFPID-213960" } }, { "category": "service_pack", "name": "16.3.2", "product": { "name": "16.3.2", "product_id": "CSAFPID-217255" } }, { "category": "service_pack", "name": "16.3.3", "product": { "name": "16.3.3", "product_id": "CSAFPID-217256" } }, { "category": "service_pack", "name": "16.3.1a", "product": { "name": "16.3.1a", "product_id": "CSAFPID-220802" } }, { "category": "service_pack", "name": "16.3.4", "product": { "name": "16.3.4", "product_id": "CSAFPID-222711" } } ], "category": "product_version", "name": "16.3" }, { "branches": [ { "category": "service_pack", "name": "16.4.1", "product": { "name": "16.4.1", "product_id": "CSAFPID-214051" } }, { "category": "service_pack", "name": "16.4.2", "product": { "name": "16.4.2", "product_id": "CSAFPID-217257" } } ], "category": "product_version", "name": "16.4" }, { "branches": [ { "category": "service_pack", "name": "16.5.1", "product": { "name": "16.5.1", "product_id": "CSAFPID-217259" } }, { "category": "service_pack", "name": "16.5.1a", "product": { "name": "16.5.1a", "product_id": "CSAFPID-225784" } }, { "category": "service_pack", "name": "16.5.1b", "product": { "name": "16.5.1b", "product_id": "CSAFPID-226330" } } ], "category": "product_version", "name": "16.5" }, { "branches": [ { "category": "service_pack", "name": "3.18.0aS", "product": { "name": "3.18.0aS", "product_id": "CSAFPID-217270" } }, { "category": "service_pack", "name": "3.18.0S", "product": { "name": "3.18.0S", "product_id": "CSAFPID-217271" } }, { "category": "service_pack", "name": "3.18.1S", "product": { "name": "3.18.1S", "product_id": "CSAFPID-217272" } }, { "category": "service_pack", "name": "3.18.2S", "product": { "name": "3.18.2S", "product_id": "CSAFPID-217273" } }, { "category": "service_pack", "name": "3.18.3S", "product": { "name": "3.18.3S", "product_id": "CSAFPID-226078" } } ], "category": "product_version", "name": "3.18S" }, { "branches": [ { "category": "service_pack", "name": "3.18.0SP", "product": { "name": "3.18.0SP", "product_id": "CSAFPID-217276" } }, { "category": "service_pack", "name": "3.18.1SP", "product": { "name": "3.18.1SP", "product_id": "CSAFPID-220517" } }, { "category": "service_pack", "name": "3.18.1aSP", "product": { "name": "3.18.1aSP", "product_id": "CSAFPID-223018" } }, { "category": "service_pack", "name": "3.18.1gSP", "product": { "name": "3.18.1gSP", "product_id": "CSAFPID-223019" } }, { "category": "service_pack", "name": "3.18.1bSP", "product": { "name": "3.18.1bSP", "product_id": "CSAFPID-223241" } }, { "category": "service_pack", "name": "3.18.1cSP", "product": { "name": "3.18.1cSP", "product_id": "CSAFPID-224424" } }, { "category": "service_pack", "name": "3.18.2SP", "product": { "name": "3.18.2SP", "product_id": "CSAFPID-225168" } }, { "category": "service_pack", "name": "3.18.1hSP", "product": { "name": "3.18.1hSP", "product_id": "CSAFPID-225359" } }, { "category": "service_pack", "name": "3.18.2aSP", "product": { "name": "3.18.2aSP", "product_id": "CSAFPID-226160" } }, { "category": "service_pack", "name": "3.18.1iSP", "product": { "name": "3.18.1iSP", "product_id": "CSAFPID-226354" } } ], "category": "product_version", "name": "3.18SP" }, { "branches": [ { "category": "service_pack", "name": "3.9.0E", "product": { "name": "3.9.0E", "product_id": "CSAFPID-217282" } }, { "category": "service_pack", "name": "3.9.1E", "product": { "name": "3.9.1E", "product_id": "CSAFPID-222483" } }, { "category": "service_pack", "name": "3.9.2E", "product": { "name": "3.9.2E", "product_id": "CSAFPID-226158" } }, { "category": "service_pack", "name": "3.9.2bE", "product": { "name": "3.9.2bE", "product_id": "CSAFPID-227755" } } ], "category": "product_version", "name": "3.9E" } ], "category": "product_family", "name": "Cisco IOS XE Software" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12237", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvc41277" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-103851", "CSAFPID-106899", "CSAFPID-107861", "CSAFPID-111023", "CSAFPID-112424", "CSAFPID-112489", "CSAFPID-113970", "CSAFPID-114419", "CSAFPID-115285", "CSAFPID-115687", "CSAFPID-115939", "CSAFPID-115981", "CSAFPID-116082", "CSAFPID-116083", "CSAFPID-116219", "CSAFPID-116256", "CSAFPID-116726", "CSAFPID-116772", "CSAFPID-116774", "CSAFPID-117359", "CSAFPID-117681", "CSAFPID-117682", "CSAFPID-117683", "CSAFPID-117783", "CSAFPID-117789", "CSAFPID-117800", "CSAFPID-117801", "CSAFPID-117802", "CSAFPID-117803", "CSAFPID-117804", "CSAFPID-183811", "CSAFPID-183813", "CSAFPID-183835", "CSAFPID-183836", "CSAFPID-183837", "CSAFPID-183838", "CSAFPID-183839", "CSAFPID-184932", "CSAFPID-184933", "CSAFPID-187057", "CSAFPID-187147", "CSAFPID-187231", "CSAFPID-187232", "CSAFPID-187412", "CSAFPID-187425", "CSAFPID-187962", "CSAFPID-188008", "CSAFPID-188061", "CSAFPID-188198", "CSAFPID-189064", "CSAFPID-189115", "CSAFPID-189219", "CSAFPID-189455", "CSAFPID-189617", "CSAFPID-189765", "CSAFPID-190432", "CSAFPID-190493", "CSAFPID-190635", "CSAFPID-190637", "CSAFPID-190980", "CSAFPID-191331", "CSAFPID-191336", "CSAFPID-191635", "CSAFPID-191686", "CSAFPID-191928", "CSAFPID-191942", "CSAFPID-191948", "CSAFPID-191997", "CSAFPID-192443", "CSAFPID-192706", "CSAFPID-192726", "CSAFPID-192910", "CSAFPID-193284", "CSAFPID-193315", "CSAFPID-193316", "CSAFPID-193321", "CSAFPID-193347", "CSAFPID-193350", "CSAFPID-193406", "CSAFPID-193407", "CSAFPID-193408", "CSAFPID-193409", "CSAFPID-193544", "CSAFPID-194540", "CSAFPID-194877", "CSAFPID-194913", "CSAFPID-194942", "CSAFPID-194944", "CSAFPID-195024", "CSAFPID-195062", "CSAFPID-195469", "CSAFPID-195770", "CSAFPID-195876", "CSAFPID-195943", "CSAFPID-195977", "CSAFPID-196114", "CSAFPID-196255", "CSAFPID-196256", "CSAFPID-196322", "CSAFPID-197457", "CSAFPID-197462", "CSAFPID-197469", "CSAFPID-197471", "CSAFPID-197474", "CSAFPID-197477", "CSAFPID-197483", "CSAFPID-197495", "CSAFPID-198059", "CSAFPID-198060", "CSAFPID-198063", "CSAFPID-198065", "CSAFPID-198066", "CSAFPID-198067", "CSAFPID-198309", "CSAFPID-198426", "CSAFPID-198528", "CSAFPID-200485", "CSAFPID-200487", "CSAFPID-200488", "CSAFPID-200495", "CSAFPID-200496", "CSAFPID-200499", "CSAFPID-200503", "CSAFPID-200506", "CSAFPID-200509", "CSAFPID-200634", "CSAFPID-201019", "CSAFPID-201074", "CSAFPID-201189", "CSAFPID-201259", "CSAFPID-201366", "CSAFPID-201595", "CSAFPID-201713", "CSAFPID-202559", "CSAFPID-202715", "CSAFPID-203066", "CSAFPID-204095", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204104", "CSAFPID-204105", "CSAFPID-204106", "CSAFPID-204107", "CSAFPID-204108", "CSAFPID-204109", "CSAFPID-204110", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204279", "CSAFPID-204281", "CSAFPID-204282", "CSAFPID-204818", "CSAFPID-204822", "CSAFPID-204828", "CSAFPID-204830", "CSAFPID-204831", "CSAFPID-204832", "CSAFPID-204901", "CSAFPID-205064", "CSAFPID-205516", "CSAFPID-205517", "CSAFPID-205670", "CSAFPID-205672", "CSAFPID-205721", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209043", "CSAFPID-209044", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209059", "CSAFPID-209060", "CSAFPID-209063", "CSAFPID-209064", "CSAFPID-209065", "CSAFPID-209091", "CSAFPID-209093", "CSAFPID-209094", "CSAFPID-209095", "CSAFPID-209096", "CSAFPID-209097", "CSAFPID-209098", "CSAFPID-209099", "CSAFPID-209101", "CSAFPID-209102", "CSAFPID-209103", "CSAFPID-209104", "CSAFPID-209105", "CSAFPID-209106", "CSAFPID-209107", "CSAFPID-209109", "CSAFPID-209110", "CSAFPID-209111", "CSAFPID-209112", "CSAFPID-209113", "CSAFPID-209115", "CSAFPID-209268", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209360", "CSAFPID-209439", "CSAFPID-209455", "CSAFPID-209532", "CSAFPID-209569", "CSAFPID-209632", "CSAFPID-209839", "CSAFPID-209887", "CSAFPID-209929", "CSAFPID-209936", "CSAFPID-210129", "CSAFPID-210203", "CSAFPID-210344", "CSAFPID-210406", "CSAFPID-210407", "CSAFPID-210766", "CSAFPID-210958", "CSAFPID-211296", "CSAFPID-211297", "CSAFPID-211408", "CSAFPID-211603", "CSAFPID-211618", "CSAFPID-211751", "CSAFPID-211825", "CSAFPID-211976", "CSAFPID-211984", "CSAFPID-212118", "CSAFPID-212127", "CSAFPID-212321", "CSAFPID-212329", "CSAFPID-212407", "CSAFPID-212445", "CSAFPID-212635", "CSAFPID-212701", "CSAFPID-213000", "CSAFPID-213001", "CSAFPID-213002", "CSAFPID-213023", "CSAFPID-213032", "CSAFPID-213034", "CSAFPID-213086", "CSAFPID-213594", "CSAFPID-213610", "CSAFPID-213633", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213789", "CSAFPID-213794", "CSAFPID-213795", "CSAFPID-213843", "CSAFPID-214052", "CSAFPID-214053", "CSAFPID-214072", "CSAFPID-214074", "CSAFPID-214078", "CSAFPID-214161", "CSAFPID-214166", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214479", "CSAFPID-214480", "CSAFPID-214556", "CSAFPID-214938", "CSAFPID-214965", "CSAFPID-216215", "CSAFPID-216239", "CSAFPID-216258", "CSAFPID-216259", "CSAFPID-216295", "CSAFPID-216344", "CSAFPID-216419", "CSAFPID-216577", "CSAFPID-216961", "CSAFPID-216962", "CSAFPID-217805", "CSAFPID-217807", "CSAFPID-218891", "CSAFPID-218995", "CSAFPID-218996", "CSAFPID-218997", "CSAFPID-220038", "CSAFPID-220396", "CSAFPID-220440", "CSAFPID-220441", "CSAFPID-220443", "CSAFPID-220444", "CSAFPID-220445", "CSAFPID-220457", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220521", "CSAFPID-220522", "CSAFPID-220594", "CSAFPID-220650", "CSAFPID-220664", "CSAFPID-220673", "CSAFPID-220674", "CSAFPID-220675", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-221093", "CSAFPID-221137", "CSAFPID-222342", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222650", "CSAFPID-222651", "CSAFPID-222924", "CSAFPID-222931", "CSAFPID-222988", "CSAFPID-222989", "CSAFPID-223085", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-223189", "CSAFPID-224327", "CSAFPID-224443", "CSAFPID-224553", "CSAFPID-224566", "CSAFPID-224611", "CSAFPID-225167", "CSAFPID-225662", "CSAFPID-225667", "CSAFPID-225668", "CSAFPID-225740", "CSAFPID-225786", "CSAFPID-226076", "CSAFPID-226077", "CSAFPID-226202", "CSAFPID-227172", "CSAFPID-227250", "CSAFPID-227285", "CSAFPID-227364", "CSAFPID-227613", "CSAFPID-228151", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230594", "CSAFPID-230612", "CSAFPID-230613", "CSAFPID-230614", "CSAFPID-230616", "CSAFPID-232093", "CSAFPID-234926", "CSAFPID-236297", "CSAFPID-241916", "CSAFPID-245380", "CSAFPID-250628", "CSAFPID-254081", "CSAFPID-262382", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-275327", "CSAFPID-275845", "CSAFPID-278136", "CSAFPID-280778", "CSAFPID-286843", "CSAFPID-300950", "CSAFPID-184480", "CSAFPID-184481", "CSAFPID-194730", "CSAFPID-194731", "CSAFPID-194732", "CSAFPID-194735", "CSAFPID-194736", "CSAFPID-194737", "CSAFPID-194842", "CSAFPID-194843", "CSAFPID-197145", "CSAFPID-198123", "CSAFPID-198124", "CSAFPID-198125", "CSAFPID-200768", "CSAFPID-200770", "CSAFPID-200771", "CSAFPID-201495", "CSAFPID-202539", "CSAFPID-202540", "CSAFPID-202541", "CSAFPID-202542", "CSAFPID-202558", "CSAFPID-203353", "CSAFPID-206159", "CSAFPID-206160", "CSAFPID-206161", "CSAFPID-206162", "CSAFPID-206168", "CSAFPID-206169", "CSAFPID-206170", "CSAFPID-206172", "CSAFPID-206173", "CSAFPID-206174", "CSAFPID-206175", "CSAFPID-206176", "CSAFPID-206178", "CSAFPID-206180", "CSAFPID-206181", "CSAFPID-206188", "CSAFPID-206189", "CSAFPID-206190", "CSAFPID-206191", "CSAFPID-206192", "CSAFPID-206193", "CSAFPID-206211", "CSAFPID-210073", "CSAFPID-210074", "CSAFPID-210075", "CSAFPID-210076", "CSAFPID-210077", "CSAFPID-210078", "CSAFPID-210079", "CSAFPID-210081", "CSAFPID-210264", "CSAFPID-212268", "CSAFPID-212408", "CSAFPID-212411", "CSAFPID-212412", "CSAFPID-212436", "CSAFPID-212674", "CSAFPID-213100", "CSAFPID-213469", "CSAFPID-213470", "CSAFPID-213471", "CSAFPID-213472", "CSAFPID-213473", "CSAFPID-213474", "CSAFPID-213475", "CSAFPID-213476", "CSAFPID-213477", "CSAFPID-213478", "CSAFPID-213557", "CSAFPID-213580", "CSAFPID-213635", "CSAFPID-213642", "CSAFPID-213661", "CSAFPID-213700", "CSAFPID-213776", "CSAFPID-213777", "CSAFPID-213778", "CSAFPID-213779", "CSAFPID-213781", "CSAFPID-213790", "CSAFPID-213797", "CSAFPID-213798", "CSAFPID-213799", "CSAFPID-213809", "CSAFPID-213811", "CSAFPID-213812", "CSAFPID-213815", "CSAFPID-213816", "CSAFPID-213825", "CSAFPID-213955", "CSAFPID-213957", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217234", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-217260", "CSAFPID-217261", "CSAFPID-217262", "CSAFPID-217263", "CSAFPID-217264", "CSAFPID-217265", "CSAFPID-217266", "CSAFPID-217267", "CSAFPID-217268", "CSAFPID-217270", "CSAFPID-217271", "CSAFPID-217272", "CSAFPID-217273", "CSAFPID-217276", "CSAFPID-217279", "CSAFPID-217280", "CSAFPID-217282", "CSAFPID-217283", "CSAFPID-220290", "CSAFPID-220357", "CSAFPID-220489", "CSAFPID-220517", "CSAFPID-220687", "CSAFPID-220688", "CSAFPID-220802", "CSAFPID-220993", "CSAFPID-221108", "CSAFPID-222257", "CSAFPID-222435", "CSAFPID-222483", "CSAFPID-222693", "CSAFPID-222694", "CSAFPID-222695", "CSAFPID-222711", "CSAFPID-222925", "CSAFPID-222942", "CSAFPID-223018", "CSAFPID-223019", "CSAFPID-223241", "CSAFPID-223252", "CSAFPID-224424", "CSAFPID-224702", "CSAFPID-225168", "CSAFPID-225337", "CSAFPID-225359", "CSAFPID-225568", "CSAFPID-225569", "CSAFPID-225784", "CSAFPID-226078", "CSAFPID-226158", "CSAFPID-226160", "CSAFPID-226330", "CSAFPID-226354", "CSAFPID-227755" ] }, "release_date": "2017-09-27T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-184480", "CSAFPID-184481", "CSAFPID-194730", "CSAFPID-194731", "CSAFPID-194732", "CSAFPID-194735", "CSAFPID-194736", "CSAFPID-194737", "CSAFPID-194842", "CSAFPID-194843", "CSAFPID-197145", "CSAFPID-198123", "CSAFPID-198124", "CSAFPID-198125", "CSAFPID-200768", "CSAFPID-200770", "CSAFPID-200771", "CSAFPID-201495", "CSAFPID-202539", "CSAFPID-202540", "CSAFPID-202541", "CSAFPID-202542", "CSAFPID-202558", "CSAFPID-203353", "CSAFPID-206159", "CSAFPID-206160", "CSAFPID-206161", "CSAFPID-206162", "CSAFPID-206168", "CSAFPID-206169", "CSAFPID-206170", "CSAFPID-206172", "CSAFPID-206173", "CSAFPID-206174", "CSAFPID-206175", "CSAFPID-206176", "CSAFPID-206178", "CSAFPID-206180", "CSAFPID-206181", "CSAFPID-206188", "CSAFPID-206189", "CSAFPID-206190", "CSAFPID-206191", "CSAFPID-206192", "CSAFPID-206193", "CSAFPID-206211", "CSAFPID-210073", "CSAFPID-210074", "CSAFPID-210075", "CSAFPID-210076", "CSAFPID-210077", "CSAFPID-210078", "CSAFPID-210079", "CSAFPID-210081", "CSAFPID-210264", "CSAFPID-212268", "CSAFPID-212408", "CSAFPID-212411", "CSAFPID-212412", "CSAFPID-212436", "CSAFPID-212674", "CSAFPID-213100", "CSAFPID-213469", "CSAFPID-213470", "CSAFPID-213471", "CSAFPID-213472", "CSAFPID-213473", "CSAFPID-213474", "CSAFPID-213475", "CSAFPID-213476", "CSAFPID-213477", "CSAFPID-213478", "CSAFPID-213557", "CSAFPID-213580", "CSAFPID-213635", "CSAFPID-213642", "CSAFPID-213661", "CSAFPID-213700", "CSAFPID-213776", "CSAFPID-213777", "CSAFPID-213778", "CSAFPID-213779", "CSAFPID-213781", "CSAFPID-213790", "CSAFPID-213797", "CSAFPID-213798", "CSAFPID-213799", "CSAFPID-213809", "CSAFPID-213811", "CSAFPID-213812", "CSAFPID-213815", "CSAFPID-213816", "CSAFPID-213825", "CSAFPID-213955", "CSAFPID-213957", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217234", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-217260", "CSAFPID-217261", "CSAFPID-217262", "CSAFPID-217263", "CSAFPID-217264", "CSAFPID-217265", "CSAFPID-217266", "CSAFPID-217267", "CSAFPID-217268", "CSAFPID-217270", "CSAFPID-217271", "CSAFPID-217272", "CSAFPID-217273", "CSAFPID-217276", "CSAFPID-217279", "CSAFPID-217280", "CSAFPID-217282", "CSAFPID-217283", "CSAFPID-220290", "CSAFPID-220357", "CSAFPID-220489", "CSAFPID-220517", "CSAFPID-220687", "CSAFPID-220688", "CSAFPID-220802", "CSAFPID-220993", "CSAFPID-221108", "CSAFPID-222257", "CSAFPID-222435", "CSAFPID-222483", "CSAFPID-222693", "CSAFPID-222694", "CSAFPID-222695", "CSAFPID-222711", "CSAFPID-222925", "CSAFPID-222942", "CSAFPID-223018", "CSAFPID-223019", "CSAFPID-223241", "CSAFPID-223252", "CSAFPID-224424", "CSAFPID-224702", "CSAFPID-225168", "CSAFPID-225337", "CSAFPID-225359", "CSAFPID-225568", "CSAFPID-225569", "CSAFPID-225784", "CSAFPID-226078", "CSAFPID-226158", "CSAFPID-226160", "CSAFPID-226330", "CSAFPID-226354", "CSAFPID-227755", "CSAFPID-103851", "CSAFPID-106899", "CSAFPID-107861", "CSAFPID-111023", "CSAFPID-112424", "CSAFPID-112489", "CSAFPID-113970", "CSAFPID-114419", "CSAFPID-115285", "CSAFPID-115687", "CSAFPID-115939", "CSAFPID-115981", "CSAFPID-116082", "CSAFPID-116083", "CSAFPID-116219", "CSAFPID-116256", "CSAFPID-116726", "CSAFPID-116772", "CSAFPID-116774", "CSAFPID-117359", "CSAFPID-117681", "CSAFPID-117682", "CSAFPID-117683", "CSAFPID-117783", "CSAFPID-117789", "CSAFPID-117800", "CSAFPID-117801", "CSAFPID-117802", "CSAFPID-117803", "CSAFPID-117804", "CSAFPID-183811", "CSAFPID-183813", "CSAFPID-183835", "CSAFPID-183836", "CSAFPID-183837", "CSAFPID-183838", "CSAFPID-183839", "CSAFPID-184932", "CSAFPID-184933", "CSAFPID-187057", "CSAFPID-187147", "CSAFPID-187231", "CSAFPID-187232", "CSAFPID-187412", "CSAFPID-187425", "CSAFPID-187962", "CSAFPID-188008", "CSAFPID-188061", "CSAFPID-188198", "CSAFPID-189064", "CSAFPID-189115", "CSAFPID-189219", "CSAFPID-189455", "CSAFPID-189617", "CSAFPID-189765", "CSAFPID-190432", "CSAFPID-190493", "CSAFPID-190635", "CSAFPID-190637", "CSAFPID-190980", "CSAFPID-191331", "CSAFPID-191336", "CSAFPID-191635", "CSAFPID-191686", "CSAFPID-191928", "CSAFPID-191942", "CSAFPID-191948", "CSAFPID-191997", "CSAFPID-192443", "CSAFPID-192706", "CSAFPID-192726", "CSAFPID-192910", "CSAFPID-193284", "CSAFPID-193315", "CSAFPID-193316", "CSAFPID-193321", "CSAFPID-193347", "CSAFPID-193350", "CSAFPID-193406", "CSAFPID-193407", "CSAFPID-193408", "CSAFPID-193409", "CSAFPID-193544", "CSAFPID-194540", "CSAFPID-194877", "CSAFPID-194913", "CSAFPID-194942", "CSAFPID-194944", "CSAFPID-195024", "CSAFPID-195062", "CSAFPID-195469", "CSAFPID-195770", "CSAFPID-195876", "CSAFPID-195943", "CSAFPID-195977", "CSAFPID-196114", "CSAFPID-196255", "CSAFPID-196256", "CSAFPID-196322", "CSAFPID-197457", "CSAFPID-197462", "CSAFPID-197469", "CSAFPID-197471", "CSAFPID-197474", "CSAFPID-197477", "CSAFPID-197483", "CSAFPID-197495", "CSAFPID-198059", "CSAFPID-198060", "CSAFPID-198063", "CSAFPID-198065", "CSAFPID-198066", "CSAFPID-198067", "CSAFPID-198309", "CSAFPID-198426", "CSAFPID-198528", "CSAFPID-200485", "CSAFPID-200487", "CSAFPID-200488", "CSAFPID-200495", "CSAFPID-200496", "CSAFPID-200499", "CSAFPID-200503", "CSAFPID-200506", "CSAFPID-200509", "CSAFPID-200634", "CSAFPID-201019", "CSAFPID-201074", "CSAFPID-201189", "CSAFPID-201259", "CSAFPID-201366", "CSAFPID-201595", "CSAFPID-201713", "CSAFPID-202559", "CSAFPID-202715", "CSAFPID-203066", "CSAFPID-204095", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204104", "CSAFPID-204105", "CSAFPID-204106", "CSAFPID-204107", "CSAFPID-204108", "CSAFPID-204109", "CSAFPID-204110", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204279", "CSAFPID-204281", "CSAFPID-204282", "CSAFPID-204818", "CSAFPID-204822", "CSAFPID-204828", "CSAFPID-204830", "CSAFPID-204831", "CSAFPID-204832", "CSAFPID-204901", "CSAFPID-205064", "CSAFPID-205516", "CSAFPID-205517", "CSAFPID-205670", "CSAFPID-205672", "CSAFPID-205721", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209043", "CSAFPID-209044", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209059", "CSAFPID-209060", "CSAFPID-209063", "CSAFPID-209064", "CSAFPID-209065", "CSAFPID-209091", "CSAFPID-209093", "CSAFPID-209094", "CSAFPID-209095", "CSAFPID-209096", "CSAFPID-209097", "CSAFPID-209098", "CSAFPID-209099", "CSAFPID-209101", "CSAFPID-209102", "CSAFPID-209103", "CSAFPID-209104", "CSAFPID-209105", "CSAFPID-209106", "CSAFPID-209107", "CSAFPID-209109", "CSAFPID-209110", "CSAFPID-209111", "CSAFPID-209112", "CSAFPID-209113", "CSAFPID-209115", "CSAFPID-209268", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209360", "CSAFPID-209439", "CSAFPID-209455", "CSAFPID-209532", "CSAFPID-209569", "CSAFPID-209632", "CSAFPID-209839", "CSAFPID-209887", "CSAFPID-209929", "CSAFPID-209936", "CSAFPID-210129", "CSAFPID-210203", "CSAFPID-210344", "CSAFPID-210406", "CSAFPID-210407", "CSAFPID-210766", "CSAFPID-210958", "CSAFPID-211296", "CSAFPID-211297", "CSAFPID-211408", "CSAFPID-211603", "CSAFPID-211618", "CSAFPID-211751", "CSAFPID-211825", "CSAFPID-211976", "CSAFPID-211984", "CSAFPID-212118", "CSAFPID-212127", "CSAFPID-212321", "CSAFPID-212329", "CSAFPID-212407", "CSAFPID-212445", "CSAFPID-212635", "CSAFPID-212701", "CSAFPID-213000", "CSAFPID-213001", "CSAFPID-213002", "CSAFPID-213023", "CSAFPID-213032", "CSAFPID-213034", "CSAFPID-213086", "CSAFPID-213594", "CSAFPID-213610", "CSAFPID-213633", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213789", "CSAFPID-213794", "CSAFPID-213795", "CSAFPID-213843", "CSAFPID-214052", "CSAFPID-214053", "CSAFPID-214072", "CSAFPID-214074", "CSAFPID-214078", "CSAFPID-214161", "CSAFPID-214166", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214479", "CSAFPID-214480", "CSAFPID-214556", "CSAFPID-214938", "CSAFPID-214965", "CSAFPID-216215", "CSAFPID-216239", "CSAFPID-216258", "CSAFPID-216259", "CSAFPID-216295", "CSAFPID-216344", "CSAFPID-216419", "CSAFPID-216577", "CSAFPID-216961", "CSAFPID-216962", "CSAFPID-217805", "CSAFPID-217807", "CSAFPID-218891", "CSAFPID-218995", "CSAFPID-218996", "CSAFPID-218997", "CSAFPID-220038", "CSAFPID-220396", "CSAFPID-220440", "CSAFPID-220441", "CSAFPID-220443", "CSAFPID-220444", "CSAFPID-220445", "CSAFPID-220457", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220521", "CSAFPID-220522", "CSAFPID-220594", "CSAFPID-220650", "CSAFPID-220664", "CSAFPID-220673", "CSAFPID-220674", "CSAFPID-220675", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-221093", "CSAFPID-221137", "CSAFPID-222342", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222650", "CSAFPID-222651", "CSAFPID-222924", "CSAFPID-222931", "CSAFPID-222988", "CSAFPID-222989", "CSAFPID-223085", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-223189", "CSAFPID-224327", "CSAFPID-224443", "CSAFPID-224553", "CSAFPID-224566", "CSAFPID-224611", "CSAFPID-225167", "CSAFPID-225662", "CSAFPID-225667", "CSAFPID-225668", "CSAFPID-225740", "CSAFPID-225786", "CSAFPID-226076", "CSAFPID-226077", "CSAFPID-226202", "CSAFPID-227172", "CSAFPID-227250", "CSAFPID-227285", "CSAFPID-227364", "CSAFPID-227613", "CSAFPID-228151", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230594", "CSAFPID-230612", "CSAFPID-230613", "CSAFPID-230614", "CSAFPID-230616", "CSAFPID-232093", "CSAFPID-234926", "CSAFPID-236297", "CSAFPID-241916", "CSAFPID-245380", "CSAFPID-250628", "CSAFPID-254081", "CSAFPID-262382", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-275327", "CSAFPID-275845", "CSAFPID-278136", "CSAFPID-280778", "CSAFPID-286843", "CSAFPID-300950" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-103851", "CSAFPID-106899", "CSAFPID-107861", "CSAFPID-111023", "CSAFPID-112424", "CSAFPID-112489", "CSAFPID-113970", "CSAFPID-114419", "CSAFPID-115285", "CSAFPID-115687", "CSAFPID-115939", "CSAFPID-115981", "CSAFPID-116082", "CSAFPID-116083", "CSAFPID-116219", "CSAFPID-116256", "CSAFPID-116726", "CSAFPID-116772", "CSAFPID-116774", "CSAFPID-117359", "CSAFPID-117681", "CSAFPID-117682", "CSAFPID-117683", "CSAFPID-117783", "CSAFPID-117789", "CSAFPID-117800", "CSAFPID-117801", "CSAFPID-117802", "CSAFPID-117803", "CSAFPID-117804", "CSAFPID-183811", "CSAFPID-183813", "CSAFPID-183835", "CSAFPID-183836", "CSAFPID-183837", "CSAFPID-183838", "CSAFPID-183839", "CSAFPID-184932", "CSAFPID-184933", "CSAFPID-187057", "CSAFPID-187147", "CSAFPID-187231", "CSAFPID-187232", "CSAFPID-187412", "CSAFPID-187425", "CSAFPID-187962", "CSAFPID-188008", "CSAFPID-188061", "CSAFPID-188198", "CSAFPID-189064", "CSAFPID-189115", "CSAFPID-189219", "CSAFPID-189455", "CSAFPID-189617", "CSAFPID-189765", "CSAFPID-190432", "CSAFPID-190493", "CSAFPID-190635", "CSAFPID-190637", "CSAFPID-190980", "CSAFPID-191331", "CSAFPID-191336", "CSAFPID-191635", "CSAFPID-191686", "CSAFPID-191928", "CSAFPID-191942", "CSAFPID-191948", "CSAFPID-191997", "CSAFPID-192443", "CSAFPID-192706", "CSAFPID-192726", "CSAFPID-192910", "CSAFPID-193284", "CSAFPID-193315", "CSAFPID-193316", "CSAFPID-193321", "CSAFPID-193347", "CSAFPID-193350", "CSAFPID-193406", "CSAFPID-193407", "CSAFPID-193408", "CSAFPID-193409", "CSAFPID-193544", "CSAFPID-194540", "CSAFPID-194877", "CSAFPID-194913", "CSAFPID-194942", "CSAFPID-194944", "CSAFPID-195024", "CSAFPID-195062", "CSAFPID-195469", "CSAFPID-195770", "CSAFPID-195876", "CSAFPID-195943", "CSAFPID-195977", "CSAFPID-196114", "CSAFPID-196255", "CSAFPID-196256", "CSAFPID-196322", "CSAFPID-197457", "CSAFPID-197462", "CSAFPID-197469", "CSAFPID-197471", "CSAFPID-197474", "CSAFPID-197477", "CSAFPID-197483", "CSAFPID-197495", "CSAFPID-198059", "CSAFPID-198060", "CSAFPID-198063", "CSAFPID-198065", "CSAFPID-198066", "CSAFPID-198067", "CSAFPID-198309", "CSAFPID-198426", "CSAFPID-198528", "CSAFPID-200485", "CSAFPID-200487", "CSAFPID-200488", "CSAFPID-200495", "CSAFPID-200496", "CSAFPID-200499", "CSAFPID-200503", "CSAFPID-200506", "CSAFPID-200509", "CSAFPID-200634", "CSAFPID-201019", "CSAFPID-201074", "CSAFPID-201189", "CSAFPID-201259", "CSAFPID-201366", "CSAFPID-201595", "CSAFPID-201713", "CSAFPID-202559", "CSAFPID-202715", "CSAFPID-203066", "CSAFPID-204095", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204104", "CSAFPID-204105", "CSAFPID-204106", "CSAFPID-204107", "CSAFPID-204108", "CSAFPID-204109", "CSAFPID-204110", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204279", "CSAFPID-204281", "CSAFPID-204282", "CSAFPID-204818", "CSAFPID-204822", "CSAFPID-204828", "CSAFPID-204830", "CSAFPID-204831", "CSAFPID-204832", "CSAFPID-204901", "CSAFPID-205064", "CSAFPID-205516", "CSAFPID-205517", "CSAFPID-205670", "CSAFPID-205672", "CSAFPID-205721", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209043", "CSAFPID-209044", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209059", "CSAFPID-209060", "CSAFPID-209063", "CSAFPID-209064", "CSAFPID-209065", "CSAFPID-209091", "CSAFPID-209093", "CSAFPID-209094", "CSAFPID-209095", "CSAFPID-209096", "CSAFPID-209097", "CSAFPID-209098", "CSAFPID-209099", "CSAFPID-209101", "CSAFPID-209102", "CSAFPID-209103", "CSAFPID-209104", "CSAFPID-209105", "CSAFPID-209106", "CSAFPID-209107", "CSAFPID-209109", "CSAFPID-209110", "CSAFPID-209111", "CSAFPID-209112", "CSAFPID-209113", "CSAFPID-209115", "CSAFPID-209268", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209360", "CSAFPID-209439", "CSAFPID-209455", "CSAFPID-209532", "CSAFPID-209569", "CSAFPID-209632", "CSAFPID-209839", "CSAFPID-209887", "CSAFPID-209929", "CSAFPID-209936", "CSAFPID-210129", "CSAFPID-210203", "CSAFPID-210344", "CSAFPID-210406", "CSAFPID-210407", "CSAFPID-210766", "CSAFPID-210958", "CSAFPID-211296", "CSAFPID-211297", "CSAFPID-211408", "CSAFPID-211603", "CSAFPID-211618", "CSAFPID-211751", "CSAFPID-211825", "CSAFPID-211976", "CSAFPID-211984", "CSAFPID-212118", "CSAFPID-212127", "CSAFPID-212321", "CSAFPID-212329", "CSAFPID-212407", "CSAFPID-212445", "CSAFPID-212635", "CSAFPID-212701", "CSAFPID-213000", "CSAFPID-213001", "CSAFPID-213002", "CSAFPID-213023", "CSAFPID-213032", "CSAFPID-213034", "CSAFPID-213086", "CSAFPID-213594", "CSAFPID-213610", "CSAFPID-213633", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213789", "CSAFPID-213794", "CSAFPID-213795", "CSAFPID-213843", "CSAFPID-214052", "CSAFPID-214053", "CSAFPID-214072", "CSAFPID-214074", "CSAFPID-214078", "CSAFPID-214161", "CSAFPID-214166", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214479", "CSAFPID-214480", "CSAFPID-214556", "CSAFPID-214938", "CSAFPID-214965", "CSAFPID-216215", "CSAFPID-216239", "CSAFPID-216258", "CSAFPID-216259", "CSAFPID-216295", "CSAFPID-216344", "CSAFPID-216419", "CSAFPID-216577", "CSAFPID-216961", "CSAFPID-216962", "CSAFPID-217805", "CSAFPID-217807", "CSAFPID-218891", "CSAFPID-218995", "CSAFPID-218996", "CSAFPID-218997", "CSAFPID-220038", "CSAFPID-220396", "CSAFPID-220440", "CSAFPID-220441", "CSAFPID-220443", "CSAFPID-220444", "CSAFPID-220445", "CSAFPID-220457", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220521", "CSAFPID-220522", "CSAFPID-220594", "CSAFPID-220650", "CSAFPID-220664", "CSAFPID-220673", "CSAFPID-220674", "CSAFPID-220675", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-221093", "CSAFPID-221137", "CSAFPID-222342", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222650", "CSAFPID-222651", "CSAFPID-222924", "CSAFPID-222931", "CSAFPID-222988", "CSAFPID-222989", "CSAFPID-223085", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-223189", "CSAFPID-224327", "CSAFPID-224443", "CSAFPID-224553", "CSAFPID-224566", "CSAFPID-224611", "CSAFPID-225167", "CSAFPID-225662", "CSAFPID-225667", "CSAFPID-225668", "CSAFPID-225740", "CSAFPID-225786", "CSAFPID-226076", "CSAFPID-226077", "CSAFPID-226202", "CSAFPID-227172", "CSAFPID-227250", "CSAFPID-227285", "CSAFPID-227364", "CSAFPID-227613", "CSAFPID-228151", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230594", "CSAFPID-230612", "CSAFPID-230613", "CSAFPID-230614", "CSAFPID-230616", "CSAFPID-232093", "CSAFPID-234926", "CSAFPID-236297", "CSAFPID-241916", "CSAFPID-245380", "CSAFPID-250628", "CSAFPID-254081", "CSAFPID-262382", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-275327", "CSAFPID-275845", "CSAFPID-278136", "CSAFPID-280778", "CSAFPID-286843", "CSAFPID-300950", "CSAFPID-184480", "CSAFPID-184481", "CSAFPID-194730", "CSAFPID-194731", "CSAFPID-194732", "CSAFPID-194735", "CSAFPID-194736", "CSAFPID-194737", "CSAFPID-194842", "CSAFPID-194843", "CSAFPID-197145", "CSAFPID-198123", "CSAFPID-198124", "CSAFPID-198125", "CSAFPID-200768", "CSAFPID-200770", "CSAFPID-200771", "CSAFPID-201495", "CSAFPID-202539", "CSAFPID-202540", "CSAFPID-202541", "CSAFPID-202542", "CSAFPID-202558", "CSAFPID-203353", "CSAFPID-206159", "CSAFPID-206160", "CSAFPID-206161", "CSAFPID-206162", "CSAFPID-206168", "CSAFPID-206169", "CSAFPID-206170", "CSAFPID-206172", "CSAFPID-206173", "CSAFPID-206174", "CSAFPID-206175", "CSAFPID-206176", "CSAFPID-206178", "CSAFPID-206180", "CSAFPID-206181", "CSAFPID-206188", "CSAFPID-206189", "CSAFPID-206190", "CSAFPID-206191", "CSAFPID-206192", "CSAFPID-206193", "CSAFPID-206211", "CSAFPID-210073", "CSAFPID-210074", "CSAFPID-210075", "CSAFPID-210076", "CSAFPID-210077", "CSAFPID-210078", "CSAFPID-210079", "CSAFPID-210081", "CSAFPID-210264", "CSAFPID-212268", "CSAFPID-212408", "CSAFPID-212411", "CSAFPID-212412", "CSAFPID-212436", "CSAFPID-212674", "CSAFPID-213100", "CSAFPID-213469", "CSAFPID-213470", "CSAFPID-213471", "CSAFPID-213472", "CSAFPID-213473", "CSAFPID-213474", "CSAFPID-213475", "CSAFPID-213476", "CSAFPID-213477", "CSAFPID-213478", "CSAFPID-213557", "CSAFPID-213580", "CSAFPID-213635", "CSAFPID-213642", "CSAFPID-213661", "CSAFPID-213700", "CSAFPID-213776", "CSAFPID-213777", "CSAFPID-213778", "CSAFPID-213779", "CSAFPID-213781", "CSAFPID-213790", "CSAFPID-213797", "CSAFPID-213798", "CSAFPID-213799", "CSAFPID-213809", "CSAFPID-213811", "CSAFPID-213812", "CSAFPID-213815", "CSAFPID-213816", "CSAFPID-213825", "CSAFPID-213955", "CSAFPID-213957", "CSAFPID-213960", "CSAFPID-214051", "CSAFPID-214993", "CSAFPID-217234", "CSAFPID-217253", "CSAFPID-217255", "CSAFPID-217256", "CSAFPID-217257", "CSAFPID-217259", "CSAFPID-217260", "CSAFPID-217261", "CSAFPID-217262", "CSAFPID-217263", "CSAFPID-217264", "CSAFPID-217265", "CSAFPID-217266", "CSAFPID-217267", "CSAFPID-217268", "CSAFPID-217270", "CSAFPID-217271", "CSAFPID-217272", "CSAFPID-217273", "CSAFPID-217276", "CSAFPID-217279", "CSAFPID-217280", "CSAFPID-217282", "CSAFPID-217283", "CSAFPID-220290", "CSAFPID-220357", "CSAFPID-220489", "CSAFPID-220517", "CSAFPID-220687", "CSAFPID-220688", "CSAFPID-220802", "CSAFPID-220993", "CSAFPID-221108", "CSAFPID-222257", "CSAFPID-222435", "CSAFPID-222483", "CSAFPID-222693", "CSAFPID-222694", "CSAFPID-222695", "CSAFPID-222711", "CSAFPID-222925", "CSAFPID-222942", "CSAFPID-223018", "CSAFPID-223019", "CSAFPID-223241", "CSAFPID-223252", "CSAFPID-224424", "CSAFPID-224702", "CSAFPID-225168", "CSAFPID-225337", "CSAFPID-225359", "CSAFPID-225568", "CSAFPID-225569", "CSAFPID-225784", "CSAFPID-226078", "CSAFPID-226158", "CSAFPID-226160", "CSAFPID-226330", "CSAFPID-226354", "CSAFPID-227755" ] } ], "title": "Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability" } ] }
var-201709-0694
Vulnerability from variot
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277. Vendors have confirmed this vulnerability Bug ID CSCvc41277 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Internet Key Exchange Version 2 (IKEv2) module is one of the key exchange protocol modules
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0694", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ex1" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ej1" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ex5" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)se1" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ez" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ej" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)se2" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ex3" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ex" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "15.0\\(2\\)ex4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)s4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.9s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)sn" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.0e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3m\\)e6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.3e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.14.4s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)cg" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.4s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnc4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.1e" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.0sp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m6a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11.0s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.7as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.3e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)s4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)t" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.17.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)t2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.6e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)gc" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)t1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.1.3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.3s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ec" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.12.0as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ec2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)s0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.1e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)t1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.12.2s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)t3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.1e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.1s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.3e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5b\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.0s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.7s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2a\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy5" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.1as" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.14.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s2b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)e2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.7s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.17.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)sni" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4m\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)sy1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)s3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.5e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.6as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)snh1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.6s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.8s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.17.1as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sp2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.4e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3m\\)e8" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)sng" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5c\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.0as" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.1.3a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)gc3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.3e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s7a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.3vs" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4n\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m4a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.1.2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s8a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.4.1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.8as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)sy3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.2ts" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.2s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.0as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s4d" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.2e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy6" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.12.0s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.5ae" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.5be" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.4as" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc50" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)cg" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4p\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s4b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sg7a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)gc" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.5as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.2e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se10a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.5s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s3a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2a\\)se9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)s1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.1as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jda3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s6b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e5b" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.2ts" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.0ex" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.2.2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ec1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.2e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)eb2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.2ae" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2a\\)e2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)s2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)s4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e5" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.12.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb6a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m8" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.0s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.2as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)eb1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnp4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m1b" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.1s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.1e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnp2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)t2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.4s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)je1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.1s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.12.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)sqd7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpb2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se6" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.0e" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.2asp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)gc" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.2.1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sp1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.1xbs" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15.4s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s1a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2a\\)ex5" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.12.4s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.1a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.0cs" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3m\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s5a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.4ds" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s4a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s4a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy9" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15.1cs" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.1b" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.1as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)sy2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4o\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sp1c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)s3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.5s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s6a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m6" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.1c" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)cg1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3m\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m9" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15.3s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.1csp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(1\\)sy3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)ex" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.1.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)s0a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnd2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.2e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s8" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.1.4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)s1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.4bs" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sn" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se10" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.2.3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)s4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)sy" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.3s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)sy1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)s1" }, { "model": "ios xe", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e5a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)s0a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.0e" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5a\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc51" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.5.0e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy4a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)sy1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)e1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.0bs" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.1s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.1e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3a\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3a\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m8a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)gc1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4m\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)sy2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5a\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)s3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)s1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.2sp" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.2as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m6a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.4as" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.9.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(1\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(1\\)t3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.1bsp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)sy1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.4e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)t4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.5s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.3as" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.17.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)e3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.2bs" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sp1b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)gc2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.4.2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)s0c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.4s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(2\\)s2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy8" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.14.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)s1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.14.1s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)sy4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.0e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(3\\)m0a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.7s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)s5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)s2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.16.2s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.1sp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)t3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.6s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.6\\(2\\)sp2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.1asp" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.2s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.4e" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.0as" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.2e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.4s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)ey" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.14.3s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.2.2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.6s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)s1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)sy2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.7.5e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s3a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)t2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.2s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(2\\)sy2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)gc1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11.4s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jca7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.13.5s" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.18.0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)eb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)s1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se9" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "15.0 to 15.6" }, { "model": "ios xe", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.5 to 16.5" }, { "model": "ios \\342\\211\\24515 \\342\\211\\24415.6", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios xe \\342\\211\\245 \\342\\211\\244", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3.516.5" }, { "model": "ios xe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asr series 15.5 s4.1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "BID", "id": "101037" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "NVD", "id": "CVE-2017-12237" }, { "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sng:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.4\\(3\\)s", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)snh1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sni:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-12237" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "101037" } ], "trust": 0.3 }, "cve": "CVE-2017-12237", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12237", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-34218", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-102739", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-12237", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-12237", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2017-34218", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201709-1297", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-102739", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-12237", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "VULHUB", "id": "VHN-102739" }, { "db": "VULMON", "id": "CVE-2017-12237" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "NVD", "id": "CVE-2017-12237" }, { "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277. Vendors have confirmed this vulnerability Bug ID CSCvc41277 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Internet Key Exchange Version 2 (IKEv2) module is one of the key exchange protocol modules", "sources": [ { "db": "NVD", "id": "CVE-2017-12237" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "BID", "id": "101037" }, { "db": "VULHUB", "id": "VHN-102739" }, { "db": "VULMON", "id": "CVE-2017-12237" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12237", "trust": 3.5 }, { "db": "BID", "id": "101037", "trust": 2.7 }, { "db": "SECTRACK", "id": "1039460", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2017-008506", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-1297", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-34218", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-102739", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-12237", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "VULHUB", "id": "VHN-102739" }, { "db": "VULMON", "id": "CVE-2017-12237" }, { "db": "BID", "id": "101037" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "NVD", "id": "CVE-2017-12237" }, { "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "id": "VAR-201709-0694", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "VULHUB", "id": "VHN-102739" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" } ] }, "last_update_date": "2023-12-26T22:52:24.089000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170927-ike", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170927-ike" }, { "title": "Patch for CiscoIOSandIOSXESoftware Denial of Service Vulnerability (CNVD-2017-34218)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/104507" }, { "title": "Cisco IOS and IOS XE Internet Key Exchange Fixes for module resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=75605" }, { "title": "Cisco: Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170927-ike" }, { "title": "Known Exploited Vulnerabilities Detector", "trust": 0.1, "url": "https://github.com/ostorlab/kev " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "VULMON", "id": "CVE-2017-12237" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-102739" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "NVD", "id": "CVE-2017-12237" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170927-ike" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/101037" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1039460" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12237" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12237" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/400.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170927-ike" }, { "trust": 0.1, "url": "https://github.com/ostorlab/kev" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "VULHUB", "id": "VHN-102739" }, { "db": "VULMON", "id": "CVE-2017-12237" }, { "db": "BID", "id": "101037" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "NVD", "id": "CVE-2017-12237" }, { "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-34218" }, { "db": "VULHUB", "id": "VHN-102739" }, { "db": "VULMON", "id": "CVE-2017-12237" }, { "db": "BID", "id": "101037" }, { "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "db": "NVD", "id": "CVE-2017-12237" }, { "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2017-34218" }, { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-102739" }, { "date": "2017-09-29T00:00:00", "db": "VULMON", "id": "CVE-2017-12237" }, { "date": "2017-09-27T00:00:00", "db": "BID", "id": "101037" }, { "date": "2017-10-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "date": "2017-09-29T01:34:48.967000", "db": "NVD", "id": "CVE-2017-12237" }, { "date": "2017-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2017-34218" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-102739" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2017-12237" }, { "date": "2017-09-27T00:00:00", "db": "BID", "id": "101037" }, { "date": "2017-10-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008506" }, { "date": "2019-10-09T23:22:34.370000", "db": "NVD", "id": "CVE-2017-12237" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1297" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1297" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS and IOS XE Resource management vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008506" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1297" } ], "trust": 0.6 } }
gsd-2017-12237
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-12237", "description": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.", "id": "GSD-2017-12237" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-12237" ], "details": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.", "id": "GSD-2017-12237", "modified": "2023-12-13T01:21:03.630831Z", "schema_version": "1.4.0" } }, "namespaces": { "cisa.gov": { "cveID": "CVE-2017-12237", "dateAdded": "2022-03-03", "dueDate": "2022-03-24", "product": "IOS and IOS XE Software", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS and Cisco IOS XE could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS and IOS XE Software Internet Key Exchange Denial-of-Service Vulnerability" }, "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "name": "1039460", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039460" }, { "name": "101037", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101037" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sng:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.4\\(3\\)s", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)snh1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sni:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-12237" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "name": "1039460", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039460" }, { "name": "101037", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101037" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-09T23:22Z", "publishedDate": "2017-09-29T01:34Z" } } }
ghsa-pcwh-xxqr-qw2j
Vulnerability from github
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.
{ "affected": [], "aliases": [ "CVE-2017-12237" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-09-29T01:34:00Z", "severity": "HIGH" }, "details": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.", "id": "GHSA-pcwh-xxqr-qw2j", "modified": "2022-05-13T01:38:06Z", "published": "2022-05-13T01:38:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12237" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/101037" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1039460" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.