Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-20727 (GCVE-0-2022-20727)
Vulnerability from cvelistv5 – Published: 2022-04-15 14:20 – Updated: 2024-09-16 19:30| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T02:24:49.697Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2022-04-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-15T14:20:48",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
],
"source": {
"advisory": "cisco-sa-iox-yuXQ6hFj",
"defect": [
[
"CSCvx27640",
"CSCvy16608",
"CSCvy30903",
"CSCvy30957",
"CSCvy35913",
"CSCvy35914",
"CSCvy86583",
"CSCvy86598",
"CSCvy86602",
"CSCvy86603",
"CSCvy86604",
"CSCvy86608"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOx Application Hosting Environment Vulnerabilities",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2022-04-13T16:00:00",
"ID": "CVE-2022-20727",
"STATE": "PUBLIC",
"TITLE": "Cisco IOx Application Hosting Environment Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "5.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
]
},
"source": {
"advisory": "cisco-sa-iox-yuXQ6hFj",
"defect": [
[
"CSCvx27640",
"CSCvy16608",
"CSCvy30903",
"CSCvy30957",
"CSCvy35913",
"CSCvy35914",
"CSCvy86583",
"CSCvy86598",
"CSCvy86602",
"CSCvy86603",
"CSCvy86604",
"CSCvy86608"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20727",
"datePublished": "2022-04-15T14:20:48.801391Z",
"dateReserved": "2021-11-02T00:00:00",
"dateUpdated": "2024-09-16T19:30:51.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:cgr1000_compute_module:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.15.0.1\", \"matchCriteriaId\": \"A8557E8C-5F01-4610-B906-17B4F92197C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.4.1\", \"matchCriteriaId\": \"79411876-DA0F-4EC7-8883-A67287B9BFA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.5.9\", \"matchCriteriaId\": \"9DCCD576-D734-4722-96CF-28B66DB591AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E027FB12-862F-413E-AA2B-4BBD90AE3650\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B78669-3B28-4F1D-993D-85282A7D0E96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1758F264-96F9-4EE9-9CA9-AD5407885547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6437E689-A049-4D48-AB7A-49CA7EBDE8B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4C12918-E5BB-465E-9DA4-06B7351DD805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4862C453-8BD7-4D53-B2D6-CE3E44A4915A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF662E36-0831-4892-850F-844B0E0B54DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E71F49D-E405-4AB4-9188-DA7B338DFD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"204B0A52-F6AB-406B-B46D-E92F2D7D87F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BBF8B70-DFBE-4F6E-83F0-171F03E97606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA55D660-66C6-4278-8C27-25DB2712CC1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5609B342-D98E-4850-A0FE-810699A80A1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8320F23D-F6BE-405B-B645-1CEB984E8267\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7C5C705-6A8C-4834-9D24-CFE26A232C15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691BA27E-77AB-4A30-916D-3BB916B05298\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC270E40-CABA-44B4-B4DD-E9C47A97770B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC1DB8C1-7F7D-4562-A317-87E925CAD524\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1887D9-E339-4DC6-BE24-A5FF15438B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB2645F-C3BF-458F-9D07-6D66E1953730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"686FD45C-7722-4D98-A6D7-C36CAC56A4AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"871E33AC-B469-47BA-9317-DC9E3E9BF5C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4091CAC-BFAA-404C-A827-4DA9EADDF621\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0DA9FCA-4166-4084-96AF-E82CC4A4DB25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m6b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"369A99E0-3451-41D1-8C56-5352EA689950\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33D4A7FA-E4E0-49C2-97FD-A547A1612F75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA0B918F-A28C-4B5A-A566-6E588B4F6696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"436114F2-D906-4469-99C4-10B75253B3D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C8A00BF-4522-467B-A96E-5C33623DCA2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A434E7-B27C-4663-BE83-39A650D22D26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47C106CF-CBD3-4630-8E77-EDB1643F97E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1DB7943-5CE1-44F6-B093-5EA65BF71A59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64404B00-4956-47B8-ACDB-88E365E97212\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FE6A696-5CBC-4552-A54E-55C21BC74D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41237041-1D82-4C6C-BF48-ECEDF9DB08C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m4b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAB72CA3-088E-4EFE-BE1C-190C64101851\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA584AC4-96AB-4026-84DF-F44F3B97F7E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22EB41FD-4DE2-4753-A18C-C877B81B51D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"158EDE62-04C9-471B-B243-309D49583E67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8609F10-2B43-4BDC-AAF1-80D589910EF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"270A1FF4-8541-4026-AE2D-7D500DC401E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A58C01B-459E-432F-A49F-68EC45EE6E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4125EE35-ED52-4350-A4CE-E90EA8ED6BAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56AD5BA0-4D08-4A92-88BE-60AF29BC35CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"198FF520-7631-49D9-B8A8-2E64F6237CC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94E067E8-552B-4691-9F6A-C5E8766287BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C4162EC-90DE-4194-8ABC-55CCB8C24FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"405CC56E-574F-4983-B492-C8811FAF06E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1829074-66F9-4B3B-A084-B88D838CFC44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6715A135-61A7-4E56-948D-8A8D5F7C98C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C836C26-DBC1-42CB-9B73-9F248D4F2B6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2CC4602-D1F5-4843-991A-2903C8336251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BCCD64D-D73C-45FE-B49C-F79E23431B37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0807458A-2453-4575-AE19-0DE15E04B88C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A1AF57E-79E9-40F2-817A-5E7D2760F1E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEF9CEA3-054B-4469-A10F-DFCB9057E5E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8313597-49A9-4918-B8D5-8E53C5C9AFAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31D6B0E4-92F1-42FD-92DA-887D3D38CEBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13C6DA27-2445-4850-B0EF-82EE8C01C0B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"296636F1-9242-429B-8472-90352C056106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77993343-0394-413F-ABF9-C1215E9AD800\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"283971DD-DD58-4A76-AC2A-F316534ED416\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F324A5-4830-482E-A684-AB3B6594CEAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8120196-8648-49D0-8262-CD4C9C90C37A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E7CCE2-C685-4019-9B55-B3BECB3E5F76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0699DD6E-BA74-4814-93AB-300329C9D032\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2E2D781-2684-45F1-AC52-636572A0DCA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"479FB47B-AF2E-4FCB-8DE0-400BF325666C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF2B4C78-5C31-4F3D-9639-305E15576E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13CB889F-B064-4CAC-99AC-903745ACA566\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77E8AF15-AB46-4EAB-8872-8C55E8601599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"957318BE-55D4-4585-AA52-C813301D01C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F11B703-8A0F-47ED-AA70-951FF78B94A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE7B2557-821D-4E05-B5C3-67192573D97D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"187F699A-AF2F-42B0-B855-27413140C384\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62EDEC28-661E-42EF-88F0-F62D0220D2E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9B825E6-5929-4890-BDBA-4CF4BD2314C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65020120-491D-46CD-8C73-974B6F4C11E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ADDCD0A-6168-45A0-A885-76CC70FE2FC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F35C623-6043-43A6-BBAA-478E185480CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D83E34F4-F4DD-49CC-9C95-93F9D4D26B42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2833EAE-94C8-4279-A244-DDB6E2D15DC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B688E46-5BAD-4DEC-8B13-B184B141B169\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C8F50DB-3A80-4D89-9F7B-86766D37338B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F13F583-F645-4DF0-A075-B4F19D71D128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01B53828-C520-4845-9C14-6C7D50EAA3A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F23DB7-6F8E-470A-9B43-0ACEEF331C38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"623BF701-ADC9-4F24-93C5-043A6A7FEF5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5311FBE-12BF-41AC-B8C6-D86007834863\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FB055E-72F9-4CB7-A51D-BF096BD1A55D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FBD681F-7969-42BE-A47E-7C287755DCB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98255E6F-3056-487D-9157-403836EFB9D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"521ACFB0-4FB2-44DB-AD7B-C27F9059DE66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57D4F634-03D5-4D9F-901C-7E9CE45F2F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4463A1D1-E169-4F0B-91B2-FA126BB444CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDD58C58-1B0C-4A71-8C02-F555CEF9C253\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96852D16-AF50-4C70-B125-D2349E6765D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A15B882A-BA60-4932-A55E-F4A798B30EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C9C585C-A6EC-4385-B915-046C110BF95F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47DBE4ED-1CD8-4134-9B33-17A91F44F17B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"119A964D-ABC8-424D-8097-85B832A833BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0375BF9E-D04B-4E5B-9051-536806ECA44E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2266E5A2-B3F6-4389-B8E2-42CB845EC7F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"012A6CF7-9104-4882-9C95-E6D4458AB778\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78DE7780-4E8B-4BB6-BDEB-58032EC65851\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F29CEE37-4044-4A3C-9685-C9C021FD346A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5292764A-7D1C-4E04-86EF-809CB68EDD25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F84AE35F-D016-4B8F-8FE2-C2ACB200DFED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4BF9829-F80E-4837-A420-39B291C4E17B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D07F9539-CFBE-46F7-9F5E-93A68169797D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5AB80E7-0714-44ED-9671-12C877B36A1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10182B94-6831-461E-B0FC-9476EAB6EBEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"961F8312-31B9-44E7-8858-EF8E2134F447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D62EE1B-9A59-406C-B7DF-91B495F3ECFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79CF8D4E-F82A-469C-A8C2-0C203A800A05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D136D2BC-FFB5-4912-A3B1-BD96148CB9A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CD5B3AB-27C2-4055-A3B7-0112D089FDA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04081A51-E08F-4114-9276-584E836181D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A46516-CEB7-48D4-879B-341963A1FA31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6EF98FA-6DF9-4935-9639-143E08462BC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A443E93-6C4B-4F86-BA7C-7C2A929E795A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"314C7763-A64D-4023-9F3F-9A821AE4151F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5820D71D-FC93-45AA-BC58-A26A1A39C936\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B53E377A-0296-4D7A-B97C-576B0026543D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C98DED36-D4B5-48D6-964E-EEEE97936700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD98C9E8-3EA6-4160-970D-37C389576516\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9027A528-2588-4C06-810B-5BB313FE4323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7745ED34-D59D-49CC-B174-96BCA03B3374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19AF4CF3-6E79-4EA3-974D-CD451A192BA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"313BD54C-073C-4F27-82D5-C99EFC3A20F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93B96E01-3777-4C33-9225-577B469A6CE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5019B59-508E-40B0-9C92-2C26F58E2FBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5750264-2990-4942-85F4-DB9746C5CA2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9173AD6-6658-4267-AAA7-D50D0B657528\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F02EE9D-45B1-43D6-B05D-6FF19472216B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FCB9440-F470-45D1-AAFA-01FB5D76B600\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F66ECFE-B631-47AE-995F-024A4E586A85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E306B09C-CB48-4067-B60C-5F738555EEAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD446C51-E713-4E46-8328-0A0477D140D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89369318-2E83-489F-B872-5F2E247BBF8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B4D4659-A304-459F-8AB3-ED6D84B44C0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51FA707-8DB1-4596-9122-D4BFEF17F400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C04DF35A-1B6F-420A-8D84-74EB41BF3700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"211CC9B2-6108-4C50-AB31-DC527C43053E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08DCCBA3-82D2-4444-B5D3-E5FC58D024F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"128F95D7-E49F-4B36-8F47-823C0298449E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E21B3881-37E9-4C00-9336-12C9C28D1B61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E54599DB-A85E-4EEA-9985-2CBF90E28A08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4046C325-7EDB-4C95-AA98-541BEC8F9E0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5B70A3D-CBE1-4218-A7B4-F85741A57BD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B270A04-9961-4E99-806B-441CD674AFBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1360069D-0358-4746-8C3F-44C2A40988D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5DD2403-113B-4100-8BD4-90E1927E6648\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A35FFA44-9A59-4C20-9D86-C40B68BD5F77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DDB1E60-C2A9-4570-BE80-F3D478A53738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9841799A-87E2-46AE-807A-824981EAB35A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CEF022B-271F-4017-B74B-82748D5EBA01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A6B707B-4543-41F1-83DF-49A93BF56FB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC8F611B-D347-4A21-90E6-56CF4D8A35A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9A92CE4-B4B0-4C14-AE11-8DFE511406F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298C82F9-79A6-4DB7-8432-8B3A6DA39620\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"274E3E6F-4280-4EAE-B102-1BE57FE1F1D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46B52A51-51DB-4A12-AB1D-8D9605226599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"938B0720-8CA7-43BA-9708-5CE9EC7A565A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BE7166-DBD3-4CE6-A14A-725FE896B85E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DE62C4B-7C06-4907-BADE-416C1618D2D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades en el entorno de alojamiento de aplicaciones Cisco IOx en varias plataformas de Cisco podr\\u00edan permitir a un atacante inyectar comandos arbitrarios en el sistema operativo anfitri\\u00f3n subyacente, ejecutar c\\u00f3digo arbitrario en el sistema operativo anfitri\\u00f3n subyacente, instalar aplicaciones sin estar autenticado o conducir un ataque de tipo cross-site scripting (XSS) contra un usuario del software afectado. Para m\\u00e1s informaci\\u00f3n sobre estas vulnerabilidades, consulte la secci\\u00f3n Details de este aviso\"}]",
"id": "CVE-2022-20727",
"lastModified": "2024-11-21T06:43:25.583",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-04-15T15:15:13.613",
"references": "[{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-20727\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2022-04-15T15:15:13.613\",\"lastModified\":\"2024-11-21T06:43:25.583\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en el entorno de alojamiento de aplicaciones Cisco IOx en varias plataformas de Cisco podr\u00edan permitir a un atacante inyectar comandos arbitrarios en el sistema operativo anfitri\u00f3n subyacente, ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n subyacente, instalar aplicaciones sin estar autenticado o conducir un ataque de tipo cross-site scripting (XSS) contra un usuario del software afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Details de este aviso\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:cgr1000_compute_module:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.15.0.1\",\"matchCriteriaId\":\"A8557E8C-5F01-4610-B906-17B4F92197C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.1\",\"matchCriteriaId\":\"79411876-DA0F-4EC7-8883-A67287B9BFA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.5.9\",\"matchCriteriaId\":\"9DCCD576-D734-4722-96CF-28B66DB591AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758F264-96F9-4EE9-9CA9-AD5407885547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6437E689-A049-4D48-AB7A-49CA7EBDE8B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C12918-E5BB-465E-9DA4-06B7351DD805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4862C453-8BD7-4D53-B2D6-CE3E44A4915A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF662E36-0831-4892-850F-844B0E0B54DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E71F49D-E405-4AB4-9188-DA7B338DFD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"204B0A52-F6AB-406B-B46D-E92F2D7D87F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBF8B70-DFBE-4F6E-83F0-171F03E97606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA55D660-66C6-4278-8C27-25DB2712CC1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5609B342-D98E-4850-A0FE-810699A80A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8320F23D-F6BE-405B-B645-1CEB984E8267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C5C705-6A8C-4834-9D24-CFE26A232C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691BA27E-77AB-4A30-916D-3BB916B05298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC270E40-CABA-44B4-B4DD-E9C47A97770B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1DB8C1-7F7D-4562-A317-87E925CAD524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1887D9-E339-4DC6-BE24-A5FF15438B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB2645F-C3BF-458F-9D07-6D66E1953730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686FD45C-7722-4D98-A6D7-C36CAC56A4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871E33AC-B469-47BA-9317-DC9E3E9BF5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4091CAC-BFAA-404C-A827-4DA9EADDF621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0DA9FCA-4166-4084-96AF-E82CC4A4DB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m6b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369A99E0-3451-41D1-8C56-5352EA689950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D4A7FA-E4E0-49C2-97FD-A547A1612F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0B918F-A28C-4B5A-A566-6E588B4F6696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436114F2-D906-4469-99C4-10B75253B3D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8A00BF-4522-467B-A96E-5C33623DCA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A434E7-B27C-4663-BE83-39A650D22D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47C106CF-CBD3-4630-8E77-EDB1643F97E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DB7943-5CE1-44F6-B093-5EA65BF71A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64404B00-4956-47B8-ACDB-88E365E97212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE6A696-5CBC-4552-A54E-55C21BC74D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41237041-1D82-4C6C-BF48-ECEDF9DB08C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m4b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB72CA3-088E-4EFE-BE1C-190C64101851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA584AC4-96AB-4026-84DF-F44F3B97F7E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EB41FD-4DE2-4753-A18C-C877B81B51D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158EDE62-04C9-471B-B243-309D49583E67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8609F10-2B43-4BDC-AAF1-80D589910EF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"270A1FF4-8541-4026-AE2D-7D500DC401E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A58C01B-459E-432F-A49F-68EC45EE6E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4125EE35-ED52-4350-A4CE-E90EA8ED6BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56AD5BA0-4D08-4A92-88BE-60AF29BC35CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"198FF520-7631-49D9-B8A8-2E64F6237CC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E067E8-552B-4691-9F6A-C5E8766287BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4162EC-90DE-4194-8ABC-55CCB8C24FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"405CC56E-574F-4983-B492-C8811FAF06E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1829074-66F9-4B3B-A084-B88D838CFC44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6715A135-61A7-4E56-948D-8A8D5F7C98C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C836C26-DBC1-42CB-9B73-9F248D4F2B6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2CC4602-D1F5-4843-991A-2903C8336251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCCD64D-D73C-45FE-B49C-F79E23431B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0807458A-2453-4575-AE19-0DE15E04B88C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A1AF57E-79E9-40F2-817A-5E7D2760F1E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF9CEA3-054B-4469-A10F-DFCB9057E5E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8313597-49A9-4918-B8D5-8E53C5C9AFAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31D6B0E4-92F1-42FD-92DA-887D3D38CEBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C6DA27-2445-4850-B0EF-82EE8C01C0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.9\\\\(3\\\\)m4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"296636F1-9242-429B-8472-90352C056106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77993343-0394-413F-ABF9-C1215E9AD800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"283971DD-DD58-4A76-AC2A-F316534ED416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F324A5-4830-482E-A684-AB3B6594CEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8120196-8648-49D0-8262-CD4C9C90C37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E7CCE2-C685-4019-9B55-B3BECB3E5F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0699DD6E-BA74-4814-93AB-300329C9D032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E2D781-2684-45F1-AC52-636572A0DCA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479FB47B-AF2E-4FCB-8DE0-400BF325666C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2B4C78-5C31-4F3D-9639-305E15576E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13CB889F-B064-4CAC-99AC-903745ACA566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E8AF15-AB46-4EAB-8872-8C55E8601599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957318BE-55D4-4585-AA52-C813301D01C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F11B703-8A0F-47ED-AA70-951FF78B94A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B2557-821D-4E05-B5C3-67192573D97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187F699A-AF2F-42B0-B855-27413140C384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EDEC28-661E-42EF-88F0-F62D0220D2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B825E6-5929-4890-BDBA-4CF4BD2314C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65020120-491D-46CD-8C73-974B6F4C11E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADDCD0A-6168-45A0-A885-76CC70FE2FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F35C623-6043-43A6-BBAA-478E185480CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D83E34F4-F4DD-49CC-9C95-93F9D4D26B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2833EAE-94C8-4279-A244-DDB6E2D15DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B688E46-5BAD-4DEC-8B13-B184B141B169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8F50DB-3A80-4D89-9F7B-86766D37338B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F13F583-F645-4DF0-A075-B4F19D71D128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01B53828-C520-4845-9C14-6C7D50EAA3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F23DB7-6F8E-470A-9B43-0ACEEF331C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623BF701-ADC9-4F24-93C5-043A6A7FEF5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5311FBE-12BF-41AC-B8C6-D86007834863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FB055E-72F9-4CB7-A51D-BF096BD1A55D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FBD681F-7969-42BE-A47E-7C287755DCB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98255E6F-3056-487D-9157-403836EFB9D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521ACFB0-4FB2-44DB-AD7B-C27F9059DE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D4F634-03D5-4D9F-901C-7E9CE45F2F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4463A1D1-E169-4F0B-91B2-FA126BB444CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD58C58-1B0C-4A71-8C02-F555CEF9C253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96852D16-AF50-4C70-B125-D2349E6765D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15B882A-BA60-4932-A55E-F4A798B30EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9C585C-A6EC-4385-B915-046C110BF95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DBE4ED-1CD8-4134-9B33-17A91F44F17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A964D-ABC8-424D-8097-85B832A833BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0375BF9E-D04B-4E5B-9051-536806ECA44E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2266E5A2-B3F6-4389-B8E2-42CB845EC7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012A6CF7-9104-4882-9C95-E6D4458AB778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DE7780-4E8B-4BB6-BDEB-58032EC65851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29CEE37-4044-4A3C-9685-C9C021FD346A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5292764A-7D1C-4E04-86EF-809CB68EDD25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84AE35F-D016-4B8F-8FE2-C2ACB200DFED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BF9829-F80E-4837-A420-39B291C4E17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07F9539-CFBE-46F7-9F5E-93A68169797D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5AB80E7-0714-44ED-9671-12C877B36A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10182B94-6831-461E-B0FC-9476EAB6EBEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"961F8312-31B9-44E7-8858-EF8E2134F447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D62EE1B-9A59-406C-B7DF-91B495F3ECFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79CF8D4E-F82A-469C-A8C2-0C203A800A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D136D2BC-FFB5-4912-A3B1-BD96148CB9A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD5B3AB-27C2-4055-A3B7-0112D089FDA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04081A51-E08F-4114-9276-584E836181D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A46516-CEB7-48D4-879B-341963A1FA31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6EF98FA-6DF9-4935-9639-143E08462BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A443E93-6C4B-4F86-BA7C-7C2A929E795A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314C7763-A64D-4023-9F3F-9A821AE4151F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5820D71D-FC93-45AA-BC58-A26A1A39C936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53E377A-0296-4D7A-B97C-576B0026543D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD98C9E8-3EA6-4160-970D-37C389576516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9027A528-2588-4C06-810B-5BB313FE4323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7745ED34-D59D-49CC-B174-96BCA03B3374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AF4CF3-6E79-4EA3-974D-CD451A192BA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"313BD54C-073C-4F27-82D5-C99EFC3A20F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B96E01-3777-4C33-9225-577B469A6CE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5019B59-508E-40B0-9C92-2C26F58E2FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5750264-2990-4942-85F4-DB9746C5CA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9173AD6-6658-4267-AAA7-D50D0B657528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F02EE9D-45B1-43D6-B05D-6FF19472216B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FCB9440-F470-45D1-AAFA-01FB5D76B600\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F66ECFE-B631-47AE-995F-024A4E586A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E306B09C-CB48-4067-B60C-5F738555EEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD446C51-E713-4E46-8328-0A0477D140D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89369318-2E83-489F-B872-5F2E247BBF8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B4D4659-A304-459F-8AB3-ED6D84B44C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51FA707-8DB1-4596-9122-D4BFEF17F400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04DF35A-1B6F-420A-8D84-74EB41BF3700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"211CC9B2-6108-4C50-AB31-DC527C43053E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DCCBA3-82D2-4444-B5D3-E5FC58D024F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"128F95D7-E49F-4B36-8F47-823C0298449E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E21B3881-37E9-4C00-9336-12C9C28D1B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54599DB-A85E-4EEA-9985-2CBF90E28A08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4046C325-7EDB-4C95-AA98-541BEC8F9E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B70A3D-CBE1-4218-A7B4-F85741A57BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B270A04-9961-4E99-806B-441CD674AFBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1360069D-0358-4746-8C3F-44C2A40988D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5DD2403-113B-4100-8BD4-90E1927E6648\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A35FFA44-9A59-4C20-9D86-C40B68BD5F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDB1E60-C2A9-4570-BE80-F3D478A53738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9841799A-87E2-46AE-807A-824981EAB35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CEF022B-271F-4017-B74B-82748D5EBA01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6B707B-4543-41F1-83DF-49A93BF56FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC8F611B-D347-4A21-90E6-56CF4D8A35A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A92CE4-B4B0-4C14-AE11-8DFE511406F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298C82F9-79A6-4DB7-8432-8B3A6DA39620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"274E3E6F-4280-4EAE-B102-1BE57FE1F1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46B52A51-51DB-4A12-AB1D-8D9605226599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938B0720-8CA7-43BA-9708-5CE9EC7A565A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BE7166-DBD3-4CE6-A14A-725FE896B85E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE62C4B-7C06-4907-BADE-416C1618D2D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
GSD-2022-20727
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-20727",
"description": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.",
"id": "GSD-2022-20727"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-20727"
],
"details": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.",
"id": "GSD-2022-20727",
"modified": "2023-12-13T01:19:16.124886Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2022-04-13T16:00:00",
"ID": "CVE-2022-20727",
"STATE": "PUBLIC",
"TITLE": "Cisco IOx Application Hosting Environment Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "5.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20220413 Cisco IOx Application Hosting Environment Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
]
},
"source": {
"advisory": "cisco-sa-iox-yuXQ6hFj",
"defect": [
[
"CSCvx27640",
"CSCvy16608",
"CSCvy30903",
"CSCvy30957",
"CSCvy35913",
"CSCvy35914",
"CSCvy86583",
"CSCvy86598",
"CSCvy86602",
"CSCvy86603",
"CSCvy86604",
"CSCvy86608"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:cgr1000_compute_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8557E8C-5F01-4610-B906-17B4F92197C6",
"versionEndExcluding": "1.15.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79411876-DA0F-4EC7-8883-A67287B9BFA0",
"versionEndExcluding": "1.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCCD576-D734-4722-96CF-28B66DB591AA",
"versionEndExcluding": "6.5.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
"matchCriteriaId": "691BA27E-77AB-4A30-916D-3BB916B05298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
"matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
"matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
"matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "4B688E46-5BAD-4DEC-8B13-B184B141B169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "012A6CF7-9104-4882-9C95-E6D4458AB778",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
"matchCriteriaId": "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "89369318-2E83-489F-B872-5F2E247BBF8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "A35FFA44-9A59-4C20-9D86-C40B68BD5F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "298C82F9-79A6-4DB7-8432-8B3A6DA39620",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en el entorno de alojamiento de aplicaciones Cisco IOx en varias plataformas de Cisco podr\u00edan permitir a un atacante inyectar comandos arbitrarios en el sistema operativo anfitri\u00f3n subyacente, ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n subyacente, instalar aplicaciones sin estar autenticado o conducir un ataque de tipo cross-site scripting (XSS) contra un usuario del software afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Details de este aviso"
}
],
"id": "CVE-2022-20727",
"lastModified": "2024-01-10T18:51:52.693",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2,
"source": "ykramarz@cisco.com",
"type": "Secondary"
}
]
},
"published": "2022-04-15T15:15:13.613",
"references": [
{
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
],
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "ykramarz@cisco.com",
"type": "Secondary"
}
]
}
}
}
}
FKIE_CVE-2022-20727
Vulnerability from fkie_nvd - Published: 2022-04-15 15:15 - Updated: 2024-11-21 06:436.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | cgr1000_compute_module | * | |
| cisco | ic3000_industrial_compute_gateway | * | |
| cisco | ir510_operating_system | * | |
| cisco | ios | 15.2\(5\)e1 | |
| cisco | ios | 15.2\(6\)e0a | |
| cisco | ios | 15.2\(6\)e1 | |
| cisco | ios | 15.2\(6\)e2a | |
| cisco | ios | 15.2\(7\)e | |
| cisco | ios | 15.2\(7\)e0b | |
| cisco | ios | 15.2\(7\)e0s | |
| cisco | ios | 15.6\(1\)t1 | |
| cisco | ios | 15.6\(1\)t2 | |
| cisco | ios | 15.6\(1\)t3 | |
| cisco | ios | 15.6\(2\)t | |
| cisco | ios | 15.6\(2\)t0a | |
| cisco | ios | 15.6\(2\)t1 | |
| cisco | ios | 15.6\(2\)t2 | |
| cisco | ios | 15.6\(2\)t3 | |
| cisco | ios | 15.6\(3\)m | |
| cisco | ios | 15.6\(3\)m0a | |
| cisco | ios | 15.6\(3\)m1 | |
| cisco | ios | 15.6\(3\)m1a | |
| cisco | ios | 15.6\(3\)m1b | |
| cisco | ios | 15.6\(3\)m2 | |
| cisco | ios | 15.6\(3\)m2a | |
| cisco | ios | 15.6\(3\)m3 | |
| cisco | ios | 15.6\(3\)m3a | |
| cisco | ios | 15.6\(3\)m4 | |
| cisco | ios | 15.6\(3\)m5 | |
| cisco | ios | 15.6\(3\)m6 | |
| cisco | ios | 15.6\(3\)m6a | |
| cisco | ios | 15.6\(3\)m6b | |
| cisco | ios | 15.6\(3\)m7 | |
| cisco | ios | 15.6\(3\)m8 | |
| cisco | ios | 15.6\(3\)m9 | |
| cisco | ios | 15.7\(3\)m | |
| cisco | ios | 15.7\(3\)m0a | |
| cisco | ios | 15.7\(3\)m1 | |
| cisco | ios | 15.7\(3\)m2 | |
| cisco | ios | 15.7\(3\)m3 | |
| cisco | ios | 15.7\(3\)m4 | |
| cisco | ios | 15.7\(3\)m4a | |
| cisco | ios | 15.7\(3\)m4b | |
| cisco | ios | 15.7\(3\)m5 | |
| cisco | ios | 15.7\(3\)m6 | |
| cisco | ios | 15.7\(3\)m7 | |
| cisco | ios | 15.7\(3\)m8 | |
| cisco | ios | 15.7\(3\)m9 | |
| cisco | ios | 15.8\(3\)m | |
| cisco | ios | 15.8\(3\)m0a | |
| cisco | ios | 15.8\(3\)m0b | |
| cisco | ios | 15.8\(3\)m1 | |
| cisco | ios | 15.8\(3\)m1a | |
| cisco | ios | 15.8\(3\)m2 | |
| cisco | ios | 15.8\(3\)m2a | |
| cisco | ios | 15.8\(3\)m3 | |
| cisco | ios | 15.8\(3\)m3a | |
| cisco | ios | 15.8\(3\)m3b | |
| cisco | ios | 15.8\(3\)m4 | |
| cisco | ios | 15.8\(3\)m5 | |
| cisco | ios | 15.8\(3\)m6 | |
| cisco | ios | 15.8\(3\)m7 | |
| cisco | ios | 15.9\(3\)m | |
| cisco | ios | 15.9\(3\)m0a | |
| cisco | ios | 15.9\(3\)m1 | |
| cisco | ios | 15.9\(3\)m2 | |
| cisco | ios | 15.9\(3\)m2a | |
| cisco | ios | 15.9\(3\)m3 | |
| cisco | ios | 15.9\(3\)m3a | |
| cisco | ios | 15.9\(3\)m3b | |
| cisco | ios | 15.9\(3\)m4 | |
| cisco | ios | 15.9\(3\)m4a | |
| cisco | ios_xe | 16.3.1 | |
| cisco | ios_xe | 16.3.1a | |
| cisco | ios_xe | 16.3.2 | |
| cisco | ios_xe | 16.3.3 | |
| cisco | ios_xe | 16.3.4 | |
| cisco | ios_xe | 16.3.5 | |
| cisco | ios_xe | 16.3.5b | |
| cisco | ios_xe | 16.3.6 | |
| cisco | ios_xe | 16.3.7 | |
| cisco | ios_xe | 16.3.8 | |
| cisco | ios_xe | 16.3.9 | |
| cisco | ios_xe | 16.3.10 | |
| cisco | ios_xe | 16.3.11 | |
| cisco | ios_xe | 16.4.1 | |
| cisco | ios_xe | 16.4.2 | |
| cisco | ios_xe | 16.4.3 | |
| cisco | ios_xe | 16.5.1 | |
| cisco | ios_xe | 16.5.1a | |
| cisco | ios_xe | 16.5.1b | |
| cisco | ios_xe | 16.5.2 | |
| cisco | ios_xe | 16.5.3 | |
| cisco | ios_xe | 16.6.1 | |
| cisco | ios_xe | 16.6.2 | |
| cisco | ios_xe | 16.6.3 | |
| cisco | ios_xe | 16.6.4 | |
| cisco | ios_xe | 16.6.4a | |
| cisco | ios_xe | 16.6.4s | |
| cisco | ios_xe | 16.6.5 | |
| cisco | ios_xe | 16.6.5a | |
| cisco | ios_xe | 16.6.5b | |
| cisco | ios_xe | 16.6.6 | |
| cisco | ios_xe | 16.6.7 | |
| cisco | ios_xe | 16.6.7a | |
| cisco | ios_xe | 16.6.8 | |
| cisco | ios_xe | 16.6.9 | |
| cisco | ios_xe | 16.6.10 | |
| cisco | ios_xe | 16.7.1 | |
| cisco | ios_xe | 16.7.1a | |
| cisco | ios_xe | 16.7.1b | |
| cisco | ios_xe | 16.7.2 | |
| cisco | ios_xe | 16.7.3 | |
| cisco | ios_xe | 16.7.4 | |
| cisco | ios_xe | 16.8.1 | |
| cisco | ios_xe | 16.8.1a | |
| cisco | ios_xe | 16.8.1b | |
| cisco | ios_xe | 16.8.1c | |
| cisco | ios_xe | 16.8.1d | |
| cisco | ios_xe | 16.8.1e | |
| cisco | ios_xe | 16.8.1s | |
| cisco | ios_xe | 16.8.2 | |
| cisco | ios_xe | 16.8.3 | |
| cisco | ios_xe | 16.9.1 | |
| cisco | ios_xe | 16.9.1a | |
| cisco | ios_xe | 16.9.1b | |
| cisco | ios_xe | 16.9.1c | |
| cisco | ios_xe | 16.9.1d | |
| cisco | ios_xe | 16.9.1s | |
| cisco | ios_xe | 16.9.2 | |
| cisco | ios_xe | 16.9.2a | |
| cisco | ios_xe | 16.9.2s | |
| cisco | ios_xe | 16.9.3 | |
| cisco | ios_xe | 16.9.3a | |
| cisco | ios_xe | 16.9.3h | |
| cisco | ios_xe | 16.9.3s | |
| cisco | ios_xe | 16.9.4 | |
| cisco | ios_xe | 16.9.4c | |
| cisco | ios_xe | 16.9.5 | |
| cisco | ios_xe | 16.9.5f | |
| cisco | ios_xe | 16.9.6 | |
| cisco | ios_xe | 16.9.7 | |
| cisco | ios_xe | 16.9.8 | |
| cisco | ios_xe | 16.10.1 | |
| cisco | ios_xe | 16.10.1a | |
| cisco | ios_xe | 16.10.1b | |
| cisco | ios_xe | 16.10.1c | |
| cisco | ios_xe | 16.10.1d | |
| cisco | ios_xe | 16.10.1e | |
| cisco | ios_xe | 16.10.1f | |
| cisco | ios_xe | 16.10.1g | |
| cisco | ios_xe | 16.10.1s | |
| cisco | ios_xe | 16.10.2 | |
| cisco | ios_xe | 16.10.3 | |
| cisco | ios_xe | 16.11.1 | |
| cisco | ios_xe | 16.11.1a | |
| cisco | ios_xe | 16.11.1b | |
| cisco | ios_xe | 16.11.1c | |
| cisco | ios_xe | 16.11.1s | |
| cisco | ios_xe | 16.11.2 | |
| cisco | ios_xe | 16.12.1 | |
| cisco | ios_xe | 16.12.1a | |
| cisco | ios_xe | 16.12.1c | |
| cisco | ios_xe | 16.12.1s | |
| cisco | ios_xe | 16.12.1t | |
| cisco | ios_xe | 16.12.1w | |
| cisco | ios_xe | 16.12.1x | |
| cisco | ios_xe | 16.12.1y | |
| cisco | ios_xe | 16.12.2 | |
| cisco | ios_xe | 16.12.2a | |
| cisco | ios_xe | 16.12.2s | |
| cisco | ios_xe | 16.12.2t | |
| cisco | ios_xe | 16.12.3 | |
| cisco | ios_xe | 16.12.3a | |
| cisco | ios_xe | 16.12.3s | |
| cisco | ios_xe | 16.12.4 | |
| cisco | ios_xe | 16.12.4a | |
| cisco | ios_xe | 16.12.5 | |
| cisco | ios_xe | 16.12.5a | |
| cisco | ios_xe | 17.1.1 | |
| cisco | ios_xe | 17.1.1a | |
| cisco | ios_xe | 17.1.1s | |
| cisco | ios_xe | 17.1.1t | |
| cisco | ios_xe | 17.1.2 | |
| cisco | ios_xe | 17.1.3 | |
| cisco | ios_xe | 17.2.1 | |
| cisco | ios_xe | 17.2.1a | |
| cisco | ios_xe | 17.2.1r | |
| cisco | ios_xe | 17.2.1v | |
| cisco | ios_xe | 17.2.2 | |
| cisco | ios_xe | 17.2.3 | |
| cisco | ios_xe | 17.3.1 | |
| cisco | ios_xe | 17.3.1a | |
| cisco | ios_xe | 17.3.1w | |
| cisco | ios_xe | 17.3.1x | |
| cisco | ios_xe | 17.3.1z | |
| cisco | ios_xe | 17.3.2 | |
| cisco | ios_xe | 17.3.2a | |
| cisco | ios_xe | 17.3.3 | |
| cisco | ios_xe | 17.3.3a | |
| cisco | ios_xe | 17.3.4 | |
| cisco | ios_xe | 17.3.4a | |
| cisco | ios_xe | 17.3.4b | |
| cisco | ios_xe | 17.3.4c | |
| cisco | ios_xe | 17.4.1 | |
| cisco | ios_xe | 17.4.1a | |
| cisco | ios_xe | 17.4.1b | |
| cisco | ios_xe | 17.4.1c | |
| cisco | ios_xe | 17.4.2 | |
| cisco | ios_xe | 17.4.2a | |
| cisco | ios_xe | 17.5.1 | |
| cisco | ios_xe | 17.5.1a | |
| cisco | ios_xe | 17.6.1 | |
| cisco | ios_xe | 17.6.1a |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:cgr1000_compute_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8557E8C-5F01-4610-B906-17B4F92197C6",
"versionEndExcluding": "1.15.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79411876-DA0F-4EC7-8883-A67287B9BFA0",
"versionEndExcluding": "1.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCCD576-D734-4722-96CF-28B66DB591AA",
"versionEndExcluding": "6.5.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
"matchCriteriaId": "691BA27E-77AB-4A30-916D-3BB916B05298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
"matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
"matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
"matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "4B688E46-5BAD-4DEC-8B13-B184B141B169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "012A6CF7-9104-4882-9C95-E6D4458AB778",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
"matchCriteriaId": "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "89369318-2E83-489F-B872-5F2E247BBF8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "A35FFA44-9A59-4C20-9D86-C40B68BD5F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "298C82F9-79A6-4DB7-8432-8B3A6DA39620",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en el entorno de alojamiento de aplicaciones Cisco IOx en varias plataformas de Cisco podr\u00edan permitir a un atacante inyectar comandos arbitrarios en el sistema operativo anfitri\u00f3n subyacente, ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n subyacente, instalar aplicaciones sin estar autenticado o conducir un ataque de tipo cross-site scripting (XSS) contra un usuario del software afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Details de este aviso"
}
],
"id": "CVE-2022-20727",
"lastModified": "2024-11-21T06:43:25.583",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-15T15:15:13.613",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CISCO-SA-IOX-YUXQ6HFJ
Vulnerability from csaf_cisco - Published: 2022-04-13 16:00 - Updated: 2022-05-12 15:50Notes
{
"document": {
"acknowledgments": [
{
"summary": "Cisco would like to thank Cyrille CHATRAS of Orange group for reporting the following vulnerabilities: CVE-2022-20718, CVE-2022-20719, CVE-2022-20720, CVE-2022-20721, CVE-2022-20722, CVE-2022-20723, CVE-2022-20724, CVE-2022-20725.\r\n\r\nCVE-2022-20718 and CVE-2022-20720: These vulnerabilities were also found during internal security testing by X.B. of the Cisco Advanced Security Initiatives Group (ASIG).\r\n\r\nCVE-2022-20677: This vulnerability was found during internal security testing by X.B. of the Cisco ASIG."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n\r\n\r\nThis advisory is part of the April 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74561\"]",
"title": "Summary"
},
{
"category": "general",
"text": "At the time of publication, one of more of these vulnerabilities affected the following Cisco products if they were running a vulnerable software release:\r\n\r\n800 Series Industrial Integrated Services Routers (Industrial ISRs)\r\n800 Series Integrated Services Routers (ISRs)\r\n1000 Series Connected Grid Router (CGR1000) Compute Modules\r\nIC3000 Industrial Compute Gateways\r\nIndustrial Ethernet (IE) 4000 Series Switches\r\nIOS XE-based devices configured with IOx\r\nIR510 WPAN Industrial Routers\r\n\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following Cisco products:\r\n\r\nIOS XR Software\r\nMeraki products\r\nNX-OS Software",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nDetails about the vulnerabilities are as follows:\r\n\r\nCVE-2022-20718: Cisco IOx Application Hosting Environment Parameter Injection Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to execute a parameter injection using the Cisco IOx API.\r\n\r\nThis vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary code as root on the underlying host operating system.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy35913\r\nCVE ID: CVE-2022-20718\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.5\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\r\n\r\nCVE-2022-20719: Cisco IOx Application Hosting Environment Parameter Injection Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to execute a parameter injection using the Cisco IOx API.\r\n\r\nThis vulnerability is due to incomplete sanitization of parameters that are passed in as part of the IOx package descriptor. An attacker could exploit this vulnerability by crafting an IOx package descriptor file and then building and deploying an application in the Cisco IOx application hosting environment. A successful exploit could allow the attacker to execute arbitrary code as root on the underlying host operating system.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy86583\r\nCVE ID: CVE-2022-20719\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.5\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\r\n\r\nCVE-2022-20720: Cisco IOx Application Hosting Environment Path Traversal Vulnerability\r\n\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to read or write arbitrary data on the underlying host operating system.\r\n\r\nThis vulnerability exists because a real path check is not performed on the requested data. An attacker could exploit this vulnerability by creating a symbolic link within the deployed application and requesting data using the API. A successful exploit could allow the attacker to read or execute arbitrary code as root on the underlying host operating system.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy30957\r\nCVE ID: CVE-2022-20720\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.5\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\r\n\r\nCVE-2022-20723: Cisco IOx Application Hosting Environment Arbitrary Code Execution Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to execute arbitrary code on the underlying host operating system.\r\n\r\nThis vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary code as root on the underlying host operating system.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy86603\r\nCVE ID: CVE-2022-20723\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.5\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\r\n\r\nCVE-2022-20725: Cisco IOx Application Hosting Environment Cross-Site Scripting Vulnerability\r\n\r\nA vulnerability in the web-based Local Manager interface of the Cisco IOx application hosting environment could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based Local Manager interface of an affected device. The attacker must have valid Local Manager credentials.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based Local Manager interface. An attacker could exploit this vulnerability by injecting malicious code into a system settings tab. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy86608\r\nCVE ID: CVE-2022-20725\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.5\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N\r\n\r\nCVE-2022-20724: Cisco IOx Application Hosting Environment User Impersonation Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an unauthenticated, remote attacker to bypass authentication and impersonate another authenticated user session.\r\n\r\nThis vulnerability is due to a race condition for allocation of the token. An attacker could exploit this vulnerability by constantly trying a call to the upload API, and if the calls occur at the same time as an authorized administrator deploying an application, the attacker may race the token and be given the ability to bypass authentication. A successful exploit could allow the attacker to bypass authentication.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy86604\r\nCVE ID: CVE-2022-20724\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.3\r\nCVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2022-20726: Cisco IOx Application Hosting Environment Denial of Service Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Modules, and Cisco IC3000 Industrial Compute Gateways could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient error handling of socket operations. An attacker could exploit this vulnerability by sending a sustained rate of crated TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvx27640\r\nCVE ID: CVE-2022-20726\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.3\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\r\n\r\nCVE-2022-20677: Cisco IOS XE Software Privilege Escalation Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment in Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges from privilege level 15 to root on an affected device.\r\n\r\nThis vulnerability is due to incomplete file protection for the Cisco IOx application hosting environment. An attacker could exploit this vulnerability by modifying the file system with a crafted payload. A successful exploit could allow the attacker to execute arbitrary commands as root.\r\n\r\nBug ID(s): CSCvy30903 CSCvy16608\r\nCVE ID: CVE-2022-20677\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.1\r\nCVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\r\n\r\nCVE-2022-20727: Cisco IOx Application Hosting Environment Privilege Escalation\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, local attacker to gain escalated privileges.\r\n\r\nThis vulnerability is due to improper input validation when loading Cisco IOx applications. An attacker could exploit this vulnerability by modifying application content while a Cisco IOx application is loading. A successful exploit could allow the attacker to gain privileges equivalent to the root user.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy35914\r\nCVE ID: CVE-2022-20727\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.1\r\nCVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\r\n\r\nCVE-2022-20721: Cisco IOx Application Hosting Environment Arbitrary File Read Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient path validation of command arguments within the Cisco IOx API. An attacker could exploit this vulnerability by sending a crafted command request using the API. A successful exploit could allow the attacker to read the contents of any file that is located on the host device filesystem.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy86598\r\nCVE ID: CVE-2022-20721\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.9\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\r\n\r\nCVE-2022-20722: Cisco IOx Application Hosting Environment Path Traversal Vulnerability\r\n\r\nA vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to read arbitrary files from the underlying host filesystem.\r\n\r\nThis vulnerability is due to insufficient path validation of command arguments within the Cisco IOx API. An attacker could exploit this vulnerability by sending a crafted command request using the API. A successful exploit could allow the attacker to read the contents of any file that is located on the underlying host filesystem.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvy86602\r\nCVE ID: CVE-2022-20722\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.9\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities. However, there is a mitigation.\r\n\r\nCustomers who do not want to use the Cisco IOx application hosting environment can disable IOx permanently on the device by using the no iox configuration command.\r\n\r\nWhile this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.",
"title": "Workarounds"
},
{
"category": "general",
"text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n Cisco Platform First Fixed Release 800 Series Industrial ISRs Cisco IOS Software Release 15.9(3)M5 and later. 800 Series ISRs Not fixed; IOx has reached end of life on Cisco 800 Series ISRs. CGR1000 Compute Modules IOx image for CGR1000 Compute Module 1.15.0.1 IC3000 Industrial Compute Gateways Industrial Compute Gateway Software Release 1.4.1 IE 4000 Series Switches Not fixed; IOx has reached end of life on the Cisco IE 4000 Series Switches. IOS XE-based devices configured with IOx Cisco IOS XE Software releases:\r\n16.12(7) (All but CSCvy16608 are resolved in 16.12(6))\r\n17.3(5)\r\n17.6(2)\r\n17.7(1) and later\r\n For more information, see the Cisco IOS and IOS XE Software Checker section below. IR510 WPAN Industrial Routers IR510 Operating System 6.5.9\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "Cisco would like to thank Cyrille CHATRAS of Orange group for reporting the following vulnerabilities: CVE-2022-20718, CVE-2022-20719, CVE-2022-20720, CVE-2022-20721, CVE-2022-20722, CVE-2022-20723, CVE-2022-20724, CVE-2022-20725.\r\n\r\nCVE-2022-20718 and CVE-2022-20720: These vulnerabilities were also found during internal security testing by X.B. of the Cisco Advanced Security Initiatives Group (ASIG).\r\n\r\nCVE-2022-20677: This vulnerability was found during internal security testing by X.B. of the Cisco ASIG.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOx Application Hosting Environment Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Event Response: April 2022 Semiannual Cisco\u0026nbsp;IOS and IOS XE Software Security Advisory Bundled Publication.",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74561"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
}
],
"title": "Cisco IOx Application Hosting Environment Vulnerabilities",
"tracking": {
"current_release_date": "2022-05-12T15:50:29+00:00",
"generator": {
"date": "2024-05-10T23:13:49+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-iox-yuXQ6hFj",
"initial_release_date": "2022-04-13T16:00:00+00:00",
"revision_history": [
{
"date": "2022-04-13T15:41:15+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2022-05-12T15:50:29+00:00",
"number": "1.1.0",
"summary": "Removed individual product IDs from Fixed Software for Cisco IOS XE devices. Updated fixed release information for IR510 WPAN Industrial Router."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "15.2(5)E1",
"product": {
"name": "15.2(5)E1",
"product_id": "CSAFPID-220441"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2c",
"product": {
"name": "15.2(5)E2c",
"product_id": "CSAFPID-228151"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0a",
"product": {
"name": "15.2(6)E0a",
"product_id": "CSAFPID-230591"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1",
"product": {
"name": "15.2(6)E1",
"product_id": "CSAFPID-230592"
}
},
{
"category": "service_pack",
"name": "15.2(7)E",
"product": {
"name": "15.2(7)E",
"product_id": "CSAFPID-242313"
}
},
{
"category": "service_pack",
"name": "15.2(6)E2a",
"product": {
"name": "15.2(6)E2a",
"product_id": "CSAFPID-247630"
}
},
{
"category": "service_pack",
"name": "15.2(7)E0b",
"product": {
"name": "15.2(7)E0b",
"product_id": "CSAFPID-260993"
}
},
{
"category": "service_pack",
"name": "15.2(7)E0s",
"product": {
"name": "15.2(7)E0s",
"product_id": "CSAFPID-262300"
}
}
],
"category": "product_version",
"name": "15.2E"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.6(2)T",
"product": {
"name": "15.6(2)T",
"product_id": "CSAFPID-209115"
}
},
{
"category": "service_pack",
"name": "15.6(1)T1",
"product": {
"name": "15.6(1)T1",
"product_id": "CSAFPID-212445"
}
},
{
"category": "service_pack",
"name": "15.6(2)T1",
"product": {
"name": "15.6(2)T1",
"product_id": "CSAFPID-214938"
}
},
{
"category": "service_pack",
"name": "15.6(1)T2",
"product": {
"name": "15.6(1)T2",
"product_id": "CSAFPID-216215"
}
},
{
"category": "service_pack",
"name": "15.6(2)T0a",
"product": {
"name": "15.6(2)T0a",
"product_id": "CSAFPID-216239"
}
},
{
"category": "service_pack",
"name": "15.6(2)T2",
"product": {
"name": "15.6(2)T2",
"product_id": "CSAFPID-216962"
}
},
{
"category": "service_pack",
"name": "15.6(1)T3",
"product": {
"name": "15.6(1)T3",
"product_id": "CSAFPID-227613"
}
},
{
"category": "service_pack",
"name": "15.6(2)T3",
"product": {
"name": "15.6(2)T3",
"product_id": "CSAFPID-227914"
}
}
],
"category": "product_version",
"name": "15.6T"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.6(3)M",
"product": {
"name": "15.6(3)M",
"product_id": "CSAFPID-214074"
}
},
{
"category": "service_pack",
"name": "15.6(3)M1",
"product": {
"name": "15.6(3)M1",
"product_id": "CSAFPID-220396"
}
},
{
"category": "service_pack",
"name": "15.6(3)M0a",
"product": {
"name": "15.6(3)M0a",
"product_id": "CSAFPID-220522"
}
},
{
"category": "service_pack",
"name": "15.6(3)M1a",
"product": {
"name": "15.6(3)M1a",
"product_id": "CSAFPID-224327"
}
},
{
"category": "service_pack",
"name": "15.6(3)M1b",
"product": {
"name": "15.6(3)M1b",
"product_id": "CSAFPID-224443"
}
},
{
"category": "service_pack",
"name": "15.6(3)M2",
"product": {
"name": "15.6(3)M2",
"product_id": "CSAFPID-225667"
}
},
{
"category": "service_pack",
"name": "15.6(3)M2a",
"product": {
"name": "15.6(3)M2a",
"product_id": "CSAFPID-227172"
}
},
{
"category": "service_pack",
"name": "15.6(3)M3",
"product": {
"name": "15.6(3)M3",
"product_id": "CSAFPID-228142"
}
},
{
"category": "service_pack",
"name": "15.6(3)M3a",
"product": {
"name": "15.6(3)M3a",
"product_id": "CSAFPID-228959"
}
},
{
"category": "service_pack",
"name": "15.6(3)M4",
"product": {
"name": "15.6(3)M4",
"product_id": "CSAFPID-228965"
}
},
{
"category": "service_pack",
"name": "15.6(3)M5",
"product": {
"name": "15.6(3)M5",
"product_id": "CSAFPID-233074"
}
},
{
"category": "service_pack",
"name": "15.6(3)M6",
"product": {
"name": "15.6(3)M6",
"product_id": "CSAFPID-243311"
}
},
{
"category": "service_pack",
"name": "15.6(3)M7",
"product": {
"name": "15.6(3)M7",
"product_id": "CSAFPID-256429"
}
},
{
"category": "service_pack",
"name": "15.6(3)M6a",
"product": {
"name": "15.6(3)M6a",
"product_id": "CSAFPID-258582"
}
},
{
"category": "service_pack",
"name": "15.6(3)M6b",
"product": {
"name": "15.6(3)M6b",
"product_id": "CSAFPID-260802"
}
},
{
"category": "service_pack",
"name": "15.6(3)M8",
"product": {
"name": "15.6(3)M8",
"product_id": "CSAFPID-268474"
}
},
{
"category": "service_pack",
"name": "15.6(3)M9",
"product": {
"name": "15.6(3)M9",
"product_id": "CSAFPID-277254"
}
}
],
"category": "product_version",
"name": "15.6M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.7(3)M",
"product": {
"name": "15.7(3)M",
"product_id": "CSAFPID-228191"
}
},
{
"category": "service_pack",
"name": "15.7(3)M1",
"product": {
"name": "15.7(3)M1",
"product_id": "CSAFPID-228973"
}
},
{
"category": "service_pack",
"name": "15.7(3)M0a",
"product": {
"name": "15.7(3)M0a",
"product_id": "CSAFPID-230624"
}
},
{
"category": "service_pack",
"name": "15.7(3)M3",
"product": {
"name": "15.7(3)M3",
"product_id": "CSAFPID-231509"
}
},
{
"category": "service_pack",
"name": "15.7(3)M2",
"product": {
"name": "15.7(3)M2",
"product_id": "CSAFPID-231510"
}
},
{
"category": "service_pack",
"name": "15.7(3)M4",
"product": {
"name": "15.7(3)M4",
"product_id": "CSAFPID-244069"
}
},
{
"category": "service_pack",
"name": "15.7(3)M5",
"product": {
"name": "15.7(3)M5",
"product_id": "CSAFPID-256430"
}
},
{
"category": "service_pack",
"name": "15.7(3)M4a",
"product": {
"name": "15.7(3)M4a",
"product_id": "CSAFPID-258583"
}
},
{
"category": "service_pack",
"name": "15.7(3)M4b",
"product": {
"name": "15.7(3)M4b",
"product_id": "CSAFPID-260803"
}
},
{
"category": "service_pack",
"name": "15.7(3)M6",
"product": {
"name": "15.7(3)M6",
"product_id": "CSAFPID-268969"
}
},
{
"category": "service_pack",
"name": "15.7(3)M7",
"product": {
"name": "15.7(3)M7",
"product_id": "CSAFPID-277098"
}
},
{
"category": "service_pack",
"name": "15.7(3)M8",
"product": {
"name": "15.7(3)M8",
"product_id": "CSAFPID-280215"
}
},
{
"category": "service_pack",
"name": "15.7(3)M9",
"product": {
"name": "15.7(3)M9",
"product_id": "CSAFPID-281975"
}
}
],
"category": "product_version",
"name": "15.7M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.8(3)M",
"product": {
"name": "15.8(3)M",
"product_id": "CSAFPID-240653"
}
},
{
"category": "service_pack",
"name": "15.8(3)M1",
"product": {
"name": "15.8(3)M1",
"product_id": "CSAFPID-243330"
}
},
{
"category": "service_pack",
"name": "15.8(3)M0a",
"product": {
"name": "15.8(3)M0a",
"product_id": "CSAFPID-245741"
}
},
{
"category": "service_pack",
"name": "15.8(3)M0b",
"product": {
"name": "15.8(3)M0b",
"product_id": "CSAFPID-247679"
}
},
{
"category": "service_pack",
"name": "15.8(3)M2",
"product": {
"name": "15.8(3)M2",
"product_id": "CSAFPID-248832"
}
},
{
"category": "service_pack",
"name": "15.8(3)M1a",
"product": {
"name": "15.8(3)M1a",
"product_id": "CSAFPID-252911"
}
},
{
"category": "service_pack",
"name": "15.8(3)M3",
"product": {
"name": "15.8(3)M3",
"product_id": "CSAFPID-259870"
}
},
{
"category": "service_pack",
"name": "15.8(3)M2a",
"product": {
"name": "15.8(3)M2a",
"product_id": "CSAFPID-260804"
}
},
{
"category": "service_pack",
"name": "15.8(3)M4",
"product": {
"name": "15.8(3)M4",
"product_id": "CSAFPID-267415"
}
},
{
"category": "service_pack",
"name": "15.8(3)M3a",
"product": {
"name": "15.8(3)M3a",
"product_id": "CSAFPID-267421"
}
},
{
"category": "service_pack",
"name": "15.8(3)M3b",
"product": {
"name": "15.8(3)M3b",
"product_id": "CSAFPID-271797"
}
},
{
"category": "service_pack",
"name": "15.8(3)M5",
"product": {
"name": "15.8(3)M5",
"product_id": "CSAFPID-277095"
}
},
{
"category": "service_pack",
"name": "15.8(3)M6",
"product": {
"name": "15.8(3)M6",
"product_id": "CSAFPID-279384"
}
},
{
"category": "service_pack",
"name": "15.8(3)M7",
"product": {
"name": "15.8(3)M7",
"product_id": "CSAFPID-281976"
}
}
],
"category": "product_version",
"name": "15.8M"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.9(3)M",
"product": {
"name": "15.9(3)M",
"product_id": "CSAFPID-252162"
}
},
{
"category": "service_pack",
"name": "15.9(3)M1",
"product": {
"name": "15.9(3)M1",
"product_id": "CSAFPID-267065"
}
},
{
"category": "service_pack",
"name": "15.9(3)M0a",
"product": {
"name": "15.9(3)M0a",
"product_id": "CSAFPID-271796"
}
},
{
"category": "service_pack",
"name": "15.9(3)M2",
"product": {
"name": "15.9(3)M2",
"product_id": "CSAFPID-274204"
}
},
{
"category": "service_pack",
"name": "15.9(3)M3",
"product": {
"name": "15.9(3)M3",
"product_id": "CSAFPID-279111"
}
},
{
"category": "service_pack",
"name": "15.9(3)M2a",
"product": {
"name": "15.9(3)M2a",
"product_id": "CSAFPID-279383"
}
},
{
"category": "service_pack",
"name": "15.9(3)M3a",
"product": {
"name": "15.9(3)M3a",
"product_id": "CSAFPID-281319"
}
},
{
"category": "service_pack",
"name": "15.9(3)M4",
"product": {
"name": "15.9(3)M4",
"product_id": "CSAFPID-281499"
}
},
{
"category": "service_pack",
"name": "15.9(3)M3b",
"product": {
"name": "15.9(3)M3b",
"product_id": "CSAFPID-282118"
}
},
{
"category": "service_pack",
"name": "15.9(3)M4a",
"product": {
"name": "15.9(3)M4a",
"product_id": "CSAFPID-285324"
}
}
],
"category": "product_version",
"name": "15.9M"
}
],
"category": "product_family",
"name": "IOS"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "16.3.1",
"product": {
"name": "16.3.1",
"product_id": "CSAFPID-213960"
}
},
{
"category": "service_pack",
"name": "16.3.2",
"product": {
"name": "16.3.2",
"product_id": "CSAFPID-217255"
}
},
{
"category": "service_pack",
"name": "16.3.3",
"product": {
"name": "16.3.3",
"product_id": "CSAFPID-217256"
}
},
{
"category": "service_pack",
"name": "16.3.1a",
"product": {
"name": "16.3.1a",
"product_id": "CSAFPID-220802"
}
},
{
"category": "service_pack",
"name": "16.3.4",
"product": {
"name": "16.3.4",
"product_id": "CSAFPID-222711"
}
},
{
"category": "service_pack",
"name": "16.3.5",
"product": {
"name": "16.3.5",
"product_id": "CSAFPID-229124"
}
},
{
"category": "service_pack",
"name": "16.3.5b",
"product": {
"name": "16.3.5b",
"product_id": "CSAFPID-231187"
}
},
{
"category": "service_pack",
"name": "16.3.6",
"product": {
"name": "16.3.6",
"product_id": "CSAFPID-231667"
}
},
{
"category": "service_pack",
"name": "16.3.7",
"product": {
"name": "16.3.7",
"product_id": "CSAFPID-239264"
}
},
{
"category": "service_pack",
"name": "16.3.8",
"product": {
"name": "16.3.8",
"product_id": "CSAFPID-251165"
}
},
{
"category": "service_pack",
"name": "16.3.9",
"product": {
"name": "16.3.9",
"product_id": "CSAFPID-262389"
}
},
{
"category": "service_pack",
"name": "16.3.10",
"product": {
"name": "16.3.10",
"product_id": "CSAFPID-273563"
}
},
{
"category": "service_pack",
"name": "16.3.11",
"product": {
"name": "16.3.11",
"product_id": "CSAFPID-278402"
}
}
],
"category": "product_version",
"name": "16.3"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.4.1",
"product": {
"name": "16.4.1",
"product_id": "CSAFPID-214051"
}
},
{
"category": "service_pack",
"name": "16.4.2",
"product": {
"name": "16.4.2",
"product_id": "CSAFPID-217257"
}
},
{
"category": "service_pack",
"name": "16.4.3",
"product": {
"name": "16.4.3",
"product_id": "CSAFPID-231390"
}
}
],
"category": "product_version",
"name": "16.4"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.5.1",
"product": {
"name": "16.5.1",
"product_id": "CSAFPID-217259"
}
},
{
"category": "service_pack",
"name": "16.5.1a",
"product": {
"name": "16.5.1a",
"product_id": "CSAFPID-225784"
}
},
{
"category": "service_pack",
"name": "16.5.1b",
"product": {
"name": "16.5.1b",
"product_id": "CSAFPID-226330"
}
},
{
"category": "service_pack",
"name": "16.5.2",
"product": {
"name": "16.5.2",
"product_id": "CSAFPID-229187"
}
},
{
"category": "service_pack",
"name": "16.5.3",
"product": {
"name": "16.5.3",
"product_id": "CSAFPID-232461"
}
}
],
"category": "product_version",
"name": "16.5"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.6.1",
"product": {
"name": "16.6.1",
"product_id": "CSAFPID-218901"
}
},
{
"category": "service_pack",
"name": "16.6.2",
"product": {
"name": "16.6.2",
"product_id": "CSAFPID-228706"
}
},
{
"category": "service_pack",
"name": "16.6.3",
"product": {
"name": "16.6.3",
"product_id": "CSAFPID-231682"
}
},
{
"category": "service_pack",
"name": "16.6.4",
"product": {
"name": "16.6.4",
"product_id": "CSAFPID-233155"
}
},
{
"category": "service_pack",
"name": "16.6.5",
"product": {
"name": "16.6.5",
"product_id": "CSAFPID-241736"
}
},
{
"category": "service_pack",
"name": "16.6.4s",
"product": {
"name": "16.6.4s",
"product_id": "CSAFPID-244900"
}
},
{
"category": "service_pack",
"name": "16.6.4a",
"product": {
"name": "16.6.4a",
"product_id": "CSAFPID-247629"
}
},
{
"category": "service_pack",
"name": "16.6.5a",
"product": {
"name": "16.6.5a",
"product_id": "CSAFPID-252235"
}
},
{
"category": "service_pack",
"name": "16.6.6",
"product": {
"name": "16.6.6",
"product_id": "CSAFPID-252914"
}
},
{
"category": "service_pack",
"name": "16.6.5b",
"product": {
"name": "16.6.5b",
"product_id": "CSAFPID-258170"
}
},
{
"category": "service_pack",
"name": "16.6.7",
"product": {
"name": "16.6.7",
"product_id": "CSAFPID-261241"
}
},
{
"category": "service_pack",
"name": "16.6.7a",
"product": {
"name": "16.6.7a",
"product_id": "CSAFPID-270097"
}
},
{
"category": "service_pack",
"name": "16.6.8",
"product": {
"name": "16.6.8",
"product_id": "CSAFPID-277148"
}
},
{
"category": "service_pack",
"name": "16.6.9",
"product": {
"name": "16.6.9",
"product_id": "CSAFPID-280801"
}
},
{
"category": "service_pack",
"name": "16.6.10",
"product": {
"name": "16.6.10",
"product_id": "CSAFPID-283835"
}
}
],
"category": "product_version",
"name": "16.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.7.1",
"product": {
"name": "16.7.1",
"product_id": "CSAFPID-218903"
}
},
{
"category": "service_pack",
"name": "16.7.1a",
"product": {
"name": "16.7.1a",
"product_id": "CSAFPID-231389"
}
},
{
"category": "service_pack",
"name": "16.7.1b",
"product": {
"name": "16.7.1b",
"product_id": "CSAFPID-232767"
}
},
{
"category": "service_pack",
"name": "16.7.2",
"product": {
"name": "16.7.2",
"product_id": "CSAFPID-236837"
}
},
{
"category": "service_pack",
"name": "16.7.3",
"product": {
"name": "16.7.3",
"product_id": "CSAFPID-244070"
}
},
{
"category": "service_pack",
"name": "16.7.4",
"product": {
"name": "16.7.4",
"product_id": "CSAFPID-258388"
}
}
],
"category": "product_version",
"name": "16.7"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.8.1",
"product": {
"name": "16.8.1",
"product_id": "CSAFPID-218905"
}
},
{
"category": "service_pack",
"name": "16.8.1a",
"product": {
"name": "16.8.1a",
"product_id": "CSAFPID-235307"
}
},
{
"category": "service_pack",
"name": "16.8.1b",
"product": {
"name": "16.8.1b",
"product_id": "CSAFPID-235858"
}
},
{
"category": "service_pack",
"name": "16.8.1s",
"product": {
"name": "16.8.1s",
"product_id": "CSAFPID-236834"
}
},
{
"category": "service_pack",
"name": "16.8.1c",
"product": {
"name": "16.8.1c",
"product_id": "CSAFPID-237460"
}
},
{
"category": "service_pack",
"name": "16.8.1d",
"product": {
"name": "16.8.1d",
"product_id": "CSAFPID-242834"
}
},
{
"category": "service_pack",
"name": "16.8.2",
"product": {
"name": "16.8.2",
"product_id": "CSAFPID-244071"
}
},
{
"category": "service_pack",
"name": "16.8.1e",
"product": {
"name": "16.8.1e",
"product_id": "CSAFPID-249171"
}
},
{
"category": "service_pack",
"name": "16.8.3",
"product": {
"name": "16.8.3",
"product_id": "CSAFPID-257984"
}
}
],
"category": "product_version",
"name": "16.8"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.9.1",
"product": {
"name": "16.9.1",
"product_id": "CSAFPID-225856"
}
},
{
"category": "service_pack",
"name": "16.9.2",
"product": {
"name": "16.9.2",
"product_id": "CSAFPID-232008"
}
},
{
"category": "service_pack",
"name": "16.9.1a",
"product": {
"name": "16.9.1a",
"product_id": "CSAFPID-242308"
}
},
{
"category": "service_pack",
"name": "16.9.1b",
"product": {
"name": "16.9.1b",
"product_id": "CSAFPID-243362"
}
},
{
"category": "service_pack",
"name": "16.9.1s",
"product": {
"name": "16.9.1s",
"product_id": "CSAFPID-244530"
}
},
{
"category": "service_pack",
"name": "16.9.1c",
"product": {
"name": "16.9.1c",
"product_id": "CSAFPID-245375"
}
},
{
"category": "service_pack",
"name": "16.9.1d",
"product": {
"name": "16.9.1d",
"product_id": "CSAFPID-248242"
}
},
{
"category": "service_pack",
"name": "16.9.3",
"product": {
"name": "16.9.3",
"product_id": "CSAFPID-251075"
}
},
{
"category": "service_pack",
"name": "16.9.2a",
"product": {
"name": "16.9.2a",
"product_id": "CSAFPID-251166"
}
},
{
"category": "service_pack",
"name": "16.9.2s",
"product": {
"name": "16.9.2s",
"product_id": "CSAFPID-252272"
}
},
{
"category": "service_pack",
"name": "16.9.3h",
"product": {
"name": "16.9.3h",
"product_id": "CSAFPID-258229"
}
},
{
"category": "service_pack",
"name": "16.9.4",
"product": {
"name": "16.9.4",
"product_id": "CSAFPID-262390"
}
},
{
"category": "service_pack",
"name": "16.9.3s",
"product": {
"name": "16.9.3s",
"product_id": "CSAFPID-262549"
}
},
{
"category": "service_pack",
"name": "16.9.3a",
"product": {
"name": "16.9.3a",
"product_id": "CSAFPID-263804"
}
},
{
"category": "service_pack",
"name": "16.9.4c",
"product": {
"name": "16.9.4c",
"product_id": "CSAFPID-268921"
}
},
{
"category": "service_pack",
"name": "16.9.5",
"product": {
"name": "16.9.5",
"product_id": "CSAFPID-271798"
}
},
{
"category": "service_pack",
"name": "16.9.5f",
"product": {
"name": "16.9.5f",
"product_id": "CSAFPID-276837"
}
},
{
"category": "service_pack",
"name": "16.9.6",
"product": {
"name": "16.9.6",
"product_id": "CSAFPID-277945"
}
},
{
"category": "service_pack",
"name": "16.9.7",
"product": {
"name": "16.9.7",
"product_id": "CSAFPID-280651"
}
},
{
"category": "service_pack",
"name": "16.9.8",
"product": {
"name": "16.9.8",
"product_id": "CSAFPID-280938"
}
},
{
"category": "service_pack",
"name": "16.9.8a",
"product": {
"name": "16.9.8a",
"product_id": "CSAFPID-290562"
}
},
{
"category": "service_pack",
"name": "16.9.8b",
"product": {
"name": "16.9.8b",
"product_id": "CSAFPID-290669"
}
}
],
"category": "product_version",
"name": "16.9"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.10.1",
"product": {
"name": "16.10.1",
"product_id": "CSAFPID-225858"
}
},
{
"category": "service_pack",
"name": "16.10.1a",
"product": {
"name": "16.10.1a",
"product_id": "CSAFPID-250629"
}
},
{
"category": "service_pack",
"name": "16.10.1b",
"product": {
"name": "16.10.1b",
"product_id": "CSAFPID-252045"
}
},
{
"category": "service_pack",
"name": "16.10.1s",
"product": {
"name": "16.10.1s",
"product_id": "CSAFPID-252913"
}
},
{
"category": "service_pack",
"name": "16.10.1c",
"product": {
"name": "16.10.1c",
"product_id": "CSAFPID-254688"
}
},
{
"category": "service_pack",
"name": "16.10.1e",
"product": {
"name": "16.10.1e",
"product_id": "CSAFPID-257955"
}
},
{
"category": "service_pack",
"name": "16.10.1d",
"product": {
"name": "16.10.1d",
"product_id": "CSAFPID-258900"
}
},
{
"category": "service_pack",
"name": "16.10.2",
"product": {
"name": "16.10.2",
"product_id": "CSAFPID-260917"
}
},
{
"category": "service_pack",
"name": "16.10.1f",
"product": {
"name": "16.10.1f",
"product_id": "CSAFPID-262595"
}
},
{
"category": "service_pack",
"name": "16.10.1g",
"product": {
"name": "16.10.1g",
"product_id": "CSAFPID-266259"
}
},
{
"category": "service_pack",
"name": "16.10.3",
"product": {
"name": "16.10.3",
"product_id": "CSAFPID-273112"
}
}
],
"category": "product_version",
"name": "16.10"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.11.1",
"product": {
"name": "16.11.1",
"product_id": "CSAFPID-227918"
}
},
{
"category": "service_pack",
"name": "16.11.1a",
"product": {
"name": "16.11.1a",
"product_id": "CSAFPID-252271"
}
},
{
"category": "service_pack",
"name": "16.11.1b",
"product": {
"name": "16.11.1b",
"product_id": "CSAFPID-260741"
}
},
{
"category": "service_pack",
"name": "16.11.2",
"product": {
"name": "16.11.2",
"product_id": "CSAFPID-261240"
}
},
{
"category": "service_pack",
"name": "16.11.1s",
"product": {
"name": "16.11.1s",
"product_id": "CSAFPID-261465"
}
},
{
"category": "service_pack",
"name": "16.11.1c",
"product": {
"name": "16.11.1c",
"product_id": "CSAFPID-264096"
}
}
],
"category": "product_version",
"name": "16.11"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.12.1",
"product": {
"name": "16.12.1",
"product_id": "CSAFPID-227920"
}
},
{
"category": "service_pack",
"name": "16.12.1s",
"product": {
"name": "16.12.1s",
"product_id": "CSAFPID-265735"
}
},
{
"category": "service_pack",
"name": "16.12.1a",
"product": {
"name": "16.12.1a",
"product_id": "CSAFPID-265841"
}
},
{
"category": "service_pack",
"name": "16.12.1c",
"product": {
"name": "16.12.1c",
"product_id": "CSAFPID-267110"
}
},
{
"category": "service_pack",
"name": "16.12.1w",
"product": {
"name": "16.12.1w",
"product_id": "CSAFPID-267240"
}
},
{
"category": "service_pack",
"name": "16.12.2",
"product": {
"name": "16.12.2",
"product_id": "CSAFPID-267605"
}
},
{
"category": "service_pack",
"name": "16.12.1y",
"product": {
"name": "16.12.1y",
"product_id": "CSAFPID-271938"
}
},
{
"category": "service_pack",
"name": "16.12.2a",
"product": {
"name": "16.12.2a",
"product_id": "CSAFPID-272047"
}
},
{
"category": "service_pack",
"name": "16.12.3",
"product": {
"name": "16.12.3",
"product_id": "CSAFPID-273445"
}
},
{
"category": "service_pack",
"name": "16.12.2s",
"product": {
"name": "16.12.2s",
"product_id": "CSAFPID-273509"
}
},
{
"category": "service_pack",
"name": "16.12.1x",
"product": {
"name": "16.12.1x",
"product_id": "CSAFPID-273649"
}
},
{
"category": "service_pack",
"name": "16.12.1t",
"product": {
"name": "16.12.1t",
"product_id": "CSAFPID-274832"
}
},
{
"category": "service_pack",
"name": "16.12.2t",
"product": {
"name": "16.12.2t",
"product_id": "CSAFPID-275538"
}
},
{
"category": "service_pack",
"name": "16.12.4",
"product": {
"name": "16.12.4",
"product_id": "CSAFPID-277147"
}
},
{
"category": "service_pack",
"name": "16.12.3s",
"product": {
"name": "16.12.3s",
"product_id": "CSAFPID-277255"
}
},
{
"category": "service_pack",
"name": "16.12.1z",
"product": {
"name": "16.12.1z",
"product_id": "CSAFPID-277256"
}
},
{
"category": "service_pack",
"name": "16.12.3a",
"product": {
"name": "16.12.3a",
"product_id": "CSAFPID-277321"
}
},
{
"category": "service_pack",
"name": "16.12.4a",
"product": {
"name": "16.12.4a",
"product_id": "CSAFPID-278881"
}
},
{
"category": "service_pack",
"name": "16.12.5",
"product": {
"name": "16.12.5",
"product_id": "CSAFPID-280463"
}
},
{
"category": "service_pack",
"name": "16.12.6",
"product": {
"name": "16.12.6",
"product_id": "CSAFPID-280937"
}
},
{
"category": "service_pack",
"name": "16.12.1z1",
"product": {
"name": "16.12.1z1",
"product_id": "CSAFPID-281320"
}
},
{
"category": "service_pack",
"name": "16.12.5a",
"product": {
"name": "16.12.5a",
"product_id": "CSAFPID-281438"
}
},
{
"category": "service_pack",
"name": "16.12.5b",
"product": {
"name": "16.12.5b",
"product_id": "CSAFPID-281654"
}
},
{
"category": "service_pack",
"name": "16.12.1z2",
"product": {
"name": "16.12.1z2",
"product_id": "CSAFPID-283831"
}
},
{
"category": "service_pack",
"name": "16.12.6a",
"product": {
"name": "16.12.6a",
"product_id": "CSAFPID-285325"
}
}
],
"category": "product_version",
"name": "16.12"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.1.1",
"product": {
"name": "17.1.1",
"product_id": "CSAFPID-245377"
}
},
{
"category": "service_pack",
"name": "17.1.1a",
"product": {
"name": "17.1.1a",
"product_id": "CSAFPID-272932"
}
},
{
"category": "service_pack",
"name": "17.1.1s",
"product": {
"name": "17.1.1s",
"product_id": "CSAFPID-274818"
}
},
{
"category": "service_pack",
"name": "17.1.2",
"product": {
"name": "17.1.2",
"product_id": "CSAFPID-277338"
}
},
{
"category": "service_pack",
"name": "17.1.1t",
"product": {
"name": "17.1.1t",
"product_id": "CSAFPID-277348"
}
},
{
"category": "service_pack",
"name": "17.1.3",
"product": {
"name": "17.1.3",
"product_id": "CSAFPID-280652"
}
}
],
"category": "product_version",
"name": "17.1"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.2.1",
"product": {
"name": "17.2.1",
"product_id": "CSAFPID-251225"
}
},
{
"category": "service_pack",
"name": "17.2.1r",
"product": {
"name": "17.2.1r",
"product_id": "CSAFPID-277194"
}
},
{
"category": "service_pack",
"name": "17.2.1a",
"product": {
"name": "17.2.1a",
"product_id": "CSAFPID-277343"
}
},
{
"category": "service_pack",
"name": "17.2.1v",
"product": {
"name": "17.2.1v",
"product_id": "CSAFPID-278002"
}
},
{
"category": "service_pack",
"name": "17.2.2",
"product": {
"name": "17.2.2",
"product_id": "CSAFPID-278504"
}
},
{
"category": "service_pack",
"name": "17.2.3",
"product": {
"name": "17.2.3",
"product_id": "CSAFPID-280939"
}
}
],
"category": "product_version",
"name": "17.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.3.1",
"product": {
"name": "17.3.1",
"product_id": "CSAFPID-254712"
}
},
{
"category": "service_pack",
"name": "17.3.2",
"product": {
"name": "17.3.2",
"product_id": "CSAFPID-277099"
}
},
{
"category": "service_pack",
"name": "17.3.3",
"product": {
"name": "17.3.3",
"product_id": "CSAFPID-278019"
}
},
{
"category": "service_pack",
"name": "17.3.1a",
"product": {
"name": "17.3.1a",
"product_id": "CSAFPID-279338"
}
},
{
"category": "service_pack",
"name": "17.3.1w",
"product": {
"name": "17.3.1w",
"product_id": "CSAFPID-279339"
}
},
{
"category": "service_pack",
"name": "17.3.2a",
"product": {
"name": "17.3.2a",
"product_id": "CSAFPID-280555"
}
},
{
"category": "service_pack",
"name": "17.3.1x",
"product": {
"name": "17.3.1x",
"product_id": "CSAFPID-280783"
}
},
{
"category": "service_pack",
"name": "17.3.1z",
"product": {
"name": "17.3.1z",
"product_id": "CSAFPID-281331"
}
},
{
"category": "service_pack",
"name": "17.3.3a",
"product": {
"name": "17.3.3a",
"product_id": "CSAFPID-282017"
}
},
{
"category": "service_pack",
"name": "17.3.4",
"product": {
"name": "17.3.4",
"product_id": "CSAFPID-282028"
}
},
{
"category": "service_pack",
"name": "17.3.4a",
"product": {
"name": "17.3.4a",
"product_id": "CSAFPID-284178"
}
},
{
"category": "service_pack",
"name": "17.3.4b",
"product": {
"name": "17.3.4b",
"product_id": "CSAFPID-285326"
}
},
{
"category": "service_pack",
"name": "17.3.4c",
"product": {
"name": "17.3.4c",
"product_id": "CSAFPID-285327"
}
}
],
"category": "product_version",
"name": "17.3"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.4.1",
"product": {
"name": "17.4.1",
"product_id": "CSAFPID-262588"
}
},
{
"category": "service_pack",
"name": "17.4.2",
"product": {
"name": "17.4.2",
"product_id": "CSAFPID-278020"
}
},
{
"category": "service_pack",
"name": "17.4.1a",
"product": {
"name": "17.4.1a",
"product_id": "CSAFPID-280770"
}
},
{
"category": "service_pack",
"name": "17.4.1b",
"product": {
"name": "17.4.1b",
"product_id": "CSAFPID-280899"
}
},
{
"category": "service_pack",
"name": "17.4.1c",
"product": {
"name": "17.4.1c",
"product_id": "CSAFPID-282116"
}
},
{
"category": "service_pack",
"name": "17.4.2a",
"product": {
"name": "17.4.2a",
"product_id": "CSAFPID-285328"
}
}
],
"category": "product_version",
"name": "17.4"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.5.1",
"product": {
"name": "17.5.1",
"product_id": "CSAFPID-262590"
}
},
{
"category": "service_pack",
"name": "17.5.1a",
"product": {
"name": "17.5.1a",
"product_id": "CSAFPID-282046"
}
}
],
"category": "product_version",
"name": "17.5"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.6.1",
"product": {
"name": "17.6.1",
"product_id": "CSAFPID-262592"
}
},
{
"category": "service_pack",
"name": "17.6.1w",
"product": {
"name": "17.6.1w",
"product_id": "CSAFPID-284161"
}
},
{
"category": "service_pack",
"name": "17.6.1a",
"product": {
"name": "17.6.1a",
"product_id": "CSAFPID-284179"
}
}
],
"category": "product_version",
"name": "17.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.11.99SW",
"product": {
"name": "17.11.99SW",
"product_id": "CSAFPID-296860"
}
}
],
"category": "product_version",
"name": "17.11SW"
}
],
"category": "product_family",
"name": "Cisco IOS XE Software"
},
{
"category": "product_family",
"name": "Cisco IC3000 Industrial Compute Gateway",
"product": {
"name": "Cisco IC3000 Industrial Compute Gateway ",
"product_id": "CSAFPID-261528"
}
},
{
"category": "product_family",
"name": "Cisco IR510 Operating System",
"product": {
"name": "Cisco IR510 Operating System ",
"product_id": "CSAFPID-281477"
}
},
{
"category": "product_family",
"name": "Cisco CGR1000 Compute Module",
"product": {
"name": "Cisco CGR1000 Compute Module ",
"product_id": "CSAFPID-281479"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-20722",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy86602"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281477",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Environment Path Traversal Vulnerability"
},
{
"cve": "CVE-2022-20725",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy86608"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-261528",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-281479"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281479",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-261528"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-261528",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-281479"
]
}
],
"title": "Cisco IOx Application Environment Cross-site Scripting Vulnerability"
},
{
"cve": "CVE-2022-20726",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx27640"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-281499",
"CSAFPID-281976",
"CSAFPID-285324",
"CSAFPID-281479",
"CSAFPID-261528"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281479",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-281499",
"CSAFPID-281976",
"CSAFPID-285324",
"CSAFPID-261528"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-281499",
"CSAFPID-281976",
"CSAFPID-285324"
]
},
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-281479",
"CSAFPID-261528"
]
}
],
"title": "Cisco IOx Application Environment Denial of Service Vulnerability"
},
{
"cve": "CVE-2022-20718",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy35913"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281477",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
]
},
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Environment Parameter Injection Vulnerability"
},
{
"cve": "CVE-2022-20724",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy86604"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-281479",
"CSAFPID-261528",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281479",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-261528"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-281479"
]
},
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-261528",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228151",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Environment User Impersonation Vulnerability"
},
{
"cve": "CVE-2022-20720",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy30957"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281477",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
]
},
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Environment Arbitrary Code Execution Vulnerability"
},
{
"cve": "CVE-2022-20719",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy86583"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281477",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
]
},
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Parameter Injection Vulnerability"
},
{
"cve": "CVE-2022-20723",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy86603"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281477",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
]
},
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Environment Arbitrary Code Execution Vulnerability"
},
{
"cve": "CVE-2022-20677",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy30903"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy16608"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277256",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280937",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281320",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-281654",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283831",
"CSAFPID-283835",
"CSAFPID-284161",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285325",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-296860"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277256",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280937",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281320",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-281654",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283831",
"CSAFPID-283835",
"CSAFPID-284161",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285325",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-296860"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277256",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280937",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281320",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-281654",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283831",
"CSAFPID-283835",
"CSAFPID-284161",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285325",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-296860"
]
}
],
"title": "Cisco IOS XE Software Privilege Escalation Vulnerabilities "
},
{
"cve": "CVE-2022-20727",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy35914"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-281479",
"CSAFPID-261528",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281479",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-261528"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-281479"
]
},
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-261528",
"CSAFPID-281477",
"CSAFPID-209115",
"CSAFPID-212445",
"CSAFPID-214074",
"CSAFPID-214938",
"CSAFPID-216215",
"CSAFPID-216239",
"CSAFPID-216962",
"CSAFPID-220396",
"CSAFPID-220441",
"CSAFPID-220522",
"CSAFPID-224327",
"CSAFPID-224443",
"CSAFPID-225667",
"CSAFPID-227172",
"CSAFPID-227613",
"CSAFPID-227914",
"CSAFPID-228142",
"CSAFPID-228191",
"CSAFPID-228959",
"CSAFPID-228965",
"CSAFPID-228973",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230624",
"CSAFPID-231509",
"CSAFPID-231510",
"CSAFPID-233074",
"CSAFPID-240653",
"CSAFPID-242313",
"CSAFPID-243311",
"CSAFPID-243330",
"CSAFPID-244069",
"CSAFPID-245741",
"CSAFPID-247630",
"CSAFPID-247679",
"CSAFPID-248832",
"CSAFPID-252162",
"CSAFPID-252911",
"CSAFPID-256429",
"CSAFPID-256430",
"CSAFPID-258582",
"CSAFPID-258583",
"CSAFPID-259870",
"CSAFPID-260802",
"CSAFPID-260803",
"CSAFPID-260804",
"CSAFPID-260993",
"CSAFPID-262300",
"CSAFPID-267065",
"CSAFPID-267415",
"CSAFPID-267421",
"CSAFPID-268474",
"CSAFPID-268969",
"CSAFPID-271796",
"CSAFPID-271797",
"CSAFPID-274204",
"CSAFPID-277095",
"CSAFPID-277098",
"CSAFPID-277254",
"CSAFPID-279111",
"CSAFPID-279383",
"CSAFPID-279384",
"CSAFPID-280215",
"CSAFPID-281319",
"CSAFPID-281499",
"CSAFPID-281975",
"CSAFPID-281976",
"CSAFPID-282118",
"CSAFPID-285324",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328"
]
}
],
"title": "Cisco IOx Application Privilege Escalation"
},
{
"cve": "CVE-2022-20721",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvy86598"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
},
"release_date": "2022-04-13T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-281477",
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-213960",
"CSAFPID-214051",
"CSAFPID-217255",
"CSAFPID-217256",
"CSAFPID-217257",
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218903",
"CSAFPID-218905",
"CSAFPID-220802",
"CSAFPID-222711",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-226330",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-229124",
"CSAFPID-229187",
"CSAFPID-231187",
"CSAFPID-231389",
"CSAFPID-231390",
"CSAFPID-231667",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-232461",
"CSAFPID-232767",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-235858",
"CSAFPID-236834",
"CSAFPID-236837",
"CSAFPID-237460",
"CSAFPID-239264",
"CSAFPID-241736",
"CSAFPID-242308",
"CSAFPID-242834",
"CSAFPID-243362",
"CSAFPID-244070",
"CSAFPID-244071",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245375",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-248242",
"CSAFPID-249171",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-251165",
"CSAFPID-251166",
"CSAFPID-251225",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-254688",
"CSAFPID-254712",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262588",
"CSAFPID-262590",
"CSAFPID-262592",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271798",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273112",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273563",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277099",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277194",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278002",
"CSAFPID-278019",
"CSAFPID-278020",
"CSAFPID-278402",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-279338",
"CSAFPID-279339",
"CSAFPID-280463",
"CSAFPID-280555",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280770",
"CSAFPID-280783",
"CSAFPID-280801",
"CSAFPID-280899",
"CSAFPID-280938",
"CSAFPID-280939",
"CSAFPID-281331",
"CSAFPID-281438",
"CSAFPID-282017",
"CSAFPID-282028",
"CSAFPID-282046",
"CSAFPID-282116",
"CSAFPID-283835",
"CSAFPID-284178",
"CSAFPID-284179",
"CSAFPID-285326",
"CSAFPID-285327",
"CSAFPID-285328",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-281477"
]
}
],
"title": "Cisco IOx Application Environment Arbitrary File Read Vulnerability"
}
]
}
VAR-202204-0264
Vulnerability from variot - Updated: 2024-02-13 01:28Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202204-0264",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.5f"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2t"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m3b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.2.1r"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.5.1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.4.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1d"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.2a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.5b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.8"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.1w"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.4.2a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.1t"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m3a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.4s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(2\\)t3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.4c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.2.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(2\\)t"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.5a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1t"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.3a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e0a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m2a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.1x"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m0a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.4a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.2.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m4"
},
{
"model": "cgr1000 compute module",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.15.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(1\\)t2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e2a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7\\)e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.8"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.6.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.2.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(2\\)t1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m6a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.5b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m0a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.2.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.2.1v"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m3b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7\\)e0b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.5a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m8"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.3a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.1z"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m3a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m2a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.5.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m4b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.4"
},
{
"model": "ic3000 industrial compute gateway",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1g"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.4.2"
},
{
"model": "ir510 operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "6.5.9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.4b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.11"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.6.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.4.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.4.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.4a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m4a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(1\\)t1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3h"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.4a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.10"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(1\\)t3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.3s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(2\\)t0a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.4.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.7a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1f"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1y"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m4a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m3a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.4.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.4c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m2a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.4.1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m6b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m0a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(2\\)t2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.2a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.3.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1w"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1d"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1d"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m0a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7\\)e0s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.2s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m0b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.4.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1x"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:ir510_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:cgr1000_compute_module:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"cve": "CVE-2022-20727",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-405280",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2022-20727",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ykramarz@cisco.com",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 1.2,
"impactScore": 4.2,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2022-20727",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2022-20727",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202204-3308",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-405280",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2022-20727",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-405280"
},
{
"db": "VULMON",
"id": "CVE-2022-20727"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
},
{
"db": "NVD",
"id": "CVE-2022-20727"
},
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-20727"
},
{
"db": "VULHUB",
"id": "VHN-405280"
},
{
"db": "VULMON",
"id": "CVE-2022-20727"
}
],
"trust": 1.08
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-20727",
"trust": 1.8
},
{
"db": "CS-HELP",
"id": "SB2022041415",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3308",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-405280",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-20727",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-405280"
},
{
"db": "VULMON",
"id": "CVE-2022-20727"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
},
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"id": "VAR-202204-0264",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-405280"
}
],
"trust": 0.65288464
},
"last_update_date": "2024-02-13T01:28:59.810000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Cisco: Cisco IOx Application Hosting Environment Vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-iox-yuxq6hfj"
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/alphabugx/cve-2022-23305 "
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/alphabugx/cve-2022-rce "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-20727"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-22",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-405280"
},
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-iox-yuxq6hfj"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-20727/"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/cisco-ios-ios-xe-multiple-vulnerabilities-via-application-hosting-environment-38057"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022041415"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/22.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/alphabugx/cve-2022-23305"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-405280"
},
{
"db": "VULMON",
"id": "CVE-2022-20727"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
},
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-405280"
},
{
"db": "VULMON",
"id": "CVE-2022-20727"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
},
{
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-04-15T00:00:00",
"db": "VULHUB",
"id": "VHN-405280"
},
{
"date": "2022-04-15T00:00:00",
"db": "VULMON",
"id": "CVE-2022-20727"
},
{
"date": "2022-04-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202204-3308"
},
{
"date": "2022-04-15T15:15:13.613000",
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-04-22T00:00:00",
"db": "VULHUB",
"id": "VHN-405280"
},
{
"date": "2024-01-10T00:00:00",
"db": "VULMON",
"id": "CVE-2022-20727"
},
{
"date": "2022-04-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202204-3308"
},
{
"date": "2024-01-10T18:51:52.693000",
"db": "NVD",
"id": "CVE-2022-20727"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco IOS XE Software Path traversal vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "path traversal",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202204-3308"
}
],
"trust": 0.6
}
}
GHSA-2VMV-9G4H-J379
Vulnerability from github – Published: 2022-04-16 00:00 – Updated: 2022-04-23 00:03Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
{
"affected": [],
"aliases": [
"CVE-2022-20727"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-04-15T15:15:00Z",
"severity": "HIGH"
},
"details": "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.",
"id": "GHSA-2vmv-9g4h-j379",
"modified": "2022-04-23T00:03:19Z",
"published": "2022-04-16T00:00:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20727"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.