cve-2017-12307
Vulnerability from cvelistv5
Published
2018-01-18 06:00
Modified
2024-12-02 21:46
Severity ?
Summary
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:36:56.096Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1"
          },
          {
            "name": "102718",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/102718"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2017-12307",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-02T18:55:49.326877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T21:46:55.055Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business 300 and 500 Series Managed Switches",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco Small Business 300 and 500 Series Managed Switches"
            }
          ]
        }
      ],
      "datePublic": "2018-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-18T10:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1"
        },
        {
          "name": "102718",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/102718"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2017-12307",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business 300 and 500 Series Managed Switches",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco Small Business 300 and 500 Series Managed Switches"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1"
            },
            {
              "name": "102718",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/102718"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2017-12307",
    "datePublished": "2018-01-18T06:00:00",
    "dateReserved": "2017-08-03T00:00:00",
    "dateUpdated": "2024-12-02T21:46:55.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"E62A8CD6-FD0B-4F93-A521-A574470806AA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79843C24-2CE8-4040-9C04-79902D8F741D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"2E28746B-DDAF-48C3-98D2-6DF02F10402B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD650E51-E248-4CFD-8163-72717B66D675\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"7DB647C6-4F49-44B3-B5DC-1CB4B2808809\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B36A173-5C14-4B38-B3DD-CD83B19AF94B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"D42E184D-0BB9-4632-A910-7223EF5846DC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4432E33-8F3C-4C51-8AE3-C53333A867E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"4D9AE8D4-8324-47DE-8A1B-002F04791CF4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"500F9351-FA0C-4648-A2A6-ACFF6C8FD157\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"4D3EAE27-6D3D-427E-B94B-E65FF60A477F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8122322F-6104-4978-9E00-40437365FF67\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"1FA8309E-218A-4EBB-86CB-53568F87AE03\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11548FB9-ADB1-4281-B89B-6D61836072DE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"18D13620-A801-4837-A2D9-D8BB5EC67C8E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EF58ED1-AECE-435C-8F8F-6053C44E01C9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"FC203EBF-AADC-4536-A3A8-8FAD7EF49F66\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2BE66F3-51C8-42D8-927A-5BA0B9B072EF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"3250E1B1-3478-4089-8D4D-210CF5382396\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2DE3B15-DD70-445E-936C-0C9D5C3F1450\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"1C40A90E-B0CC-4713-858A-CE98FA73A59A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C65522C-E250-408C-8A89-AFE4909804D4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"CA0176C1-1AC1-4A05-B2C7-E1E4C76A61FD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9620FE5-567B-4B78-910D-14819E2CDE3B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"59267A4D-846E-4E07-9158-7AB7AE6A8754\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EEA8A38-C545-49AA-812F-8668EED9B23D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"FCFACA27-EBA0-44A2-ADDB-16701EE476A5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F986FD6-A139-43CA-9D83-40CAA8D62B32\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"8CB0A209-D8D2-48E9-9A83-A4EFFD5EBDC0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB21D371-D443-40FE-8DFF-3DD4A9655471\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"BE38A4A5-81FC-4A79-8E8F-F6B288ED2283\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"B981B6EB-AAEE-4B4E-86B1-005E11D1DB30\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9879BE9-D4FA-4EEA-8852-B972299220E3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"3D496D2D-84AF-47A4-BC5E-607C7E5E6DF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"613300D2-A079-415A-B9F7-178B8048AA61\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"19A38D74-522F-4001-97C8-8F3D33AC9DC8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CA11905-1953-4EEB-95CE-3BDB619D0F72\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"03436FAE-7FBF-4C4A-9EE4-3FD94316ED25\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76D1DE6B-6E09-40CF-9507-867ECB183A30\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"6961B4DB-F152-43A6-9440-6655BCAD379F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D9BEB5-78FE-49EB-92BE-6597E7608E71\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"2E912AC1-B82E-406B-8480-720223F2FD74\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFEDE246-7DF9-486D-A5B9-5596FE0AC582\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"438E02A3-D177-4476-80DA-0C95C783B161\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D52D0E9C-FC04-4A45-81D5-A335B30F725E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"CA6AE9A9-61D3-4CE4-B1D3-029734397956\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CAD50CE-8D02-4FD9-965A-7C14D146B52D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"142DCA4A-57D6-48C0-ADD9-749E9B8464D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B39E214D-A4B7-460C-9402-8F94336B30A0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"D7CEC74C-D5FE-45CA-83A1-15F771958993\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"297A662D-BD11-4021-8F19-946CA4BCF8D2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"46470295-0C82-4D37-A9CE-722CAEED6008\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ADB1D69-CBDC-4045-A806-087878560EF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"9162932E-4570-4A6C-8634-1D756EF42C7F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81B88075-F579-492C-B87C-5E4291D269B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"FAB16572-975A-473E-8EDA-757BE49CDFCF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"605B8DE5-56EB-4FFF-BC04-1B3A38762727\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"662D1FD6-5DBB-4DC3-A11E-00AA87A3DF19\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C940275E-41A8-470D-AD97-AB6EC5A75CEF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F584E122-98B8-4F6F-92F1-4A6C83C3B934\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"235AAB5A-9D0A-4864-89E2-D69D1D8A79D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F6B8D73B-BEF3-4006-9ED4-5C8F98B479D9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"967DCE55-B7D5-4D63-9693-B42FAA9243B1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F96925BF-73FC-454B-9B00-632EB2A1E1E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AA6BED3-2564-4A7C-91DC-F843E301A35E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"752F1EF7-FA82-4B8E-B8B6-5939270DB705\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"FB932882-F8F9-44ED-A673-9A07211D5D7F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BDF26D7-B3B5-47CA-94E9-B14BEFE02318\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"857756BD-B680-43EE-9FDB-F5FD56D7A1AC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3AC0655-0F02-4397-881F-CFB6DAC3AA3B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"28F46707-41BD-4118-933D-1FF48045880E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C374EB87-A4C6-43FB-B42E-DEA973375EC2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"37DB9ADA-FCCF-407A-A18D-530FF0815551\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"903E59DA-DE59-4CD4-BE32-B91DDA1DA07D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"A4B89E91-97B0-47EE-BC1E-D0A0098C8C92\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"50CB4BA4-E815-4506-A6FE-21B1F41EEEDF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6812853E-C083-4841-A467-91130ED194BE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"666E6BEC-32C1-4361-AF78-3B5739D38378\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26A7AB18-C75F-4C63-9132-140EFC46E3C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"5803FD62-086B-4316-BDFC-331156C208FD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B70093-E9FE-410A-973E-CE847F08F43A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"4015A3F7-5706-40E9-84AD-A81D9205B2CE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3503F68-CF84-468E-9A40-9F98875DD1C1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"98827546-CA39-4D4E-9C0F-D3B020BE08D2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFFEF3C3-0C7C-4359-A45F-00152ACAB545\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"D4B42742-D701-4AE9-A833-189FB6708FC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19890DBE-F1B9-4454-8738-AC2AC6704C75\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"D3E798EF-99B0-4D76-B0F2-6FB9499FCF8B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"3A289E57-D99E-4A61-BEE3-91A43F156030\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAD7CDE3-7247-4EA9-8A72-7ABC961BD895\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"A415AFE8-B965-45B7-B01F-E3F8F79F8EDD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E7B70CB-9D7A-4637-8A51-634157F7AC85\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"AD23FB5D-9A7F-4A03-A269-A6FE486677D5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5248F85-411D-4ED9-983C-A28A90C8FC70\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"61764001-8BCD-4D43-9324-9ADED2F2890C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD6F6741-AA56-47EA-998C-78FD7F6B01CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"A61B9373-76C9-4EFC-B4AF-EB8833310750\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C96B794-16D3-46FE-8A2B-262BD38994E8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"58E2227C-F7C1-424A-B5C5-5C4BDF052521\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5307DEF-DCD1-417A-B649-FF4DCE66193E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"3E2BDD45-5A8B-494A-A9BE-597ABD9B16D7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"B8982BA5-8ABD-4235-8D24-90F4C949C583\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9054C3D1-BA1A-4BAC-8834-88673B804E4E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"FDB31016-63A8-4436-A4A5-605E79071A71\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78B44981-5C59-4328-A7DB-FBF50F9C92C2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"1BC8B43A-27FD-4188-9247-11796701FF22\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2D5109D-C78B-4362-B000-0AA073FCC843\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"6F611F78-9D39-4970-B43B-D634203D6F2A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71D909B9-5B11-401E-8484-D6CD39D64142\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"49E144D2-93D7-4F19-8C96-50CB5BA0FBCE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8124725E-8340-43BC-BEBB-BC39E3AE7368\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F0D8F03D-511A-42FC-8A89-0C69A4BC0D13\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E74DB8D8-B79B-4DAE-BF88-98C1F518E76D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"DA114A88-569D-4B50-A908-2CD30EF15D74\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"765DECDB-4234-4444-B78F-01C1DCBAD8FA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"DC685D61-7F81-4877-A5A4-E1AE0D2298BC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50A677CE-4360-4780-ABF9-466C45CB19E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"CE87339F-65FC-4BFA-9C5F-6E1E7CA08E2F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9C97D56-2E3C-4F36-89E2-BC169AED3CC2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"B2D46DE3-626E-407D-A5CA-B05E32F1B6C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E26EE1D-763F-4893-9997-F4C1CE7A1089\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F600F290-8723-42BE-9E6A-587132ECE8F4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C324F7E3-2088-452F-B049-519A9D25C9B5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F1E85841-5E82-4D66-B7E7-C8AE8A11E1BB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04042998-72B6-4215-9264-CC563E51D9CF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"1BCAC9EF-CCF9-4BD2-AADD-A3F48B95B52C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4882366A-9450-47BE-BE70-CC3A9D2F5275\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"F214C861-ECCF-4734-9866-E237F5CC5D53\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B402FBC0-91FC-471D-9D8A-C71F4FECF338\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"6791A301-2164-4F44-8B03-91B96BE2CDD0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DB2B761-E591-42B6-B62F-63A6D41F4FAC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"03FF785B-6274-4092-9E43-3396F4FE8CAD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"0C38DF13-3C4A-4CB5-9205-74670FC0C8E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"76E523C7-CF2B-430B-829E-D803AA1CDE62\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA6035EA-0F55-4C76-9E2F-DD4938576D1A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"ADCEE83B-369D-4F38-AE97-9ABD11A20DAA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36E534B2-12EA-489B-A939-4F1965B5EC66\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"54B4BEBC-BC5E-4003-9B34-E2A6896F509D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"0CF964C5-4CA9-4D81-B60E-2BEDEF47E571\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C0F8958-8059-411B-86C8-40B1073C80C6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"30B99E44-30D9-4AF1-97D5-EA2DCAF6E825\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"218D6018-551C-46B8-AE27-F88E6052F37B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"41879534-43D0-476A-931C-2E8B187D456E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAB8DE78-E398-458B-98EF-EEEB6E219BAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"975C54C6-B3B0-4C89-9C35-05BBEF6E75C7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E443C685-F000-4F89-ADEA-7084138018D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"A1DC345D-BEB3-409A-803C-D7FE72EFB073\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0779C5EE-C145-4C28-8F60-EE692409102D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"23C93EF7-4851-4E4E-A600-BAD62254D707\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF4D4AD6-C5FD-40D8-B002-2B784EC88B89\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"D89D488C-0582-4338-8848-EEA8DB6AC2DC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40273E59-7C60-4094-B9FC-A633A2F23E61\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"00F8E3E4-55D4-43A7-8564-167A2A32DED1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14A201E5-0603-4C96-8F4B-87934B7B99D7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"1BA5FC05-98F4-4A8C-91E0-703784F5970C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1A9D4D4-EF09-4862-B62A-94913AEFA2BE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"A55371BC-B4A3-4E56-AE2E-63BD3D5835D2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0093FE2A-3D4C-4435-AE35-D213C9700771\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"A7C44E0B-336B-466C-85E0-F92626456CED\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B84D71EE-64CC-4966-98D1-C0697816120A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.4.7.0\", \"versionEndExcluding\": \"1.4.9.4\", \"matchCriteriaId\": \"7E12126E-E0E3-479D-B5FA-578683C70050\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E99C3C2-0B98-4108-8102-80132BF47A32\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el framework web de Cisco Small Business Managed Switches Software podr\\u00eda permitir que un atacante remoto sin autenticar lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a una validaci\\u00f3n de entrada insuficiente de par\\u00e1metros que se pasan al servidor web del sistema afectado. Un atacante podr\\u00eda explotar esta vulnerabilidad convenciendo a un usuario de que acceda a un enlace malicioso o interceptando e inyectando c\\u00f3digo en una petici\\u00f3n de usuario. Un exploit con \\u00e9xito podr\\u00eda permitir que el atacante ejecute c\\u00f3digo script arbitrario en el contexto de la interfaz web afectada o que acceda a informaci\\u00f3n sensible del navegador. Esta vulnerabilidad afecta a los siguientes productos de Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches y Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.\"}]",
      "id": "CVE-2017-12307",
      "lastModified": "2024-11-21T03:09:16.587",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2018-01-18T06:29:00.207",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/102718\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/102718\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-12307\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2018-01-18T06:29:00.207\",\"lastModified\":\"2024-11-21T03:09:16.587\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el framework web de Cisco Small Business Managed Switches Software podr\u00eda permitir que un atacante remoto sin autenticar lleve a cabo un ataque de Cross-Site Scripting (XSS) reflejado contra un usuario de dicha interfaz en el sistema afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de par\u00e1metros que se pasan al servidor web del sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad convenciendo a un usuario de que acceda a un enlace malicioso o interceptando e inyectando c\u00f3digo en una petici\u00f3n de usuario. Un exploit con \u00e9xito podr\u00eda permitir que el atacante ejecute c\u00f3digo script arbitrario en el contexto de la interfaz web afectada o que acceda a informaci\u00f3n sensible del navegador. Esta vulnerabilidad afecta a los siguientes productos de Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches y Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"E62A8CD6-FD0B-4F93-A521-A574470806AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79843C24-2CE8-4040-9C04-79902D8F741D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"2E28746B-DDAF-48C3-98D2-6DF02F10402B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD650E51-E248-4CFD-8163-72717B66D675\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"7DB647C6-4F49-44B3-B5DC-1CB4B2808809\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B36A173-5C14-4B38-B3DD-CD83B19AF94B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"D42E184D-0BB9-4632-A910-7223EF5846DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4432E33-8F3C-4C51-8AE3-C53333A867E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"4D9AE8D4-8324-47DE-8A1B-002F04791CF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500F9351-FA0C-4648-A2A6-ACFF6C8FD157\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"4D3EAE27-6D3D-427E-B94B-E65FF60A477F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8122322F-6104-4978-9E00-40437365FF67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"1FA8309E-218A-4EBB-86CB-53568F87AE03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11548FB9-ADB1-4281-B89B-6D61836072DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"18D13620-A801-4837-A2D9-D8BB5EC67C8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF58ED1-AECE-435C-8F8F-6053C44E01C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"FC203EBF-AADC-4536-A3A8-8FAD7EF49F66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2BE66F3-51C8-42D8-927A-5BA0B9B072EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"3250E1B1-3478-4089-8D4D-210CF5382396\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DE3B15-DD70-445E-936C-0C9D5C3F1450\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"1C40A90E-B0CC-4713-858A-CE98FA73A59A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C65522C-E250-408C-8A89-AFE4909804D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"CA0176C1-1AC1-4A05-B2C7-E1E4C76A61FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9620FE5-567B-4B78-910D-14819E2CDE3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"59267A4D-846E-4E07-9158-7AB7AE6A8754\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEA8A38-C545-49AA-812F-8668EED9B23D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"FCFACA27-EBA0-44A2-ADDB-16701EE476A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F986FD6-A139-43CA-9D83-40CAA8D62B32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"8CB0A209-D8D2-48E9-9A83-A4EFFD5EBDC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB21D371-D443-40FE-8DFF-3DD4A9655471\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"BE38A4A5-81FC-4A79-8E8F-F6B288ED2283\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FC4FC7-5DF4-4FE5-87A5-3B897FAFD72E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"B981B6EB-AAEE-4B4E-86B1-005E11D1DB30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9879BE9-D4FA-4EEA-8852-B972299220E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"3D496D2D-84AF-47A4-BC5E-607C7E5E6DF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"613300D2-A079-415A-B9F7-178B8048AA61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"19A38D74-522F-4001-97C8-8F3D33AC9DC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA11905-1953-4EEB-95CE-3BDB619D0F72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"03436FAE-7FBF-4C4A-9EE4-3FD94316ED25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D1DE6B-6E09-40CF-9507-867ECB183A30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"6961B4DB-F152-43A6-9440-6655BCAD379F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D9BEB5-78FE-49EB-92BE-6597E7608E71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"2E912AC1-B82E-406B-8480-720223F2FD74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFEDE246-7DF9-486D-A5B9-5596FE0AC582\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"438E02A3-D177-4476-80DA-0C95C783B161\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52D0E9C-FC04-4A45-81D5-A335B30F725E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"CA6AE9A9-61D3-4CE4-B1D3-029734397956\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CAD50CE-8D02-4FD9-965A-7C14D146B52D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"142DCA4A-57D6-48C0-ADD9-749E9B8464D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39E214D-A4B7-460C-9402-8F94336B30A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"D7CEC74C-D5FE-45CA-83A1-15F771958993\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297A662D-BD11-4021-8F19-946CA4BCF8D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"46470295-0C82-4D37-A9CE-722CAEED6008\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADB1D69-CBDC-4045-A806-087878560EF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"9162932E-4570-4A6C-8634-1D756EF42C7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81B88075-F579-492C-B87C-5E4291D269B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"FAB16572-975A-473E-8EDA-757BE49CDFCF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605B8DE5-56EB-4FFF-BC04-1B3A38762727\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"662D1FD6-5DBB-4DC3-A11E-00AA87A3DF19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C940275E-41A8-470D-AD97-AB6EC5A75CEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F584E122-98B8-4F6F-92F1-4A6C83C3B934\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"235AAB5A-9D0A-4864-89E2-D69D1D8A79D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F6B8D73B-BEF3-4006-9ED4-5C8F98B479D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967DCE55-B7D5-4D63-9693-B42FAA9243B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F96925BF-73FC-454B-9B00-632EB2A1E1E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA6BED3-2564-4A7C-91DC-F843E301A35E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"752F1EF7-FA82-4B8E-B8B6-5939270DB705\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53C2EAA-CD47-4D76-BBC6-C59D531AB1D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"FB932882-F8F9-44ED-A673-9A07211D5D7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDF26D7-B3B5-47CA-94E9-B14BEFE02318\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"857756BD-B680-43EE-9FDB-F5FD56D7A1AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3AC0655-0F02-4397-881F-CFB6DAC3AA3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"28F46707-41BD-4118-933D-1FF48045880E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C374EB87-A4C6-43FB-B42E-DEA973375EC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"37DB9ADA-FCCF-407A-A18D-530FF0815551\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903E59DA-DE59-4CD4-BE32-B91DDA1DA07D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"A4B89E91-97B0-47EE-BC1E-D0A0098C8C92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A6AFC45-9ECC-4D4A-80BF-20F49C83A57A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:esw2-350g-52_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"50CB4BA4-E815-4506-A6FE-21B1F41EEEDF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esw2-350g-52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6812853E-C083-4841-A467-91130ED194BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:esw2-350g-52dc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"666E6BEC-32C1-4361-AF78-3B5739D38378\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esw2-350g-52dc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26A7AB18-C75F-4C63-9132-140EFC46E3C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:esw2-550x-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"5803FD62-086B-4316-BDFC-331156C208FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esw2-550x-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B70093-E9FE-410A-973E-CE847F08F43A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:esw2-550x-48dc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"4015A3F7-5706-40E9-84AD-A81D9205B2CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esw2-550x-48dc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3503F68-CF84-468E-9A40-9F98875DD1C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"98827546-CA39-4D4E-9C0F-D3B020BE08D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFFEF3C3-0C7C-4359-A45F-00152ACAB545\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"D4B42742-D701-4AE9-A833-189FB6708FC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19890DBE-F1B9-4454-8738-AC2AC6704C75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"D3E798EF-99B0-4D76-B0F2-6FB9499FCF8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"3A289E57-D99E-4A61-BEE3-91A43F156030\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD7CDE3-7247-4EA9-8A72-7ABC961BD895\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"A415AFE8-B965-45B7-B01F-E3F8F79F8EDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E7B70CB-9D7A-4637-8A51-634157F7AC85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"AD23FB5D-9A7F-4A03-A269-A6FE486677D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5248F85-411D-4ED9-983C-A28A90C8FC70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"61764001-8BCD-4D43-9324-9ADED2F2890C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6F6741-AA56-47EA-998C-78FD7F6B01CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"A61B9373-76C9-4EFC-B4AF-EB8833310750\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C96B794-16D3-46FE-8A2B-262BD38994E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"58E2227C-F7C1-424A-B5C5-5C4BDF052521\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5307DEF-DCD1-417A-B649-FF4DCE66193E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"3E2BDD45-5A8B-494A-A9BE-597ABD9B16D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"B8982BA5-8ABD-4235-8D24-90F4C949C583\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9054C3D1-BA1A-4BAC-8834-88673B804E4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"FDB31016-63A8-4436-A4A5-605E79071A71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B44981-5C59-4328-A7DB-FBF50F9C92C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"1BC8B43A-27FD-4188-9247-11796701FF22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D5109D-C78B-4362-B000-0AA073FCC843\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"6F611F78-9D39-4970-B43B-D634203D6F2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D909B9-5B11-401E-8484-D6CD39D64142\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"49E144D2-93D7-4F19-8C96-50CB5BA0FBCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8124725E-8340-43BC-BEBB-BC39E3AE7368\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F0D8F03D-511A-42FC-8A89-0C69A4BC0D13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74DB8D8-B79B-4DAE-BF88-98C1F518E76D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"DA114A88-569D-4B50-A908-2CD30EF15D74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"765DECDB-4234-4444-B78F-01C1DCBAD8FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"DC685D61-7F81-4877-A5A4-E1AE0D2298BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50A677CE-4360-4780-ABF9-466C45CB19E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"CE87339F-65FC-4BFA-9C5F-6E1E7CA08E2F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C97D56-2E3C-4F36-89E2-BC169AED3CC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"B2D46DE3-626E-407D-A5CA-B05E32F1B6C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E26EE1D-763F-4893-9997-F4C1CE7A1089\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F600F290-8723-42BE-9E6A-587132ECE8F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C324F7E3-2088-452F-B049-519A9D25C9B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F1E85841-5E82-4D66-B7E7-C8AE8A11E1BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04042998-72B6-4215-9264-CC563E51D9CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"1BCAC9EF-CCF9-4BD2-AADD-A3F48B95B52C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4882366A-9450-47BE-BE70-CC3A9D2F5275\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"F214C861-ECCF-4734-9866-E237F5CC5D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B402FBC0-91FC-471D-9D8A-C71F4FECF338\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"6791A301-2164-4F44-8B03-91B96BE2CDD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB2B761-E591-42B6-B62F-63A6D41F4FAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"03FF785B-6274-4092-9E43-3396F4FE8CAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"0C38DF13-3C4A-4CB5-9205-74670FC0C8E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"76E523C7-CF2B-430B-829E-D803AA1CDE62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6035EA-0F55-4C76-9E2F-DD4938576D1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"ADCEE83B-369D-4F38-AE97-9ABD11A20DAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E534B2-12EA-489B-A939-4F1965B5EC66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"54B4BEBC-BC5E-4003-9B34-E2A6896F509D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FE0E3E-5AB4-4BBA-A787-072799BF3EAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"0CF964C5-4CA9-4D81-B60E-2BEDEF47E571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C0F8958-8059-411B-86C8-40B1073C80C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"30B99E44-30D9-4AF1-97D5-EA2DCAF6E825\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"218D6018-551C-46B8-AE27-F88E6052F37B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"41879534-43D0-476A-931C-2E8B187D456E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB8DE78-E398-458B-98EF-EEEB6E219BAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"975C54C6-B3B0-4C89-9C35-05BBEF6E75C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E443C685-F000-4F89-ADEA-7084138018D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"A1DC345D-BEB3-409A-803C-D7FE72EFB073\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0779C5EE-C145-4C28-8F60-EE692409102D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"23C93EF7-4851-4E4E-A600-BAD62254D707\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4D4AD6-C5FD-40D8-B002-2B784EC88B89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"D89D488C-0582-4338-8848-EEA8DB6AC2DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40273E59-7C60-4094-B9FC-A633A2F23E61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"00F8E3E4-55D4-43A7-8564-167A2A32DED1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A201E5-0603-4C96-8F4B-87934B7B99D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"1BA5FC05-98F4-4A8C-91E0-703784F5970C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A9D4D4-EF09-4862-B62A-94913AEFA2BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"A55371BC-B4A3-4E56-AE2E-63BD3D5835D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0093FE2A-3D4C-4435-AE35-D213C9700771\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"A7C44E0B-336B-466C-85E0-F92626456CED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B84D71EE-64CC-4966-98D1-C0697816120A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.4.7.0\",\"versionEndExcluding\":\"1.4.9.4\",\"matchCriteriaId\":\"7E12126E-E0E3-479D-B5FA-578683C70050\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E99C3C2-0B98-4108-8102-80132BF47A32\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/102718\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102718\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/102718\", \"name\": \"102718\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T18:36:56.096Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-12307\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-02T18:55:49.326877Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-02T19:00:49.720Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Cisco Small Business 300 and 500 Series Managed Switches\", \"versions\": [{\"status\": \"affected\", \"version\": \"Cisco Small Business 300 and 500 Series Managed Switches\"}]}], \"datePublic\": \"2018-01-18T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/102718\", \"name\": \"102718\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2018-01-18T10:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Cisco Small Business 300 and 500 Series Managed Switches\"}]}, \"product_name\": \"Cisco Small Business 300 and 500 Series Managed Switches\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\", \"name\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb1\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/102718\", \"name\": \"102718\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-79\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-12307\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2017-12307\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-02T21:46:55.055Z\", \"dateReserved\": \"2017-08-03T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2018-01-18T06:00:00\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.