cve-2019-12658
Vulnerability from cvelistv5
Published
2019-09-25 20:16
Modified
2024-09-16 20:27
Severity ?
EPSS score ?
Summary
Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco IOS XE Software 16.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:39.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190925 Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-fsdos" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software 16.1.1", "vendor": "Cisco", "versions": [ { "lessThan": "n/a", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-25T20:16:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190925 Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-fsdos" } ], "source": { "advisory": "cisco-sa-20190925-iosxe-fsdos", "defect": [ [ "CSCvf80363" ] ], "discovery": "INTERNAL" }, "title": "Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-09-25T16:00:00-0700", "ID": "CVE-2019-12658", "STATE": "PUBLIC", "TITLE": "Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS XE Software 16.1.1", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "20190925 Cisco IOS XE Software Filesystem Exhaustion Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-fsdos" } ] }, "source": { "advisory": "cisco-sa-20190925-iosxe-fsdos", "defect": [ [ "CSCvf80363" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-12658", "datePublished": "2019-09-25T20:16:01.470908Z", "dateReserved": "2019-06-04T00:00:00", "dateUpdated": "2024-09-16T20:27:39.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-12658\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2019-09-25T21:15:10.953\",\"lastModified\":\"2020-10-08T14:06:19.807\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de administraci\u00f3n de recursos del sistema de archivos del Software Cisco IOS XE, podr\u00eda permitir a un atacante remoto no autenticado agotar los recursos del sistema de archivos en un dispositivo afectado y cause una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a la gesti\u00f3n ineficaz de los recursos del sistema de archivos subyacentes. Un atacante podr\u00eda explotar esta vulnerabilidad al llevar a cabo acciones espec\u00edficas que resulten en el env\u00edo de mensajes a archivos de registro espec\u00edficos del sistema operativo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante agotar el espacio disponible del sistema de archivos en un dispositivo afectado. Esto podr\u00eda causar que el dispositivo se bloquee y se recargue, resultando en una condici\u00f3n DoS para los clientes cuyo tr\u00e1fico de red transita por el dispositivo. Tras la recarga del dispositivo, el espacio del sistema de archivos afectado se borra y el dispositivo volver\u00e1 a la operaci\u00f3n normal. Sin embargo, la explotaci\u00f3n continua de esta vulnerabilidad podr\u00eda causar bloqueos forzosos y recargas posteriores, lo que podr\u00eda conllevar a una condici\u00f3n DoS extendida.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D4F634-03D5-4D9F-901C-7E9CE45F2F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1100_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"302ACA9E-10A1-4BB0-82BA-BA77A2DD8CF0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4221_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AE2BDB7-BABB-47D6-BF86-3FCA640E2CED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0A86DD-0377-472E-B2E7-C4CED9180465\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E8972E-357F-4484-B9D3-D1E2363C8DFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E0B3CA9-E237-4D5A-8C2D-C90E34BFD23C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4431_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF50955-A90A-4A25-8DDF-98455DC1CD37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4451-x_integrated_services_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A4475D-D42C-48C0-ACF8-F052F39B64A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91209C16-A620-44A0-9134-8AA456343F29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33208B25-0CBB-4E31-A892-60B7B5625155\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241EEBD9-76E4-4AE6-96B8-1C1ACD834F17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC03A84F-C8F2-4225-9A00-8FA35368CD57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51F2A755-556C-4C5E-8622-96D124319AF7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA873342-542E-4FC8-9C22-B5A43F9F3E9D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_900_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15A2D364-18BE-49BC-8473-FC33D37AFCC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97DDC45-ABD1-4C8F-A249-0865345637A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"456C68A8-F3C8-4302-B55A-134979B42045\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C6733C-F77B-4688-B051-C1557F4D8D41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489F97AB-5C6D-4AFE-BE5A-ABF7F9ED8B66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31608C12-FBED-4EAD-96EC-48BC4B356B77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D21D9A5-DE8F-4C55-B03F-35C04C270A40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CC6206-DF19-4636-84C2-8912E443D122\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE95FEC1-12F3-44FC-B922-CD18CADB42FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE37BC85-7758-4412-A5E6-0F1A19E8776B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2A5355-BF40-437C-8683-A7A81DEE362C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F4B90E-3499-45D4-864D-18505E2149F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE5FCCFF-E491-474F-9B86-AB51D8244582\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8464F8-D6D2-4165-ADE8-B40F7D8556C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61007628-A81B-43E0-86DE-1F7DDAD9F1A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A369CD35-1242-4556-A83D-BD69CC149CFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"784A1499-1F33-493D-B433-EB2550C03C19\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFC88D-5480-46E4-BF74-E11A514A8BDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54D16A8-0407-41E3-9599-9A6F57E1AA75\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF3818CC-8653-4A9E-A57B-950A15914D6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EDC790B-B42D-45DB-ACF5-A789F76C2BC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A6BC84-91F2-437D-9D2E-F8B3F5966767\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F331F13-5D05-4213-B442-D48D8E22287B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E312F4-90DA-40E4-BCD1-92F41BEEEECF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA32EA3F-946D-430D-B00F-939D828DD72C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D239A09C-34D2-4418-B538-03A1080B8479\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C84561E-DD99-4433-9EF2-083F7C300123\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29871BE-CA7D-4108-B46A-CBD539C9A2B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39CD9189-6524-4157-B90E-FF6A81DE3599\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF1B702-643A-4AF2-B0AD-3C540CF85F2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96269625-CB31-4850-872B-B2C1321B13B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDE086A-3FE5-46E3-BD66-23D0AE5089BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA53775A-D3ED-4D34-8338-A384DBEB94E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7D4522-D6BB-467F-AF5D-4D753A89D524\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C680534-C663-40B0-A4AA-7F292EE60FE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF4F233-7B47-46ED-BDC5-A589BCFC0B39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A528EC0-4650-4787-BE52-A588E7E38A31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53898E96-03D6-43A2-AE05-46C62464BD26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465917E5-8BF0-4BBB-85A0-DE8F516880C9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9FA66D9-E465-406E-A95C-608A1BE34D74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1456B204-A2A5-4790-A684-7F50D692EC9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD715BDD-7C74-4785-BEDF-75918F6FB37A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD10664-94D0-48C0-92EF-E8EA66841245\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"071A47F9-FF35-4F2C-BF5D-897CAC8BC08A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E988448-36C9-47E0-9356-DA400EB824E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D067EF9-00DB-4979-B12E-55749059A083\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9FA300A-44B1-44EE-8111-C1296EB0B638\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8598A543-B30B-4BD4-9974-F432FFFDCDD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DEBBAD-D28D-4784-BBD8-9FAD1710A919\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC516-6B48-4D77-B26D-FA097AC91D1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7437E4-5C09-436C-AFBC-F6B6747A4339\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBC0277-4990-4DE7-AD80-20E8A6F561D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7DAF69-662B-4999-A6AD-AA528B53EAF7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28306B1-3DDE-4444-9784-522B3D2163EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9257D187-1F2D-40F4-8C87-78978DB56C3F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4C0250-DA0D-4CEE-99F4-C211163C6653\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D453BF6-AB9F-4D47-B4DF-C25C67358FFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2A8413-DF92-4690-8BC1-A21001BDF76B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882B8D8F-E154-45C3-BB47-5353167C9776\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54B4EB4-EB41-4522-B7AB-C30F96099EA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD7BE51-0BA6-4750-B274-A6E33D32B484\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2305B8A-B8F2-4AF4-A86A-EFF11541D62D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C3EF8E-DF88-46DC-8E06-B009F346D1D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E87F823-D924-4718-AD81-248A6C619531\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA01B5E-9E7B-4EE6-9480-A82B753BBB82\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC866C9-BB98-4320-9FFA-F0960C560DA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AD7495-3DA2-4596-9620-CD36D7C561AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E492F3F8-4188-41E4-9A84-5E30C4AC3378\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718F2FDC-9EA4-4C4C-8821-B15E56AF8101\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC04072A-9BBE-4A9D-AE39-054D93E0C6D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45BCCD0-65BB-431F-B448-221C1595CD92\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F33BA722-0680-4074-8D03-41657F8CDCC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431570C7-74A1-4F7E-8FD0-690AEF0F823B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D22E15-E1E8-4115-A55F-5743CA9C5947\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B240B20-CF48-4A72-9653-9D04D59C1391\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D6AC73-67C9-4FA2-A361-FF08B0E3AF47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58430463-EA77-4DC9-ACDE-4DCF92CA2FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CCD143-3D6E-4880-B275-ECF5B04238C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D3784F-C572-4A6F-83B9-BCF64D339BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09C466B-CE87-4A57-B40B-88C94BAAF36B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D58FF034-8E07-4518-A858-5F16F22217E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376AD386-373D-4B24-966F-D11F76C9020F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2280CAA3-03F6-4168-8E50-A6B7132A3B0E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0C1174-C789-4547-9899-F7FCD0905F92\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC366801-655A-403B-ACD9-3BB43802A3C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD50BB2-BFD8-42F2-8C23-0D95187B01F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05D4D7E4-B195-46D8-8A6B-6AA4B8357618\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39600E51-4A21-4E5B-9FF9-E7C00AE86646\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D6D50-D0FA-4527-BED3-52560DDD5253\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"965BF315-D833-4711-97FC-512151113367\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0ADEBE-3DA2-4850-8115-0AC937FB0A94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04072C0F-78A2-4D10-87B2-52DC2537BA89\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD5C080E-D5C4-47B2-A46C-4EB3051C5221\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CEBEE0-DA67-4EE5-9BCF-263843053A8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD262F58-C47F-439E-A9FF-D1C60120D306\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0972076B-5C87-44B3-90EC-4C200B89318A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74AED057-2458-4DE0-8D51-ABD766D07F68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"033ED443-80E7-4012-9825-07AAC0D44B96\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F3CC6-A349-47B1-B282-B6458683C191\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB24EF21-1C10-48A7-BC68-FFC842A28D12\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED0625A2-BF14-4552-83D8-AEE0A04EA023\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A263CFF2-A659-405B-90EA-51E49B25C6D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEFBD449-217D-4569-99F7-D56B853A3E07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED16A65-9AFF-4825-95D1-162FBA0F566D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82D345E7-8208-41AC-B11A-4425D29E98A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E386D461-F1C1-4970-B056-D6119E74D449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99F3A466-F665-4132-ABC4-2DFC0A7E2B55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E5DCFD5-2B46-4D06-9E4C-B2325F440F02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5508320-8318-41A8-8026-4A61907C1CD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD337D8-8C72-4025-A8C3-E63598DE7BDB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"176ACF88-6112-4179-8492-50C50577B300\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c3850-12x48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9D6819-2CFC-428A-8C51-F0D4C55D5B29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c3850-12x48u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3ECDFFB-DAD1-4BF6-85E1-1E8F94F991EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c3850-12x48u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80AC0C7-6E96-4A72-B330-33BAF004B4C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-12q-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D09786E-BB71-4ECA-878A-2CD33EE2DFF2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-12q-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32A2AD4E-27B8-4022-90D5-34DA597B55E1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-24q-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC50F73C-5026-44E0-AE29-E8AD3A112FC6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-24q-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FF0D66-D25B-4240-883D-8B02B17DB1A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-40x-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45233420-4380-4D64-B46D-D400A7224CA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c9500-40x-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7925AF68-4E36-4281-A710-070DD4BEDA8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:cloud_services_r_1000v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A13060E3-38B5-4124-B88B-A57507A06415\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs_4201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C5ECF8-EFFE-4C27-8DCB-2533BFD5200F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs_4202:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C23248-3D61-4BAF-9602-BA31FB4374DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs_4206:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36494B4-8E2D-4399-97B5-725792BD5C45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0819EF17-5102-45FF-96AD-85BE17FD6921\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:network_convergence_system_520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A35D05-30AC-460F-ADBF-5B7EB0801ACD\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-fsdos\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.