cve-2022-20947
Vulnerability from cvelistv5
Published
2022-11-10 17:29
Modified
2024-08-03 02:31
Summary
A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:31:57.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-asa-ftd-dap-dos-GhYZBxDU",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Adaptive Security Appliance (ASA) Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "9.12.1.3"
            },
            {
              "status": "affected",
              "version": "9.17.1"
            }
          ]
        },
        {
          "product": "Cisco Firepower Threat Defense Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "6.2.3"
            },
            {
              "status": "affected",
              "version": "6.2.3.1"
            },
            {
              "status": "affected",
              "version": "6.2.3.2"
            },
            {
              "status": "affected",
              "version": "6.2.3.3"
            },
            {
              "status": "affected",
              "version": "6.2.3.4"
            },
            {
              "status": "affected",
              "version": "6.2.3.5"
            },
            {
              "status": "affected",
              "version": "6.2.3.6"
            },
            {
              "status": "affected",
              "version": "6.2.3.7"
            },
            {
              "status": "affected",
              "version": "6.2.3.8"
            },
            {
              "status": "affected",
              "version": "6.2.3.10"
            },
            {
              "status": "affected",
              "version": "6.2.3.11"
            },
            {
              "status": "affected",
              "version": "6.2.3.9"
            },
            {
              "status": "affected",
              "version": "6.2.3.12"
            },
            {
              "status": "affected",
              "version": "6.2.3.13"
            },
            {
              "status": "affected",
              "version": "6.2.3.14"
            },
            {
              "status": "affected",
              "version": "6.2.3.15"
            },
            {
              "status": "affected",
              "version": "6.2.3.16"
            },
            {
              "status": "affected",
              "version": "6.2.3.17"
            },
            {
              "status": "affected",
              "version": "6.2.3.18"
            },
            {
              "status": "affected",
              "version": "6.6.0"
            },
            {
              "status": "affected",
              "version": "6.6.0.1"
            },
            {
              "status": "affected",
              "version": "6.6.1"
            },
            {
              "status": "affected",
              "version": "6.6.3"
            },
            {
              "status": "affected",
              "version": "6.6.4"
            },
            {
              "status": "affected",
              "version": "6.6.5"
            },
            {
              "status": "affected",
              "version": "6.6.5.1"
            },
            {
              "status": "affected",
              "version": "6.4.0"
            },
            {
              "status": "affected",
              "version": "6.4.0.1"
            },
            {
              "status": "affected",
              "version": "6.4.0.3"
            },
            {
              "status": "affected",
              "version": "6.4.0.2"
            },
            {
              "status": "affected",
              "version": "6.4.0.4"
            },
            {
              "status": "affected",
              "version": "6.4.0.5"
            },
            {
              "status": "affected",
              "version": "6.4.0.6"
            },
            {
              "status": "affected",
              "version": "6.4.0.7"
            },
            {
              "status": "affected",
              "version": "6.4.0.8"
            },
            {
              "status": "affected",
              "version": "6.4.0.9"
            },
            {
              "status": "affected",
              "version": "6.4.0.10"
            },
            {
              "status": "affected",
              "version": "6.4.0.11"
            },
            {
              "status": "affected",
              "version": "6.4.0.12"
            },
            {
              "status": "affected",
              "version": "6.4.0.13"
            },
            {
              "status": "affected",
              "version": "6.4.0.14"
            },
            {
              "status": "affected",
              "version": "6.7.0"
            },
            {
              "status": "affected",
              "version": "6.7.0.1"
            },
            {
              "status": "affected",
              "version": "6.7.0.2"
            },
            {
              "status": "affected",
              "version": "6.7.0.3"
            },
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.0.1"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.0.1.1"
            },
            {
              "status": "affected",
              "version": "7.1.0"
            },
            {
              "status": "affected",
              "version": "7.1.0.1"
            },
            {
              "status": "affected",
              "version": "7.1.0.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.   \r\n\r    \r\n\r  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU\"]\r\n\r \r This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:57:19.430Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-asa-ftd-dap-dos-GhYZBxDU",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"
        }
      ],
      "source": {
        "advisory": "cisco-sa-asa-ftd-dap-dos-GhYZBxDU",
        "defects": [
          "CSCwa47041"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20947",
    "datePublished": "2022-11-10T17:29:29.928Z",
    "dateReserved": "2021-11-02T13:28:29.194Z",
    "dateUpdated": "2024-08-03T02:31:57.971Z",
    "requesterUserId": "4087f8c1-b21c-479b-99df-de23cb76b743",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-20947\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2022-11-15T21:15:35.590\",\"lastModified\":\"2024-01-25T17:15:21.303\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\\r\\n\\r This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.   \\r\\n\\r    \\r\\n\\r  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU [\\\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU\\\"]\\r\\n\\r \\r This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la funcionalidad de las pol\u00edticas de acceso din\u00e1mico (DAP) del software Cisco Adaptive Security Appliance (ASA) y del software Firepower Threat Defense (FTD) podr\u00eda permitir que un atacante remoto no autenticado provoque que un dispositivo afectado se recargue, lo que resultar\u00eda en una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS). Esta vulnerabilidad se debe al procesamiento inadecuado de los datos de HostScan recibidos del m\u00f3dulo Posture (HostScan). Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando datos de HostScan manipulados a un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante hacer que el dispositivo afectado se recargue, lo que resultar\u00eda en una condici\u00f3n DoS. \\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU \\nEste aviso es parte de la versi\u00f3n de noviembre de 2022 de la publicaci\u00f3n del Security Advisory Bundled de Cisco ASA, FTD y FMC.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2780DD07-79B8-4096-A435-DB8FD6301E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2D8411-7317-4865-ADF9-279648210E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7AA7A9-F4DB-4BC1-9233-F72B66191F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D8C893-BA42-4EE5-A790-13614A6B436F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"339ACF13-0E1F-48D6-9939-96B16AE857CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"074A5E58-A066-470B-840A-1148A8979DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF2C556-48E6-4572-8FD9-4DC8BAD90B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAD792D-70DB-4123-8BCC-B6890A9BCAA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F273C29-0615-45E9-9860-178227E726B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A173A871-4186-4F3B-B40A-893DD3E1F13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904CE795-DC6F-4CB2-AD3D-6AB893FCB3EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C94EA10-799F-4B6F-AFF5-5CB39A641C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E59B31-CBCB-46BC-A2CE-98754FC8C36B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6279892E-BB24-428F-95AE-07257400444B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3214E142-DDB6-4082-9F76-7F173EFDB6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B0CB62A-AE50-49C0-940E-9F9C799CF1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3650CBD-D1CB-40D5-9397-C6683396A4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED7BF89A-465D-4B48-B38C-977859F6D613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BCA4CF6-7D0B-400B-BF66-DB86C11EABA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8DEF3AE-A561-46F6-81A2-424512B58BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC636946-33D5-4070-9541-1874DDE4A30A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE448D5D-6724-4E5D-8D25-699BDCC71160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC7A642-121A-4A8C-B055-0296EA5D6E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04CF50BE-1D0A-4182-BF07-3097C1FEC85A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0A3A55-8787-4F33-A491-F32A4AFB21A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A460A3C-AFAD-41D5-A2A8-4D38D307CDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E65607-CF28-4494-8978-22C7AD142AB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964F9FC6-AC2C-40DE-A62F-3C9724CA1276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A62501B-A43B-4A60-8572-797AA7CBA876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A20C2CB-9C1C-4403-B9CE-0211481A258F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EE2F86-9EAF-47A8-9BD2-9C62D11814C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"032675B3-83C7-46A5-B13C-D98934E70057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689F4FE8-FA45-41AC-965E-132380FD12DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545845CF-AD67-42B2-A943-3974A84241CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45673C2-8303-456E-9BF5-8882A1EA1631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C88C4B52-C2A1-44D4-9D33-B95AE5671AF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B36032-DB43-4C4B-97C4-DE47F241EF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE16A02-472D-4963-9DF1-B6583E115721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EEC3F4-14FA-4538-B832-B196020BC96F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93548414-23A8-4B2C-A026-D84E689B08AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C5EAC5-4F93-4E46-B774-50BE32FFC642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA38450A-8127-4C32-A28F-951AAB2DA3E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A298344-FAD3-43E1-A687-A189C1F62A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBD7EB1-BE9C-4448-9D17-4254ACD3086B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C49883D-67EA-4C7F-AB4F-65205134E185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8208A38E-5B6E-4669-ADAE-E40A4C0E3A6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FCBAFC-41BE-4650-B7D1-39F8C7688870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953954B6-CB7F-417F-BDB3-A722A88A3F16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807ECF9D-51D7-4C62-A76D-BB5C635C3AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461D662-DE9F-43F7-89D2-978BC83DB33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D87ACA-9235-44C9-86A0-3356A105297B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30468FB9-D2B7-4905-AD81-E2D1DA30B916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CED805E-D656-4582-9578-51AD165C1D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D482F818-0A8E-49D7-8E3E-0958019FA629\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E7BFB57-BC02-4930-A02F-83583E6A0FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026F1960-C879-4611-A60A-96311B63CCA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAF8B33E-0C95-467D-A865-0A234E69D0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF144F5-D933-4DE4-818C-001BD9E3958A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00112ED3-FE7B-425B-9A28-1E5F2BC8BB01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD491D5-FAAB-493F-91A6-D2F3B5F5970E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1519F49D-588F-4B70-B38F-EF4F3E13FEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15354443-5EB7-4712-B2DE-61DB33830759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"248D6B44-E134-4DEC-A947-636824E3FDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0820A79C-F3EF-407F-9AC7-DCAB4CD39C89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D3E8805-85D2-4345-8076-039513209A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BB907B-D75A-4F5E-B20D-5457A71A70EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F118B803-4C55-436A-A136-0C1FEA49858F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A272121-408E-45F6-A2A1-0BA6EBC060A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3910211-D4DB-4CA7-BBEA-DD8246FF10ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C260BF30-7A33-4C70-9509-404856C93666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF894850-39EC-4B57-BBFF-F1AB4F8389A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FAFCF9-0ABE-483E-9604-329762BB7870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83DB4278-3126-4765-97C4-6C0A8C78DA78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174E631B-6099-47DE-8790-BBF4B7FDB8CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE3538B-F612-4105-BFDE-A4B594482DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3143B0FF-C855-485E-A908-E48974B1643C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DD9992-6D98-4E03-9599-ECF38A186FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DCEAE6-355B-40AE-A7C8-AF744FCA8A86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2097E81E-B422-4B93-AF09-F300A0E8AF71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454DEA31-A607-4054-82D3-24A4FEB7358F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F0B213-8187-4465-84F1-FB8D92B36020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E540771E-BA0B-42D1-8251-B576B0F142C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC2A833-BECF-4000-A592-6113A84C2D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077F1416-924A-4D25-9CEE-3BD66A96A019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CD5619-E534-4F40-998D-39DC19FA0451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D0EB11-14B1-44B3-8D46-B9DD872F772C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA399CF-12DB-42E0-A66F-14508B52A453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5A7608-E737-420E-9B5E-836600DAC701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EB6801-336D-4F41-ADE7-1C58C63C3F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8413DA41-02A5-4269-8C88-9DD5076AF91B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA00285F-6914-4749-8A47-FC4EDAFFF3C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA4D367-32B9-4F54-8352-A959F61A1FDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2259FF9E-0C8B-440F-B1AC-51BDE3F60E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C522B55-904D-4C08-B73E-1457D877C0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4483056A-FBF3-4E00-81EB-1E97334EF240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48677330-06AB-4C7F-B2AD-F7E465A9632A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C50642A-B123-4503-9EBB-32CDB67E44D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B646DA-3317-4285-9CB3-1D90B8F54266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97AC204B-9376-4760-8EF7-58F6EC68C936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75846B12-CC4D-4277-B12D-2C2D0DF1C706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"289317DE-77AB-48AF-8CF2-00E9EB85F364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC44F77D-C48E-46DA-B7B7-9D772D043B4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6445101B-54E3-4511-9D45-001CBE70203A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA4A0F4E-1330-456C-8C5E-C9F76BAF651F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F181EF65-D795-4ABB-B464-40B24B29ECA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49A0CF5-EF87-4228-8B88-859A1E1AB7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2CC4146-D447-4E5A-8CBB-60664CDE05BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1150A5-B314-4798-BE10-25E6F979ADA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FC4B71-584F-444F-957C-99E045AA4140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25FBC5B-3FD8-461A-99DE-4120D62CA914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1608733-4D00-4169-AAA2-2ACB7DCE01E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"390781EE-6B38-4C25-9BBC-10D67F858678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332C4752-27EA-43ED-A42D-9C0E250C2F15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A29D95A7-C9FB-424C-90E4-1D2F0FB27917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C3345B-61DA-4565-80DC-7C0645E076D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"547BBEE2-E4C8-43C7-B0CB-A40DBF0457AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F29A49-1E28-4483-BE05-6409DFBF6FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD0E70B2-E401-4F27-9033-5061BD8BA3D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D43506-BB40-4490-A3D0-D4B56D01F931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F94E7F-2455-4C23-B055-3C759571D986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B3FB946-FEC6-42F8-AFC3-40F581F7126B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6CF74B-A6AC-4081-BA20-AB1C7DCF8850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED3B3FD-B44F-464B-9B4E-2650A62EEF3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69289C72-01B5-4280-A382-665C1224C850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A774BF55-3B8C-4E0A-BE73-93189E8E1CC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC46F5E6-5385-46A9-997B-ED543B71CE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F083BA6-04C8-44DF-8E3E-77C550F31C89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C445E350-259B-41DB-BAFF-EB1B023C4648\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E65D4505-C562-41C1-8CFE-1ABE807D83FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3F91FE1-433C-4263-AA0C-1EB5166B07D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4E6F0E-1729-4EFD-9B4B-76A39F1B7ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1A5740-7C1A-45D7-8767-5C50E09F2268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9D78E4-EFEB-4D2F-989C-CB976E1B5C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B8ADDF-2845-4F6D-8920-A4909150927C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B422EED4-C9AA-411A-8203-270862FFFFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF1F99D0-F529-44DE-BB26-2279688DFCCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46CE7CFE-6DAB-47D5-87EB-9607BBD41E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F002FD55-F881-450E-BC1B-8073E188F47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA940C4F-13BB-465F-BB8D-CBD0109BF012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0434F5-9A50-4B57-9C5B-E09415D098C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE727035-06CB-4E37-A9D2-96BD54502120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE52B81-2CF8-48E5-A7BA-A163A25A669B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E8D7C9-5272-40E6-869B-B33959F9F0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE8D5D71-5C85-4644-8A84-F073549ADB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0790DDC2-7BA0-42DC-A157-754C0CBBE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882394EA-70C8-4D86-9AEF-5D273D8E518C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855AD3CC-F404-48C5-80D2-7F2765D16D72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B6BF72-9124-4213-B3C0-BD31B46E8C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"149C3872-8DA9-48DD-ADD0-2E84C1A76A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E23ACB0-DF8B-4672-A819-4DCD3104CE4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4723B88-62BA-40E6-AA89-BAC02D6A036F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C698819-3C8E-4A16-8F52-42FF1E54C076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3CE74E-59E7-448A-8417-18F97C05C798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0986C171-0E75-4F6F-A9BD-276830104E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A2777A-7831-4324-AEB2-5D93B5F6C04B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37045680-9189-4B7F-A4F7-4E682FE20A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6C9F37B-CF3C-4861-A969-C7CF4946274A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB938E58-4963-4A31-8836-88E958592B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E317897-EE97-44F3-96BB-E54228D72A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF7FAB2-158D-4C48-9246-E7AD3BF1D801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"056D43AE-ECDB-40D2-A196-18DDCD02629E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9AE545-A469-41C7-BD95-3CC80AF8067B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3255DB9E-85A5-48ED-90AA-6A7A55A0B1F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02B6C9A0-B941-4C7C-BFE9-F1D837D5ADBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E783FD-5D4B-4C4F-BBFE-1186EFDFEF3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40145CFB-CEE8-4ABA-A9C2-BA262B7A9AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23C82327-5362-4876-8058-EB51030CD5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C700CC9-E16F-4C05-915D-1CA39257ACCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABDBB94-BA4F-4991-A703-0D7DDF999CBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59B6947-1953-4C86-A76C-7A881CD3A502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D83C3A-ED0B-42D5-A08A-97D27E189875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A649E319-D408-4AA2-8293-C9E37AF14BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4187EFE-4D7E-4493-A6E0-24C98256CF79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6730194F-5069-40AB-AE66-871D3992560C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E257F98-D1A0-4D28-9504-1749CC090D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF1A5FC-73BE-4218-86D9-2E81FA64EABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589E46F3-8038-4B87-8C40-55C6268B82F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3B73F6-139E-42DC-B895-DDD17B5A1138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4FD5E3-7E82-4294-8B05-D2045D857029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E998A4A-5346-4CFA-A617-FD1106C6B7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91265549-A16E-4A00-A031-4F1EB8D6881C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE6D033-7B8B-4F61-B653-0C0EF13466EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14441650-DAD5-4959-83DF-4D6F3D6A05FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B21ABC9-A64B-43E4-8951-1E6C0F427DBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0B9B73-A9E6-4924-9EAE-B57E534938FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012812C4-EFF8-465F-A771-134BEB617CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06141A9-8C37-445A-B58A-45739AFE7D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EDC09E5-51D3-4672-B910-B34A9CBD6128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED7A71-81CB-444C-A4ED-EA4A58D5E73C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD13331-0EB8-4C8D-85CC-D96CA9F829AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7137F22B-F993-4620-9378-9412DAEA9EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F57A86-6284-4269-823E-B30C57185D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6560447-039C-40FA-A24D-C8994AC2743B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378ED826-F5FE-40BA-9FC0-9C185A13518B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"130B6FD9-764D-4EF8-91AA-37E52AE9B3E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225861CE-FFF8-4AFA-A07B-CB8D5BC9C361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD08C4E8-3ADB-4048-9B3C-4F0385201523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27ACBA2A-87A7-4836-A474-AFD7D22F820D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FB47CF-2A6A-4121-BFF7-5862E163B8E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE8390C-87EB-4170-8B7D-8F212C89296D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9873ABAC-9A3D-40E1-B7FF-F2AB74F82C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB8D76B-A9D6-4B94-AB94-1080872DE4D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77F521E-640D-4A79-A0B3-B6F9D6453A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6F9B4F-2837-4034-B45C-C131303FF06B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2FF9AC-185F-4E63-A152-DAD6340A5B9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D669C54-77A2-41BC-A193-A847037FC606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC52A8B-7DF4-47B2-9F49-627F59656E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"445CC2C4-EAD4-43C4-ACD9-559B9022DD24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C9D2DC-17CE-499D-ACF3-BBA75E7AEEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFF1182-CE28-4C2E-B849-0D4CEB6C7511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD85DB4-0105-4A8C-8CAA-AFB4F5DEBE10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEC6744D-67DF-4867-9B7A-7F4F28E9061F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F5570C-EC63-4F1E-AEC8-F624C46C136C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD48BE40-C647-429A-81B6-59E125BBE415\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42496A5B-1644-4088-BBCF-2ED810A5694B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05B06B5-C906-4DE8-BA56-9A11002EE1F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6523CD09-7610-4D0E-8585-B7CA82DACDA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F54502-F1AC-4898-85F0-915BABD26D75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"117E2988-45C9-4F68-8C92-1356E0293E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE490473-C9A4-44AD-9AF1-23D3B72D49D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D726F07-06F1-4B0A-B010-E607E0C2A280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FAD2427-82A3-4E64-ADB5-FA4F40B568F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D5A647-AC21-40AC-8B3C-EE5D3EDA038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BAE999A-5244-46CF-8C12-D68E789BDEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6468D3D-C5A7-4FAE-B4B9-AD862CD11055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E4808D-592E-46A6-A83A-A46227D817B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB45136-ACCD-4230-8975-0EBB30D5B375\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C39AC1-1B96-4253-9FC8-4CC26D6261F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9102C8-F211-4E50-967F-FD51C7FC904F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4933642-89E5-4909-AD3C-862CD3B77790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A6C776-79B3-47ED-B013-100B8F08E1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E504F28A-44CE-4B3E-9330-6A98728E3AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA0DD43-D206-4C1C-8B17-DA47F96B3BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1983172D-4F52-479F-BF14-A84B92D36864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4122D982-A57A-4249-A8DC-CE9FC6C98803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96464380-F665-4266-B0AD-693E078C9F82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C230B8A-570D-4F58-83E1-AFA50B813EA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD3F39CB-C4C2-4B13-94F0-9E44322314BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A71873-0EB2-418F-AE33-8474A1010FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED58B0E-FCC7-48E3-A5C0-6CC54A38BAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D4DAC2-D22A-495B-A6FD-D683B9295FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE5CF6D-C8EF-4B89-BC42-6E6873FB6A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBD703E2-54B0-4403-8C5C-70E02738C444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C08950D-4785-434E-8537-00C212DC6DCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB81CA22-3E98-41A0-8646-7B6F787D56C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DF0B07-8C2A-4341-8AFF-DE7E5E5B3A43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E6BD0EE-649E-4ED6-A09C-8364335DEF52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE11554-FE3C-4C8B-8986-5D88E4967342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C11983-22A8-4859-A240-571A7815FF54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CD0B0A-2B91-45DD-9522-8D1D3850CC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7026F0E-72A7-4CDF-BADC-E34FE6FADC51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63B85369-FBAE-456C-BC99-5418B043688A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86434346-D5F0-49BA-803E-244C3266E361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2FA7B3C-002D-4755-B323-CA24B770A5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CB7EBC-F3D5-4855-A8D8-BA5AB21FD719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A5530C-DF29-421B-9712-3454C1769446\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41170977-FEEA-4B51-BF98-8493096CD691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B05791F9-0B31-4C4C-A9BA-9268CAA45FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D975CBA-7F01-4A4C-991B-9571410C4F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D7AF29-4E08-4BFD-AFE0-994309E66F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E168ED-D664-4749-805E-77644407EAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE3433E-529B-4CEA-9810-2A68C8A97643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F297A5CF-AF50-4F8B-B89F-8453A323AA1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5609F866-4665-4D1A-9706-8D2EE9EB4CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD9E1C43-6634-43FF-96DC-8D89E3DE9908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C813F1E-B4E7-4B5E-B89F-65170D2B272D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD69468-8067-4A5D-B2B0-EC510D889AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20AE4051-FA3B-4F0B-BD3D-083A14269FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67FB5ABE-3C40-4C58-B91F-0621C2180FAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53909FD6-EC74-4D2F-99DA-26E70400B53F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55FE024D-0D43-40AD-9645-8C54ECF17824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F22403-B4EE-4303-9C94-915D3E0AC944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"828E3DE1-B62E-4FEC-AAD3-EB0E452C9CBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596EC5DD-D7F4-44C8-B4B5-E2DC142FC486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C356E0E6-5B87-40CF-996E-6FFEDFD82A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBCA75A6-0A3E-4393-8884-9F3CE190641E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3C12D3-7662-46C5-9E88-D1BE6CF605E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046B53A0-6BC1-461A-9C28-C534CE12C4BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D619BF54-1BA9-45D0-A876-92D7010088A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EA365-DED5-4436-AAC2-5553529DE700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D94F400-5A35-41F5-B37F-E9DA6F87ED8E\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU\",\"source\":\"ykramarz@cisco.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.