cve-2021-1392
Vulnerability from cvelistv5
Published
2021-03-24 20:07
Modified
2024-11-08 23:33
Summary
Cisco IOS and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability
Impacted products
CiscoCisco IOS
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:16.883Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210324 Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1392",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T20:19:39.666026Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-08T23:33:05.994Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-522",
              "description": "CWE-522",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-24T20:07:19",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210324 Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68"
        }
      ],
      "source": {
        "advisory": "cisco-sa-XE-SAP-OPLbze68",
        "defect": [
          [
            "CSCvu58224"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-03-24T16:00:00",
          "ID": "CVE-2021-1392",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-522"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210324 Cisco IOS  and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-XE-SAP-OPLbze68",
          "defect": [
            [
              "CSCvu58224"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1392",
    "datePublished": "2021-03-24T20:07:19.109626Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-08T23:33:05.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-1392\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2021-03-24T20:15:14.057\",\"lastModified\":\"2023-11-07T03:28:11.307\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en los permisos de comando de la CLI del Software Cisco IOS y Cisco IOS XE, podr\u00eda permitir a un atacante local autenticado recuperar la contrase\u00f1a para el Protocolo industrial com\u00fan (CIP) y luego configurar remotamente el dispositivo como un usuario administrativo.\u0026#xa0;Esta vulnerabilidad se presenta porque los permisos incorrectos est\u00e1n asociados con el comando de la CLI show cip security.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al emitir el comando para recuperar la contrase\u00f1a de CIP en un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante reconfigurar el dispositivo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46EC35AA-4BD3-4FBB-878D-3313D37D9AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svt1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BD52DF-E396-415D-B46E-A8814579A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D601E90-6F2A-4C66-97A2-152031C88DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72782F95-948D-489B-A19A-9DAB825DFE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0F2B2A-F273-4166-826F-88B54A480BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CB7858-C857-41E2-9E5D-9368EEC2825E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"681E360E-2287-4BE7-8228-77C235DFA901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81800178-449A-4B61-9611-5FB2FC4DBC75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7316ED4-FABD-49E0-AA21-394D327435F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A56EF3-4E88-4220-846A-A9BE1E496311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0687FD87-BAED-4776-9B94-3C9EA7CCE79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7582DA8C-2360-4E8C-90F8-6194F269CD1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5BDAB63-EA0E-486D-B146-7E0060F70066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF92BEC-AA46-46DF-8C1E-956F3E506E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C226FE9-61A0-4873-B277-1B8ADB397B32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5BD905-75C3-47AE-8D19-6225BD808B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DE452A-6852-4879-9187-8A152E6E260E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3047E4-BCC3-41A7-9DCD-15C25D14EC44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785E177-C04E-4170-9C35-B4259D14EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAE727E-E552-4222-8FF0-6146A813BDEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7850295-C728-4448-ABA7-D01397DBBE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C104A47-53EE-47FC-BAE5-21925BEE98E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09A26FF-6A8F-4D73-B3E8-0333F994D1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65589A68-58A4-4BD4-8A26-C629AE610953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A64C8F-6380-47CA-8116-E3438B953F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE38B2F-F6AB-44E2-89BE-F71796FE1942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD28874B-148A-4299-9AA1-67A550B25F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B80CBC-961F-4EE8-A998-C0A827151EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7131776-5DEB-4B96-8483-B81B538E24FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE991877-18E0-4374-A441-C2316085CCA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757EB1A1-4764-4108-9AB1-F33CF9CEE574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7551128E-9E23-4C42-A681-6BE64D284C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C12918-E5BB-465E-9DA4-06B7351DD805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7a\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1374E243-4EC2-4A81-991C-B5705135CAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7b\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECA6101-94BA-4209-8243-A56AF02963EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71493AA2-49E9-4FF5-AC29-DC2426973EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F96295-2E72-4C23-B973-791B4A2B63F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8555124-BAFA-45D4-8208-ED1172D55F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B9D9B5-807F-494B-9ED2-7F4BDB32432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089D71A-8D46-4819-80E9-8A29BCA47EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21678FDA-D2B4-4041-A52D-C7AA562FD086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E532352-99A6-4E45-B0E7-7F04DA411820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC643B-AA58-42EA-A777-52FCF6065F9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFB57C3-6CDF-46D1-858D-D5234956653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330125E6-3645-40B5-8E64-009B622090B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D874DF-54A1-47C7-B3D9-A9CE41A42418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1485E3A5-A586-408A-8325-7572779DD0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2244E538-6B35-44E0-B93E-60B773745A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DB6B2A-19D2-4684-B07F-5D42EC850A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC1C381-4795-4992-BE3C-9615E005DE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80188F84-30DE-46AC-8E0C-984126B77CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECBF0A9-D84F-40A2-AC61-A9C59C819787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F129CF-FB92-49E9-BD86-90DDB8218FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C288D58-F765-4403-BF18-CC0A62B1AA60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1046E19B-DB53-418A-BFEC-5CD4492E6626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0062D992-D990-4EC9-BABD-2EFFF84254D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC81B74C-4F63-46E8-ACF4-EB707853580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C779C9-3B83-4B26-8942-B8475FB3B5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ACA99D-5784-4F5F-AB83-F55DF8774E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB9F99-8751-442B-9419-C2AB522D2ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E33FD88-8183-40EF-97A1-2766A4BBFBE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D7D48C-9FA1-45DB-B206-437E8ECBF53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3626B216-43E8-4E60-96E5-7CAA0CB67F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9B59D8B-E71A-4671-BA0B-00E56498E280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956C0089-E5AE-4289-B6D7-A8AB3C39AAA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333468BC-41F0-46ED-9561-D7D2CE6AC267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DBAA17-61D7-4EE4-A70D-A7200DF36C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF17EADC-5812-47FD-A243-287837CEC1E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8CF99C-B097-4964-B07C-FBB28EB37681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA4B81F-7FCA-4666-8602-F6C77A4673E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2403659-B7AD-40CE-AF88-FE2BEF0929E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1F53B1-E9FA-4480-8314-C531073B25CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"498030A3-0AFF-4D74-98D6-74C9447E5B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDCBDB71-59D7-481E-84FF-8772930F857B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)je:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2955A319-04AC-4D0C-80B7-0C90503908C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0EF13B6-A743-41D1-BB31-F17C3586C8AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37875B18-434B-4218-BAAF-2B593E188180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BAC234-D00C-4407-A1FE-E45A14D1BDAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C42E2869-F179-49B7-A4E8-0F4E8EA953CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A58711A-F8C9-4F25-97D7-AE8AE64F3912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE3ECC04-345F-4DAE-98F7-04E082BAEC3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A919122-DE62-4032-80DF-F77C1D80B387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68958043-1212-42AF-A205-DB731ED55114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84AE6EB6-EF3F-4DE2-ABEC-71F9010BFF0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf12i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD6F56B5-BE84-434D-AEC8-EB0764A832FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06216CEE-F15D-4B31-A5A3-B2C226E2D25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB02DEB-81D4-4A05-BDD5-3B8BC7184159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18C3383-28B0-435E-AF08-9739DADAE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jh1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C9CA39-3515-4226-8453-0B5FC62546D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1658FFCF-7433-4AFB-9D59-BD6CC14A4D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CA6116-2C6B-431B-BA88-63B180A00DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2377350-7B69-4C49-889A-D63A3E4C1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2913C352-E21F-4ECE-8A13-BA21CC00D02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD90F4A-2A86-4A98-A157-D93C382717A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jj1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1739E9AD-154D-40C2-A761-F7133BC06C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA700809-C25D-49F8-B930-7459F8AE9DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEB7B3E-4E91-477F-BD62-9A28578CCA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C5D255-C0FE-47E6-A920-3539306F9845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8DF3B4-A424-4B70-9116-28E2C4DFB776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4677B840-6636-4D8C-9E1C-47FEB8F3116A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"917D5477-E47E-4A01-979A-C9A0993BE34B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E6CCE7-88BB-4F4F-9253-EC67B5076767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D6C6EE-CFD9-49A9-8784-498560847737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5187A9D2-A057-40E7-84E1-89BE32AFA95C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEE60A6-9E75-4B20-A06D-411E774511B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1451BB33-6BE0-4F4A-A193-14E13DECEE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0FC09E-8C60-4EAC-B729-3BE3524E6F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD355DC3-51F1-4CEA-98B1-E08EEE03BFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4071E320-789E-4E1D-982B-C265F4228FEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC38DE9-5D5D-452A-AC42-C1D24418FDB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3CD43-F30A-484B-9285-D925C1262212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F807A36A-9363-40F1-9B20-E5C4D503EB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200C1CD-DEAB-44FD-970D-098F3E01F36B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E71841-512D-483C-A911-86EA745AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB655C5-2D7B-4ED5-89D6-4ED613CF3934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE556AB-093C-4992-8F5B-F240526AAA64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA0BCD1-4E75-4F39-B960-4B6B1B357442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17F3285-80E8-4BE5-8704-3379CF326601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9669DF61-DDC5-498D-906A-494D56BAE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B0502B-3363-4F3C-A147-8888B894635B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689327CA-F302-49FC-9365-F09E4A60E8FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"571ECF0D-06C6-4371-891C-FB68A3093F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A38CF1F-37D9-4CBD-8B98-C24637FF7F56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0886F6DC-C590-48A0-BE27-6CD778EB37FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8552242D-0A93-4841-83F9-EA4D7F58938E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45D0EFD-784A-4CDB-8FDB-41F6869B4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942CC01D-ED6E-4731-A61B-75CDF219F760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59CA018E-5160-40AE-953D-9559F23D2EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA595EF-8718-4477-8EEC-EA948C14F091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13763901-2D7B-485D-A957-E30587BCEB88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B213166-77E2-4E13-8769-FA8AF6EEC33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3C0371-223A-433C-B8A3-C24A499EB82F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A066A001-830B-4407-A5CD-AB99059C190E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B45095-526D-4BC5-A16B-6B5741F07FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"930678B3-1527-4967-9D8F-27FC0DA060AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A34268-7618-48D2-8872-27B5B624543B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2017A75-CC29-4161-85CB-7A531E5ABB3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AD00E6-A155-4CCB-B329-7B536BEBC976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355F4945-4FFA-469F-A799-815F371C637B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1432B59F-5A66-4A5A-B3F7-E297700ED9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A964D-ABC8-424D-8097-85B832A833BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314C7763-A64D-4023-9F3F-9A821AE4151F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53E377A-0296-4D7A-B97C-576B0026543D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9027A528-2588-4C06-810B-5BB313FE4323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5019B59-508E-40B0-9C92-2C26F58E2FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5750264-2990-4942-85F4-DB9746C5CA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9173AD6-6658-4267-AAA7-D50D0B657528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F02EE9D-45B1-43D6-B05D-6FF19472216B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E306B09C-CB48-4067-B60C-5F738555EEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89369318-2E83-489F-B872-5F2E247BBF8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.