CVE-2023-20269 (GCVE-0-2023-20269)
Vulnerability from cvelistv5 – Published: 2023-09-06 17:09 – Updated: 2025-10-21 23:05
VLAI?
CISA
Summary
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:
Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.
Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).
Notes:
Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.
This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.
Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
Severity ?
5 (Medium)
CWE
- CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Affected:
9.8.1
Affected: 9.8.1.5 Affected: 9.8.1.7 Affected: 9.8.2 Affected: 9.8.2.8 Affected: 9.8.2.14 Affected: 9.8.2.15 Affected: 9.8.2.17 Affected: 9.8.2.20 Affected: 9.8.2.24 Affected: 9.8.2.26 Affected: 9.8.2.28 Affected: 9.8.2.33 Affected: 9.8.2.35 Affected: 9.8.2.38 Affected: 9.8.3.8 Affected: 9.8.3.11 Affected: 9.8.3.14 Affected: 9.8.3.16 Affected: 9.8.3.18 Affected: 9.8.3.21 Affected: 9.8.3 Affected: 9.8.3.26 Affected: 9.8.3.29 Affected: 9.8.4 Affected: 9.8.4.3 Affected: 9.8.4.7 Affected: 9.8.4.8 Affected: 9.8.4.10 Affected: 9.8.4.12 Affected: 9.8.4.15 Affected: 9.8.4.17 Affected: 9.8.4.25 Affected: 9.8.4.20 Affected: 9.8.4.22 Affected: 9.8.4.26 Affected: 9.8.4.29 Affected: 9.8.4.32 Affected: 9.8.4.33 Affected: 9.8.4.34 Affected: 9.8.4.35 Affected: 9.8.4.39 Affected: 9.8.4.40 Affected: 9.8.4.41 Affected: 9.8.4.43 Affected: 9.8.4.44 Affected: 9.8.4.45 Affected: 9.8.4.46 Affected: 9.8.4.48 Affected: 9.12.1 Affected: 9.12.1.2 Affected: 9.12.1.3 Affected: 9.12.2 Affected: 9.12.2.4 Affected: 9.12.2.5 Affected: 9.12.2.9 Affected: 9.12.3 Affected: 9.12.3.2 Affected: 9.12.3.7 Affected: 9.12.4 Affected: 9.12.3.12 Affected: 9.12.3.9 Affected: 9.12.2.1 Affected: 9.12.4.2 Affected: 9.12.4.4 Affected: 9.12.4.7 Affected: 9.12.4.10 Affected: 9.12.4.13 Affected: 9.12.4.8 Affected: 9.12.4.18 Affected: 9.12.4.24 Affected: 9.12.4.26 Affected: 9.12.4.29 Affected: 9.12.4.30 Affected: 9.12.4.35 Affected: 9.12.4.37 Affected: 9.12.4.38 Affected: 9.12.4.39 Affected: 9.12.4.40 Affected: 9.12.4.41 Affected: 9.12.4.47 Affected: 9.12.4.48 Affected: 9.12.4.50 Affected: 9.12.4.52 Affected: 9.12.4.54 Affected: 9.12.4.55 Affected: 9.12.4.56 Affected: 9.12.4.58 Affected: 9.14.1 Affected: 9.14.1.10 Affected: 9.14.1.6 Affected: 9.14.1.15 Affected: 9.14.1.19 Affected: 9.14.1.30 Affected: 9.14.2 Affected: 9.14.2.4 Affected: 9.14.2.8 Affected: 9.14.2.13 Affected: 9.14.2.15 Affected: 9.14.3 Affected: 9.14.3.1 Affected: 9.14.3.9 Affected: 9.14.3.11 Affected: 9.14.3.13 Affected: 9.14.3.18 Affected: 9.14.3.15 Affected: 9.14.4 Affected: 9.14.4.6 Affected: 9.14.4.7 Affected: 9.14.4.12 Affected: 9.14.4.13 Affected: 9.14.4.14 Affected: 9.14.4.15 Affected: 9.14.4.17 Affected: 9.14.4.22 Affected: 9.14.4.23 Affected: 9.15.1 Affected: 9.15.1.7 Affected: 9.15.1.10 Affected: 9.15.1.15 Affected: 9.15.1.16 Affected: 9.15.1.17 Affected: 9.15.1.1 Affected: 9.15.1.21 Affected: 9.16.1 Affected: 9.16.1.28 Affected: 9.16.2 Affected: 9.16.2.3 Affected: 9.16.2.7 Affected: 9.16.2.11 Affected: 9.16.2.13 Affected: 9.16.2.14 Affected: 9.16.3 Affected: 9.16.3.3 Affected: 9.16.3.14 Affected: 9.16.3.15 Affected: 9.16.3.19 Affected: 9.16.3.23 Affected: 9.16.4 Affected: 9.16.4.9 Affected: 9.16.4.14 Affected: 9.16.4.18 Affected: 9.16.4.19 Affected: 9.16.4.27 Affected: 9.16.4.38 Affected: 9.17.1 Affected: 9.17.1.7 Affected: 9.17.1.9 Affected: 9.17.1.10 Affected: 9.17.1.11 Affected: 9.17.1.13 Affected: 9.17.1.15 Affected: 9.17.1.20 Affected: 9.17.1.30 Affected: 9.18.1 Affected: 9.18.1.3 Affected: 9.18.2 Affected: 9.18.2.5 Affected: 9.18.2.7 Affected: 9.18.2.8 Affected: 9.18.3 Affected: 9.18.3.39 Affected: 9.18.3.46 Affected: 9.18.3.53 Affected: 9.18.3.55 Affected: 9.19.1 Affected: 9.19.1.5 Affected: 9.19.1.9 Affected: 9.19.1.12 Affected: 9.19.1.18 |
|||||||
|
|||||||||
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2023-09-13
Due date: 2023-10-04
Required action: Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.
Used in ransomware: Known
Notes: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC; https://nvd.nist.gov/vuln/detail/CVE-2023-20269
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:36.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-asaftd-ravpn-auth-8LyfCkeC",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20269",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2023-11-15T16:35:58.673645Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-09-13",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20269"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:39.522Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20269"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-09-13T00:00:00+00:00",
"value": "CVE-2023-20269 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Adaptive Security Appliance (ASA) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "9.8.1"
},
{
"status": "affected",
"version": "9.8.1.5"
},
{
"status": "affected",
"version": "9.8.1.7"
},
{
"status": "affected",
"version": "9.8.2"
},
{
"status": "affected",
"version": "9.8.2.8"
},
{
"status": "affected",
"version": "9.8.2.14"
},
{
"status": "affected",
"version": "9.8.2.15"
},
{
"status": "affected",
"version": "9.8.2.17"
},
{
"status": "affected",
"version": "9.8.2.20"
},
{
"status": "affected",
"version": "9.8.2.24"
},
{
"status": "affected",
"version": "9.8.2.26"
},
{
"status": "affected",
"version": "9.8.2.28"
},
{
"status": "affected",
"version": "9.8.2.33"
},
{
"status": "affected",
"version": "9.8.2.35"
},
{
"status": "affected",
"version": "9.8.2.38"
},
{
"status": "affected",
"version": "9.8.3.8"
},
{
"status": "affected",
"version": "9.8.3.11"
},
{
"status": "affected",
"version": "9.8.3.14"
},
{
"status": "affected",
"version": "9.8.3.16"
},
{
"status": "affected",
"version": "9.8.3.18"
},
{
"status": "affected",
"version": "9.8.3.21"
},
{
"status": "affected",
"version": "9.8.3"
},
{
"status": "affected",
"version": "9.8.3.26"
},
{
"status": "affected",
"version": "9.8.3.29"
},
{
"status": "affected",
"version": "9.8.4"
},
{
"status": "affected",
"version": "9.8.4.3"
},
{
"status": "affected",
"version": "9.8.4.7"
},
{
"status": "affected",
"version": "9.8.4.8"
},
{
"status": "affected",
"version": "9.8.4.10"
},
{
"status": "affected",
"version": "9.8.4.12"
},
{
"status": "affected",
"version": "9.8.4.15"
},
{
"status": "affected",
"version": "9.8.4.17"
},
{
"status": "affected",
"version": "9.8.4.25"
},
{
"status": "affected",
"version": "9.8.4.20"
},
{
"status": "affected",
"version": "9.8.4.22"
},
{
"status": "affected",
"version": "9.8.4.26"
},
{
"status": "affected",
"version": "9.8.4.29"
},
{
"status": "affected",
"version": "9.8.4.32"
},
{
"status": "affected",
"version": "9.8.4.33"
},
{
"status": "affected",
"version": "9.8.4.34"
},
{
"status": "affected",
"version": "9.8.4.35"
},
{
"status": "affected",
"version": "9.8.4.39"
},
{
"status": "affected",
"version": "9.8.4.40"
},
{
"status": "affected",
"version": "9.8.4.41"
},
{
"status": "affected",
"version": "9.8.4.43"
},
{
"status": "affected",
"version": "9.8.4.44"
},
{
"status": "affected",
"version": "9.8.4.45"
},
{
"status": "affected",
"version": "9.8.4.46"
},
{
"status": "affected",
"version": "9.8.4.48"
},
{
"status": "affected",
"version": "9.12.1"
},
{
"status": "affected",
"version": "9.12.1.2"
},
{
"status": "affected",
"version": "9.12.1.3"
},
{
"status": "affected",
"version": "9.12.2"
},
{
"status": "affected",
"version": "9.12.2.4"
},
{
"status": "affected",
"version": "9.12.2.5"
},
{
"status": "affected",
"version": "9.12.2.9"
},
{
"status": "affected",
"version": "9.12.3"
},
{
"status": "affected",
"version": "9.12.3.2"
},
{
"status": "affected",
"version": "9.12.3.7"
},
{
"status": "affected",
"version": "9.12.4"
},
{
"status": "affected",
"version": "9.12.3.12"
},
{
"status": "affected",
"version": "9.12.3.9"
},
{
"status": "affected",
"version": "9.12.2.1"
},
{
"status": "affected",
"version": "9.12.4.2"
},
{
"status": "affected",
"version": "9.12.4.4"
},
{
"status": "affected",
"version": "9.12.4.7"
},
{
"status": "affected",
"version": "9.12.4.10"
},
{
"status": "affected",
"version": "9.12.4.13"
},
{
"status": "affected",
"version": "9.12.4.8"
},
{
"status": "affected",
"version": "9.12.4.18"
},
{
"status": "affected",
"version": "9.12.4.24"
},
{
"status": "affected",
"version": "9.12.4.26"
},
{
"status": "affected",
"version": "9.12.4.29"
},
{
"status": "affected",
"version": "9.12.4.30"
},
{
"status": "affected",
"version": "9.12.4.35"
},
{
"status": "affected",
"version": "9.12.4.37"
},
{
"status": "affected",
"version": "9.12.4.38"
},
{
"status": "affected",
"version": "9.12.4.39"
},
{
"status": "affected",
"version": "9.12.4.40"
},
{
"status": "affected",
"version": "9.12.4.41"
},
{
"status": "affected",
"version": "9.12.4.47"
},
{
"status": "affected",
"version": "9.12.4.48"
},
{
"status": "affected",
"version": "9.12.4.50"
},
{
"status": "affected",
"version": "9.12.4.52"
},
{
"status": "affected",
"version": "9.12.4.54"
},
{
"status": "affected",
"version": "9.12.4.55"
},
{
"status": "affected",
"version": "9.12.4.56"
},
{
"status": "affected",
"version": "9.12.4.58"
},
{
"status": "affected",
"version": "9.14.1"
},
{
"status": "affected",
"version": "9.14.1.10"
},
{
"status": "affected",
"version": "9.14.1.6"
},
{
"status": "affected",
"version": "9.14.1.15"
},
{
"status": "affected",
"version": "9.14.1.19"
},
{
"status": "affected",
"version": "9.14.1.30"
},
{
"status": "affected",
"version": "9.14.2"
},
{
"status": "affected",
"version": "9.14.2.4"
},
{
"status": "affected",
"version": "9.14.2.8"
},
{
"status": "affected",
"version": "9.14.2.13"
},
{
"status": "affected",
"version": "9.14.2.15"
},
{
"status": "affected",
"version": "9.14.3"
},
{
"status": "affected",
"version": "9.14.3.1"
},
{
"status": "affected",
"version": "9.14.3.9"
},
{
"status": "affected",
"version": "9.14.3.11"
},
{
"status": "affected",
"version": "9.14.3.13"
},
{
"status": "affected",
"version": "9.14.3.18"
},
{
"status": "affected",
"version": "9.14.3.15"
},
{
"status": "affected",
"version": "9.14.4"
},
{
"status": "affected",
"version": "9.14.4.6"
},
{
"status": "affected",
"version": "9.14.4.7"
},
{
"status": "affected",
"version": "9.14.4.12"
},
{
"status": "affected",
"version": "9.14.4.13"
},
{
"status": "affected",
"version": "9.14.4.14"
},
{
"status": "affected",
"version": "9.14.4.15"
},
{
"status": "affected",
"version": "9.14.4.17"
},
{
"status": "affected",
"version": "9.14.4.22"
},
{
"status": "affected",
"version": "9.14.4.23"
},
{
"status": "affected",
"version": "9.15.1"
},
{
"status": "affected",
"version": "9.15.1.7"
},
{
"status": "affected",
"version": "9.15.1.10"
},
{
"status": "affected",
"version": "9.15.1.15"
},
{
"status": "affected",
"version": "9.15.1.16"
},
{
"status": "affected",
"version": "9.15.1.17"
},
{
"status": "affected",
"version": "9.15.1.1"
},
{
"status": "affected",
"version": "9.15.1.21"
},
{
"status": "affected",
"version": "9.16.1"
},
{
"status": "affected",
"version": "9.16.1.28"
},
{
"status": "affected",
"version": "9.16.2"
},
{
"status": "affected",
"version": "9.16.2.3"
},
{
"status": "affected",
"version": "9.16.2.7"
},
{
"status": "affected",
"version": "9.16.2.11"
},
{
"status": "affected",
"version": "9.16.2.13"
},
{
"status": "affected",
"version": "9.16.2.14"
},
{
"status": "affected",
"version": "9.16.3"
},
{
"status": "affected",
"version": "9.16.3.3"
},
{
"status": "affected",
"version": "9.16.3.14"
},
{
"status": "affected",
"version": "9.16.3.15"
},
{
"status": "affected",
"version": "9.16.3.19"
},
{
"status": "affected",
"version": "9.16.3.23"
},
{
"status": "affected",
"version": "9.16.4"
},
{
"status": "affected",
"version": "9.16.4.9"
},
{
"status": "affected",
"version": "9.16.4.14"
},
{
"status": "affected",
"version": "9.16.4.18"
},
{
"status": "affected",
"version": "9.16.4.19"
},
{
"status": "affected",
"version": "9.16.4.27"
},
{
"status": "affected",
"version": "9.16.4.38"
},
{
"status": "affected",
"version": "9.17.1"
},
{
"status": "affected",
"version": "9.17.1.7"
},
{
"status": "affected",
"version": "9.17.1.9"
},
{
"status": "affected",
"version": "9.17.1.10"
},
{
"status": "affected",
"version": "9.17.1.11"
},
{
"status": "affected",
"version": "9.17.1.13"
},
{
"status": "affected",
"version": "9.17.1.15"
},
{
"status": "affected",
"version": "9.17.1.20"
},
{
"status": "affected",
"version": "9.17.1.30"
},
{
"status": "affected",
"version": "9.18.1"
},
{
"status": "affected",
"version": "9.18.1.3"
},
{
"status": "affected",
"version": "9.18.2"
},
{
"status": "affected",
"version": "9.18.2.5"
},
{
"status": "affected",
"version": "9.18.2.7"
},
{
"status": "affected",
"version": "9.18.2.8"
},
{
"status": "affected",
"version": "9.18.3"
},
{
"status": "affected",
"version": "9.18.3.39"
},
{
"status": "affected",
"version": "9.18.3.46"
},
{
"status": "affected",
"version": "9.18.3.53"
},
{
"status": "affected",
"version": "9.18.3.55"
},
{
"status": "affected",
"version": "9.19.1"
},
{
"status": "affected",
"version": "9.19.1.5"
},
{
"status": "affected",
"version": "9.19.1.9"
},
{
"status": "affected",
"version": "9.19.1.12"
},
{
"status": "affected",
"version": "9.19.1.18"
}
]
},
{
"product": "Cisco Firepower Threat Defense Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.2.3"
},
{
"status": "affected",
"version": "6.2.3.1"
},
{
"status": "affected",
"version": "6.2.3.2"
},
{
"status": "affected",
"version": "6.2.3.3"
},
{
"status": "affected",
"version": "6.2.3.4"
},
{
"status": "affected",
"version": "6.2.3.5"
},
{
"status": "affected",
"version": "6.2.3.6"
},
{
"status": "affected",
"version": "6.2.3.7"
},
{
"status": "affected",
"version": "6.2.3.8"
},
{
"status": "affected",
"version": "6.2.3.10"
},
{
"status": "affected",
"version": "6.2.3.11"
},
{
"status": "affected",
"version": "6.2.3.9"
},
{
"status": "affected",
"version": "6.2.3.12"
},
{
"status": "affected",
"version": "6.2.3.13"
},
{
"status": "affected",
"version": "6.2.3.14"
},
{
"status": "affected",
"version": "6.2.3.15"
},
{
"status": "affected",
"version": "6.2.3.16"
},
{
"status": "affected",
"version": "6.2.3.17"
},
{
"status": "affected",
"version": "6.2.3.18"
},
{
"status": "affected",
"version": "6.6.0"
},
{
"status": "affected",
"version": "6.6.0.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "6.6.5"
},
{
"status": "affected",
"version": "6.6.5.1"
},
{
"status": "affected",
"version": "6.6.5.2"
},
{
"status": "affected",
"version": "6.6.7"
},
{
"status": "affected",
"version": "6.6.7.1"
},
{
"status": "affected",
"version": "6.4.0"
},
{
"status": "affected",
"version": "6.4.0.1"
},
{
"status": "affected",
"version": "6.4.0.3"
},
{
"status": "affected",
"version": "6.4.0.2"
},
{
"status": "affected",
"version": "6.4.0.4"
},
{
"status": "affected",
"version": "6.4.0.5"
},
{
"status": "affected",
"version": "6.4.0.6"
},
{
"status": "affected",
"version": "6.4.0.7"
},
{
"status": "affected",
"version": "6.4.0.8"
},
{
"status": "affected",
"version": "6.4.0.9"
},
{
"status": "affected",
"version": "6.4.0.10"
},
{
"status": "affected",
"version": "6.4.0.11"
},
{
"status": "affected",
"version": "6.4.0.12"
},
{
"status": "affected",
"version": "6.4.0.13"
},
{
"status": "affected",
"version": "6.4.0.14"
},
{
"status": "affected",
"version": "6.4.0.15"
},
{
"status": "affected",
"version": "6.4.0.16"
},
{
"status": "affected",
"version": "6.7.0"
},
{
"status": "affected",
"version": "6.7.0.1"
},
{
"status": "affected",
"version": "6.7.0.2"
},
{
"status": "affected",
"version": "6.7.0.3"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.0.1"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.0.1.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.0.2.1"
},
{
"status": "affected",
"version": "7.0.3"
},
{
"status": "affected",
"version": "7.0.4"
},
{
"status": "affected",
"version": "7.0.5"
},
{
"status": "affected",
"version": "7.0.6"
},
{
"status": "affected",
"version": "7.1.0"
},
{
"status": "affected",
"version": "7.1.0.1"
},
{
"status": "affected",
"version": "7.1.0.2"
},
{
"status": "affected",
"version": "7.1.0.3"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.0.1"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.2.3"
},
{
"status": "affected",
"version": "7.2.4"
},
{
"status": "affected",
"version": "7.2.4.1"
},
{
"status": "affected",
"version": "7.2.5"
},
{
"status": "affected",
"version": "7.3.0"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.3.1.1"
},
{
"status": "affected",
"version": "7.4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\r\n\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\r\n\r \r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\r \r Notes:\r\n\r \r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\r \r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "In August 2023, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability once available and apply one of the suggested workarounds in the meantime.\r\n\r\nFor information on observed attempted exploitation of this vulnerability, see the Cisco blog post on Akira Ransomware Targeting VPNs without Multi-Factor Authentication [\"https://blogs.cisco.com/security/akira-ransomware-targeting-vpns-without-multi-factor-authentication\"]. As explained in this blog post, organizations can significantly reduce the risk of unauthorized access, including a potential ransomware infection, by enabling MFA in VPN implementations."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:58:36.839Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-asaftd-ravpn-auth-8LyfCkeC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC"
}
],
"source": {
"advisory": "cisco-sa-asaftd-ravpn-auth-8LyfCkeC",
"defects": [
"CSCwh23100",
"CSCwh45108"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20269",
"datePublished": "2023-09-06T17:09:29.663Z",
"dateReserved": "2022-10-27T18:47:50.373Z",
"dateUpdated": "2025-10-21T23:05:39.522Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-20269",
"cwes": "[\"CWE-288\"]",
"dateAdded": "2023-09-13",
"dueDate": "2023-10-04",
"knownRansomwareCampaignUse": "Known",
"notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC; https://nvd.nist.gov/vuln/detail/CVE-2023-20269",
"product": "Adaptive Security Appliance and Firepower Threat Defense",
"requiredAction": "Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.",
"shortDescription": "Cisco Adaptive Security Appliance and Firepower Threat Defense contain an unauthorized access vulnerability that could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or establish a clientless SSL VPN session with an unauthorized user.",
"vendorProject": "Cisco",
"vulnerabilityName": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2023-10-04",
"cisaExploitAdd": "2023-09-13",
"cisaRequiredAction": "Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.",
"cisaVulnerabilityName": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C01E8C87-8982-491F-B0ED-5AD17BDBBC1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E881DFE5-9180-49BA-8D66-2BD96FC23BE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81FC6BE6-1DF5-41FE-B66D-05A8D3DCDDD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6033411-4722-4CDD-BF8A-152C13FA3926\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37495D3A-FB87-40F6-B6E6-7870393F8D68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E59E5B90-18F4-48D6-A38A-D4BDFE8C3091\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6458E8C7-84F0-49DF-99DC-99810AA71AF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E59FF48-5291-4CC2-9A2E-38819B7322AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E40F113E-208E-4015-815C-492EFC7F7C99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"905B866F-B3E8-4240-9942-8DBEAB2F3C08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3DE2A18-0E0F-4926-BC8A-B44558EA8DBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13E5F3D0-02BB-45E6-81B8-B7CC09346FFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA3A6F7D-CF96-492E-9C03-827382B0D0A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"153216C5-8239-4F62-8751-49AFD5A1B600\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB28D358-3C2E-4D55-B429-EF805689691D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52E3338A-93BC-4263-B3D7-13F1EC35004C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B849B7C-A3DE-4230-B765-3335864EE02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B84A0B2-8631-4CE7-9636-9E4956073DA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BCE1C81-A824-43A9-B0F2-C5F8C4B98B60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"348B0FAC-A97D-4A9C-8D98-C0C347532112\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4213D8C-4A4A-4C95-8500-3B056EF537C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E713AF7B-6C50-4205-8320-CE833D5C7409\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AEDA6C9-B87B-446E-AE63-6A0BAD3A20B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1B2EE3B-D640-476E-BFBD-A5147EC4134A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8117D925-7E20-45BB-8A75-740700FD216F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1529CCAE-3A67-41C7-8A14-5E85D8D43C13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E8BF178-C267-4571-9581-224F7488BDA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"843C4F5F-C0B3-40C9-BC03-9F5B21D18637\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E7FBCD9-10D2-470B-9B29-4DD1E3240DE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A872D2D1-3391-4A4A-8409-5760ACA8C252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8738A0E2-489E-42C3-B675-243BAF46E7F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9123ACEF-35AB-4EC2-A2C4-B6A6C570951B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A11043D9-DFA6-43E0-A58C-1D7FA52A8D6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC0CCF6C-E140-4C76-B2EC-7BDA9F9291D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C13B826E-FB8D-49E5-B866-2606AD904513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6AB1039-6A7C-42A5-A931-3C3C2D6DDB95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BE4B4C7-9686-4BC4-925C-23D700416875\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"761ADC40-51DF-455D-8E43-BED6F98A68B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8540F8BE-B396-47CB-AB8C-A32AF1942C70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE7CF2BE-D6F0-4C95-9FC8-9F2611D7E2BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D027DA95-EC2D-4CDA-9458-E5315E8EF92A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20FB8F1C-2757-4C48-BA17-9D0BEF671ACF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89D368A3-6202-4C14-9DD6-6FE73B5F06F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28AE56F0-52C7-4BF3-BBA2-FC6946C2617B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E5B23F-8986-49D2-BE0C-E3576C703EDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B41A653B-E947-4C3B-82AA-42F5F282FA29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEFB54B2-5026-482B-B226-FC07841C6FC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BBBF462-9E15-4526-A437-B78CA24832C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D00BA69-08A6-4796-BDE6-E5E2D7C66E23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF2B032F-6C40-4D12-8D7F-C41A6F75941F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D05CDFBE-0206-490E-B916-EEFE787CE975\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B8A26CA-12C8-44B5-902E-D450127A0197\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45E1B068-FF70-4A61-9932-02626A2207CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E84099EB-2535-4A9F-8355-FF937CFBD122\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92F386BB-96E5-47FF-92FE-BB19B83FF054\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CBC03FE-3A54-450E-A8CE-844C4A6E54B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C599F894-DAD2-4231-8BB8-1427E7C02D60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F60C12-71C9-47C6-B43F-A0374419D736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C853CD9-F451-406E-A515-3BDC34E55639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"078352DC-CEB3-47BC-B1F7-05AA3DBD5D8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"096B8FFA-6C54-44A9-97C9-0479C802E25C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"028024EF-84D1-4250-B697-D33E8E79DE9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE2EC687-1EEF-4F47-B509-2E9D7D7DB21A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1197F620-536D-4891-97B0-B17D7F76B621\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68C616AE-4B20-47A1-854E-89899BBF79B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95627941-30D8-452F-B6C8-76D2BEE93514\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"364CA0EA-F85E-4C4B-96D8-A7256F413844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BE03156-2E96-4D0E-909F-E424515C12D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DA3389C-86FE-45F7-97D7-E3386403944F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FE43737-1463-4C93-9549-1D5BF3BB308B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5DD95E7-841A-475C-A302-6E7D48E887C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C12C224-AB9E-42A7-8A26-94D6B4378CEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D482F818-0A8E-49D7-8E3E-0958019FA629\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E7BFB57-BC02-4930-A02F-83583E6A0FC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026F1960-C879-4611-A60A-96311B63CCA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAF8B33E-0C95-467D-A865-0A234E69D0CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF144F5-D933-4DE4-818C-001BD9E3958A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00112ED3-FE7B-425B-9A28-1E5F2BC8BB01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDD491D5-FAAB-493F-91A6-D2F3B5F5970E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1519F49D-588F-4B70-B38F-EF4F3E13FEAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15354443-5EB7-4712-B2DE-61DB33830759\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"248D6B44-E134-4DEC-A947-636824E3FDFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0820A79C-F3EF-407F-9AC7-DCAB4CD39C89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D3E8805-85D2-4345-8076-039513209A31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14BB907B-D75A-4F5E-B20D-5457A71A70EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F118B803-4C55-436A-A136-0C1FEA49858F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A272121-408E-45F6-A2A1-0BA6EBC060A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3910211-D4DB-4CA7-BBEA-DD8246FF10ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C260BF30-7A33-4C70-9509-404856C93666\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF894850-39EC-4B57-BBFF-F1AB4F8389A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1FAFCF9-0ABE-483E-9604-329762BB7870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83DB4278-3126-4765-97C4-6C0A8C78DA78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"174E631B-6099-47DE-8790-BBF4B7FDB8CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FE3538B-F612-4105-BFDE-A4B594482DCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3143B0FF-C855-485E-A908-E48974B1643C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26DD9992-6D98-4E03-9599-ECF38A186FBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24DCEAE6-355B-40AE-A7C8-AF744FCA8A86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2097E81E-B422-4B93-AF09-F300A0E8AF71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"454DEA31-A607-4054-82D3-24A4FEB7358F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57F0B213-8187-4465-84F1-FB8D92B36020\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E540771E-BA0B-42D1-8251-B576B0F142C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEC2A833-BECF-4000-A592-6113A84C2D20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"077F1416-924A-4D25-9CEE-3BD66A96A019\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23CD5619-E534-4F40-998D-39DC19FA0451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5D0EB11-14B1-44B3-8D46-B9DD872F772C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA399CF-12DB-42E0-A66F-14508B52A453\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B5A7608-E737-420E-9B5E-836600DAC701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7EB6801-336D-4F41-ADE7-1C58C63C3F6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8413DA41-02A5-4269-8C88-9DD5076AF91B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA00285F-6914-4749-8A47-FC4EDAFFF3C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AA4D367-32B9-4F54-8352-A959F61A1FDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2259FF9E-0C8B-440F-B1AC-51BDE3F60E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C522B55-904D-4C08-B73E-1457D877C0AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4483056A-FBF3-4E00-81EB-1E97334EF240\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48677330-06AB-4C7F-B2AD-F7E465A9632A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AEA80D2-5DB8-4334-9A88-7DDE395832C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB1C38A5-1028-4AD3-8CC7-A00091091E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"848147B2-C49A-43F6-9069-FC8885BDFDA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6FEF0DA-741E-4361-8143-068EB47D6520\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69289C72-01B5-4280-A382-665C1224C850\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F002FD55-F881-450E-BC1B-8073E188F47E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA940C4F-13BB-465F-BB8D-CBD0109BF012\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B0434F5-9A50-4B57-9C5B-E09415D098C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE727035-06CB-4E37-A9D2-96BD54502120\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FE52B81-2CF8-48E5-A7BA-A163A25A669B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8E8D7C9-5272-40E6-869B-B33959F9F0CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE8D5D71-5C85-4644-8A84-F073549ADB50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0790DDC2-7BA0-42DC-A157-754C0CBBE178\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"882394EA-70C8-4D86-9AEF-5D273D8E518C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"855AD3CC-F404-48C5-80D2-7F2765D16D72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26B6BF72-9124-4213-B3C0-BD31B46E8C91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"149C3872-8DA9-48DD-ADD0-2E84C1A76A40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E23ACB0-DF8B-4672-A819-4DCD3104CE4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4723B88-62BA-40E6-AA89-BAC02D6A036F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C698819-3C8E-4A16-8F52-42FF1E54C076\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D3CE74E-59E7-448A-8417-18F97C05C798\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0986C171-0E75-4F6F-A9BD-276830104E5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66A2777A-7831-4324-AEB2-5D93B5F6C04B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37045680-9189-4B7F-A4F7-4E682FE20A09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6C9F37B-CF3C-4861-A969-C7CF4946274A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB938E58-4963-4A31-8836-88E958592B30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E317897-EE97-44F3-96BB-E54228D72A7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EF7FAB2-158D-4C48-9246-E7AD3BF1D801\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"056D43AE-ECDB-40D2-A196-18DDCD02629E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E555F3-3580-4D71-8D8D-92FE72763D62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93013503-8B9A-4160-AF7E-277958FA6E9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3B009FD-0F2B-4511-8EDF-C3E670623F89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52579D8D-E855-42B3-B406-32DD1C39F721\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7E44FC6-12A2-4F76-A095-28F3804B619F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42917E5E-E362-4B40-B2B2-3C77BA35641C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F98B1683-914F-43D3-AE1C-311D3A90BE8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D24656-CAB1-4A98-A440-482927FEDD16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E504557C-DA5D-4D0F-A813-4CE7D5109F15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04D2A067-C717-4921-BBF5-3EFBE02736EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36DDEC5B-4BEA-499C-9F34-BB3D39B7A963\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52D83C3A-ED0B-42D5-A08A-97D27E189875\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A649E319-D408-4AA2-8293-C9E37AF14BA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4187EFE-4D7E-4493-A6E0-24C98256CF79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6730194F-5069-40AB-AE66-871D3992560C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E257F98-D1A0-4D28-9504-1749CC090D49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FF1A5FC-73BE-4218-86D9-2E81FA64EABD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"589E46F3-8038-4B87-8C40-55C6268B82F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F3B73F6-139E-42DC-B895-DDD17B5A1138\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4FD5E3-7E82-4294-8B05-D2045D857029\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E998A4A-5346-4CFA-A617-FD1106C6B7A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91265549-A16E-4A00-A031-4F1EB8D6881C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE6D033-7B8B-4F61-B653-0C0EF13466EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14441650-DAD5-4959-83DF-4D6F3D6A05FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B21ABC9-A64B-43E4-8951-1E6C0F427DBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A48EC041-322F-422D-B95B-0FC07BDA2B6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE0D50C0-DADB-4747-8649-8A5257111FE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEE2699F-353F-44CB-A778-981783DDC31F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D8E50BD-1FBD-483B-9C27-70E95C732E55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F46E5E4F-787C-4C05-B1E7-C39BB9125D16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6A29312-38E7-456B-94DD-4D7329691114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27F7BB31-C733-4C32-BF0F-33B5AF020156\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC313568-33A6-435B-98FF-8A7091D9C451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F85710A-28CE-4913-8523-356461908FBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6069950-016B-419A-B754-D58956CB6D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A2F3FEC-624F-47C5-B056-836861BB038A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA0B9B73-A9E6-4924-9EAE-B57E534938FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"012812C4-EFF8-465F-A771-134BEB617CC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E06141A9-8C37-445A-B58A-45739AFE7D4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EDC09E5-51D3-4672-B910-B34A9CBD6128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71ED7A71-81CB-444C-A4ED-EA4A58D5E73C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD13331-0EB8-4C8D-85CC-D96CA9F829AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7137F22B-F993-4620-9378-9412DAEA9EF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"923A40E8-6456-4288-B9AB-DBF5F9C4246A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13F57A86-6284-4269-823E-B30C57185D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6560447-039C-40FA-A24D-C8994AC2743B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"378ED826-F5FE-40BA-9FC0-9C185A13518B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"130B6FD9-764D-4EF8-91AA-37E52AE9B3E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225861CE-FFF8-4AFA-A07B-CB8D5BC9C361\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD08C4E8-3ADB-4048-9B3C-4F0385201523\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4875811-F209-49ED-B310-8377B2F87FF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99C52C7B-B626-4A3C-A2EC-28A20E7FA95F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08CCBF5E-257A-4A1F-8930-3643A9588838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"782BC9ED-1395-472B-9F34-DED812AA5BFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"153449C0-B93F-49A2-8A6A-BE84305E8D2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"853A002C-839A-4372-8485-750A86E9F6E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32F1365-EAF8-4570-B2FF-45E47E8586F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFD07F9B-6BB3-4423-8DBE-4E89A6478E65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34FE4F28-B704-4325-AE8A-C790163FEE71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E832BC0C-8439-4779-9064-C2D93F231031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA99DF94-D031-4375-9A16-306606FE28F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC149D03-5609-46E6-A1B3-F4D91F282B49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5D7FC6F-1370-4272-97E5-226C2ED1D335\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"164D5774-D51B-47C6-AD32-ED6B84E78BBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27ACBA2A-87A7-4836-A474-AFD7D22F820D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C73E0B2E-BABF-4998-A1D7-4E803F9D78AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"959107AC-E9EC-467C-901B-A3164E3762E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F944F8F-0255-42BE-BD44-D21EC9F0FFC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F39C535-5A41-47CE-A9CF-B360998D4BF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BA16A6D-2747-4DAC-A30A-166F1FD906FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"289F9874-FC01-4809-9BDA-1AF583FB60B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74EDFC67-E4EE-4D2C-BF9F-5881C987C662\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"826869BE-4874-4BBA-9392-14851560BA10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF52D477-3045-45D1-9FD3-12F396266463\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88E310BF-F1F6-4124-A875-81967B9B531E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B330F8F-F0DA-472C-A932-AD1D232C7DB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BF59DAA-268C-4FCF-A0AA-7967128AEBC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"140ED95D-173C-4ADB-A2E6-97F0D595D1AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC9B00E1-3E50-4356-B6D9-F84BCD552402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"552319A9-01F7-47BA-83B3-B2DD648AA07E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEE52F59-AABA-4069-A909-64AD5DFD2B18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20D7966E-B02B-48C8-BF96-723DD6C25314\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA618249-E76F-4104-9326-C9F2DC8DE3D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C925E1F-6BD9-4CD1-8AC4-4263A9094786\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5EE76D9-6D18-4823-B6B0-E1394A4D140C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D726F07-06F1-4B0A-B010-E607E0C2A280\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FAD2427-82A3-4E64-ADB5-FA4F40B568F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08D5A647-AC21-40AC-8B3C-EE5D3EDA038A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BAE999A-5244-46CF-8C12-D68E789BDEE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6468D3D-C5A7-4FAE-B4B9-AD862CD11055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E4808D-592E-46A6-A83A-A46227D817B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AB45136-ACCD-4230-8975-0EBB30D5B375\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C39AC1-1B96-4253-9FC8-4CC26D6261F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE9102C8-F211-4E50-967F-FD51C7FC904F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4933642-89E5-4909-AD3C-862CD3B77790\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A6C776-79B3-47ED-B013-100B8F08E1C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E504F28A-44CE-4B3E-9330-6A98728E3AEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEA0DD43-D206-4C1C-8B17-DA47F96B3BAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1983172D-4F52-479F-BF14-A84B92D36864\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4122D982-A57A-4249-A8DC-CE9FC6C98803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96464380-F665-4266-B0AD-693E078C9F82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C230B8A-570D-4F58-83E1-AFA50B813EA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD3F39CB-C4C2-4B13-94F0-9E44322314BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59A71873-0EB2-418F-AE33-8474A1010FA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2DF0B07-8C2A-4341-8AFF-DE7E5E5B3A43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E6BD0EE-649E-4ED6-A09C-8364335DEF52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AE11554-FE3C-4C8B-8986-5D88E4967342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1C11983-22A8-4859-A240-571A7815FF54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24CD0B0A-2B91-45DD-9522-8D1D3850CC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7026F0E-72A7-4CDF-BADC-E34FE6FADC51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63B85369-FBAE-456C-BC99-5418B043688A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86434346-D5F0-49BA-803E-244C3266E361\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2FA7B3C-002D-4755-B323-CA24B770A5B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1CB7EBC-F3D5-4855-A8D8-BA5AB21FD719\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2A5530C-DF29-421B-9712-3454C1769446\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41170977-FEEA-4B51-BF98-8493096CD691\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B05791F9-0B31-4C4C-A9BA-9268CAA45FB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D975CBA-7F01-4A4C-991B-9571410C4F07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6D7AF29-4E08-4BFD-AFE0-994309E66F08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2EFA476-5021-4A00-859E-1643009D6156\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6E3A5DC-A237-46E4-A4E5-F135482F984A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCD69468-8067-4A5D-B2B0-EC510D889AA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20AE4051-FA3B-4F0B-BD3D-083A14269FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67FB5ABE-3C40-4C58-B91F-0621C2180FAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53909FD6-EC74-4D2F-99DA-26E70400B53F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55FE024D-0D43-40AD-9645-8C54ECF17824\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC411A8D-CD39-46F5-B8FC-6753E618FAEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D46E2E00-BA86-4002-B67B-2C1A6C1AAAE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91AD8BA2-EB8D-4D8B-B707-AF5C2A831998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85F22403-B4EE-4303-9C94-915D3E0AC944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"828E3DE1-B62E-4FEC-AAD3-EB0E452C9CBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"596EC5DD-D7F4-44C8-B4B5-E2DC142FC486\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C356E0E6-5B87-40CF-996E-6FFEDFD82A31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBCA75A6-0A3E-4393-8884-9F3CE190641E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F3C12D3-7662-46C5-9E88-D1BE6CF605E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"046B53A0-6BC1-461A-9C28-C534CE12C4BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D1C767F-3E06-43B7-A0CC-D51D97A053EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43A950B0-A7CA-4CE7-A393-A18C8C41B08E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7E221CB-BD0F-4AEE-8646-998B75647714\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225382DE-2919-48F4-9CC0-DE685EAAFDF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBA2DFE7-F478-46EC-9832-4B2C738FC879\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39FE5927-2421-4CBE-97EA-6AED892DA1C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D619BF54-1BA9-45D0-A876-92D7010088A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EA365-DED5-4436-AAC2-5553529DE700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D94F400-5A35-41F5-B37F-E9DA6F87ED8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5364CB94-BEA3-4E9A-A2F9-EE96A2D7F8AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16FD5D12-CF1A-4990-99B3-1840EFBA5611\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCD2D11D-FF08-44E4-BF67-D8DD1E701FCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F788D156-1F1F-4A08-848B-257BC4CCE000\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795ED164-7800-4D50-8E37-665BE30190D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B0664B8-1670-4F47-A01E-089D05A9618A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6826018-5620-4924-BE92-6A245378F610\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A49A07CF-12BA-481C-B5FF-754520080A8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F203C7D1-AA92-4367-B7A5-EBAE6B76EE6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBC0C3DC-4761-488A-90A9-6EA45EE61526\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62EE065B-F8B6-4125-8486-B2EE0566B27A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5245DEF8-64BE-47C9-AA3C-DF3F7F92A89F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAC0A7B7-2FE5-40ED-80F3-70F6CC2065F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B066DB88-FB86-467E-8AE2-3AC76B202082\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A356E12-DFC8-45D3-A72B-133C72011A85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40955D09-9351-436D-A93A-266913CFE407\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCDA8B7D-108E-4851-BDDD-E81C58131B8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"975AA7EF-3BE1-4112-AAAE-80C678DF06FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDDC513A-8B98-4904-BC39-E178D6CABD86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6A4E4A8-3FB8-4EAA-ADD8-D8A48269C7A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E00E1A95-4D81-4D8C-8E9F-02F9866DEC19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"968A5890-B604-4AF7-88FD-52512DE60A0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3390375-1D75-4D28-AA2B-4D28FC006B2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"134FBA88-E8BF-4757-9ED5-449A03ED4FEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17F83FA7-11A1-48D1-AAD9-80EB8330C576\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2250FD43-E360-4BB9-8444-47C6014E77F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E18DBD-6477-4DEF-9A4F-884F0987C89C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41A26F87-4A82-4BF1-9B69-3FDA62659237\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82B5E7C5-CE7E-45CF-9B02-D174F99D3379\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A59FF9C-0A15-4F9F-A807-5F4B5FDD83F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0912860-7B6E-4AF9-8208-0F51A11B0CBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1136F1DA-65C0-4D46-87EE-63A5EA8BCC82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEA9D4DA-1CC3-4F76-8AC2-936DF68608A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A05215-3700-4DF3-8CDF-25E40065B539\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBE017C1-28CE-4219-9BC4-E7AC61A836E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDB86586-4D1A-415D-9070-EAAFFFF670AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2443A527-3A65-4226-A643-B683072CB664\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA645994-0744-446B-96EA-21915AF3BEC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA1E87A4-A9EB-4BFC-9070-F32ABD32D33C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5B63317-7612-4B7C-8AE8-F18AEFAF4560\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CF8BD7E-31C0-4F05-A092-64D9918ED5DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BBD9E97-0BC5-4120-8E03-1EE9D11E3359\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D724096-92CD-457E-8CC5-B8099A8E3187\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66EA1792-85AC-4AD1-8213-A992F623D743\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86C7966B-2EB0-4970-B2D5-9F892F2D1C8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50C1D4AD-01C0-4591-9308-625FEF736D7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EE06D7A-8DF5-4C98-AEDB-CF0DC5DFF565\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9027F6-F91E-49D3-9328-C72E18625292\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1C4EBE8-60A7-4F71-959A-1127DAF2A262\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3484693F-1D88-44AA-B739-6E0B2C359A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"413E425D-9BD5-4A9B-9FE6-6190C488C1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"753121F0-AE17-49FE-B5F3-71DFBD9A4634\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A583EEC5-7EA9-422E-8C1C-4C28CDBC65F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FDAA778-942A-433F-88E5-359490AA28CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DC8A5AE-032F-49C7-B1D3-FA68351E9C3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0F554EB-CCF5-4779-B199-B5F54DDEF79A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2FD6008-65F5-4AA5-A824-674863D55F3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21908446-BEEC-4E62-AC98-A29CC1130C71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F24887-C173-4EEB-A299-104C1E3FA701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8040CC3D-FC71-4E9F-B47F-29C076A45783\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E828CC88-B141-42C4-8A99-6B7D21AEB955\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55711FD3-EF2E-4247-883B-03A40FD97612\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91495846-B9D1-4EBD-9AB3-3B93B85AC279\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2C17961-8069-4D62-ABC1-DCAB7329C3FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2D742BF-6E32-4510-A484-EB478EE12132\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED71E067-9788-4369-BD9B-DAC3AA1A26BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344AAD16-48F8-470F-A292-1CA3D21A75D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6A591D-2AC6-4A28-B6CD-BD2A3F8D3C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95EC0A62-B604-4913-B52F-478FA03A5949\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"934198F1-D461-4881-B8C7-8CCECB730FA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E357084A-5E12-41E8-9944-1451A55A2D13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5D877E6-5623-41B0-BE45-4D8697DF1715\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA3917D9-E072-4474-B236-AE25875AA509\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0561BA9E-415A-4D2A-95A2-0C4A706E19A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52E4A054-1837-436E-A1BF-68FF5213EE91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2CC50D9-10AC-4098-8C09-E46A3BB2DB2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"420D097B-8D7F-455A-8FFD-3D07722CB232\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBBAE927-0B79-4EFA-BC6B-08134B03DAB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9CA5A8-6C58-44DA-8786-0A1784D73A0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42E47AFC-3BC4-4B8D-AC45-D71A0DB8937C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A81420A1-7B35-4C48-AF03-82F0ACDEC038\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FAC37E6-81AC-4B7C-9C8B-EE9AFB4EF36B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD9D1E08-2203-4C5D-A6CA-1041312AAAC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"874B8CDA-1A5B-4F26-B7DF-34204FD481CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9C2D047-BE9B-4A8C-A34E-77D9F1E4EEA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0481146-DDE9-4B0A-907E-867CCCA79F8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA8D47A5-60F7-48F7-B8D1-BCE9E9976CFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6362C627-390E-4183-B6D2-981E0EA1C89F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3D4927A-2CC4-4BAD-B365-4844FDE85583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1733786-193E-4107-A3E7-A640905A14EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9272CE2-6C53-4486-BBC5-1DABBBA3E609\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44DD2A20-7E82-41D7-8DF0-5C4EF7550159\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54039A5F-6CF5-45C5-A34E-5426BD5BBDE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A4B5CFF-9F97-4F99-A07A-5E18019DB2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47C355F9-7B58-4CA6-AE00-7D985E2C647F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A2A893A-99DD-4892-9771-65BD52C6596A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56279156-4E4C-4CEC-869A-E244CDC320FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D984A56E-7B51-4D35-94AC-0395409C9E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F56FB13C-1AF0-411E-B341-7BAFF75B79B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0C8EF96-D9CB-44A6-A4DA-81C24319D6EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22038B43-6CE2-413A-8334-32BF9137E574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15464E33-3166-4401-993D-FEB12DBF0CC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BEAC68D-1A73-492B-A932-50048090A855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EB29B3-F12B-41DC-B573-3FFC0EB9D26B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41F732E6-A003-4B38-9057-A962C7EDFC6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AF57890-3CD7-41A3-A93A-4E3609CA1BF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2183862-4E0A-4046-AA22-53B8CFFAE9C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B87C2BF2-D4F5-43FD-805C-B93D752ABAD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21AF5911-BFE9-414B-AD39-F1E2E06377C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02C8586E-8BBE-45FA-80AA-5C1F2AC79BD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4726A373-71E1-4E12-BEBB-62DF6293B45B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03F02586-FB92-4A39-8141-A9BD55C52D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D66B0B2F-B191-47A2-917E-AC4616CC39AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88A3E2E8-2E7E-469F-B396-902706C5863F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E247E151-E5C3-4A39-AA3F-BA77FBD743D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73F35B92-5A4B-4194-A7F0-721E12F7A427\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7F58F94-4010-4B3F-BD37-5DB291BFC082\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"756045B0-6A52-4B98-9EE3-455A71F39034\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2B09FED-126F-494A-BCAD-01B020B1C1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06B44703-0EDC-4E7C-B381-8016F354A3AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71F1C7CE-8BFD-4270-BFE3-5479D6712484\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1E9D7E5-8A81-432F-8B17-6CF95B2622B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF2AF6B-13FD-4EED-8A53-FE417BDFF9AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBBBB059-A956-4C74-A4F4-1D1BEA5C42E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF3512B9-0995-4004-B6FB-921A01B48F59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A95F782-0124-427A-B838-CE16730537F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F328B623-F3E2-4EBF-86F8-854F8E683F22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCD6F39C-4558-4A2B-95D0-F0C0EB691933\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E02DCB5D-818B-498E-B077-6C73568EC7A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C65E767-7E10-45CE-B46D-32A512D37E02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B33FEB-0DB6-4F2F-BCB8-67CB26C5F127\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03700A91-CFC9-4038-AEC6-1D693F2577C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"929439FB-D5E7-4E13-979B-8F0E407E17B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C107667C-A223-4EA1-ABB0-45E0AC6E0A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"143F8F07-9B3B-4015-AC57-B17F007D92E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A963BCC1-C1EF-4294-AF84-6969807E9B60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52E31CF5-7241-4DC5-97F9-C2EFC9E44A90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.1.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0D20C10-2129-4AEE-87A1-05BD05690823\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D84F31E-6830-4B79-BC20-584E622E3861\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A45DA2B-089E-476D-B2B5-18337AA54B6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CA21B4B-0D0D-4F43-AC83-D979EFCCCBAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D06B1D5-4CDE-406C-A667-1A2226B5229A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01C7232A-EDE8-4AF1-BEF0-B1E32CB7FA3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B727AF3E-0332-4708-A791-07609C159B3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FB43006-7ADB-4A2A-9F25-2AA15EFF12A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9AD0F0D-4E30-42ED-AAD5-2B910703E92D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"381D4076-593A-4A0B-B889-2A7A24566E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795BFE71-D25D-4B46-BCCC-F130BEEA4244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E77F26B-0367-4242-BB76-87CC94E5586C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EFBEFEC-27C0-40A9-82EC-FCC32656C2E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEF1F7B4-E4EC-4A4B-9E1A-3DD040CB1336\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D9F9738-5EAA-4A38-928F-83386F37042E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E0C8A97-27C9-4DB0-A6B4-A281741DAF88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C460231-555D-4AB8-A262-F26CB2CC48D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"848C6044-C8DF-4BA3-9C58-096AC6C847DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9CDBB14-52F1-4FD7-8971-433650DF9944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9535E887-28C2-4F4D-BDAE-6FD2ECCDC26E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D5859D3-D831-44BB-A72C-E2509054BB6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C7225F-B430-48DF-ACFF-61687A4A2448\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F02E16DE-FF05-4629-90E5-C26077BA9100\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"113B5A3A-C36B-4A5E-8B24-D7706F496DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D086EF92-21C5-4F14-BEBB-A35648E6DA1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D758AFC-A874-4137-800A-B8E1630DAA81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7AA2E52-0636-47E4-BA09-BAAACE9C9DC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC35A95F-6F7D-4767-856D-7CE8D214520F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC285311-2538-4337-B87F-50264DC2F7CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"063B39F3-7D62-4E4A-864A-54EF5ADA46F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE8AF564-B9A1-4236-BFED-C42B759EA1D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0DBA7D1-6CFF-45BC-9342-8079E4624552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7748A078-8185-4C38-A47E-C44105C3EE3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB406721-7B8D-48EC-9521-AC74D3877AF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65D5E552-2677-4E8E-809E-53A6B1889154\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFDDE002-A886-4C6D-9373-7FEB4D6B6A4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28FA58BD-B33E-45EC-AA58-A33CEC12C6BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"373DE7AE-EF8A-47C2-8BAF-25E6C762EEB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2973DA5E-B5EE-430F-93CD-E9288C5BF3FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9362F3E-9E96-47D0-B059-A4A350E2BC77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98FFEC19-5D89-414A-94C4-744C72E057B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09635D47-0FD8-46EE-ADF8-D7C191C67F19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2678EC5C-F330-485E-9901-2AB410E10581\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1EC0911-A71B-43CC-8C48-0292E518E157\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BE9BF7D-C928-402C-A90D-B35AF4210B7F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\\r\\n\\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\\r\\n\\r \\r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\\r \\r Notes:\\r\\n\\r \\r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\\r \\r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la funci\\u00f3n VPN de acceso remoto del software Cisco Adaptive Security Appliance (ASA) y el Software Cisco Firepower Threat Defense (FTD) podr\\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de fuerza bruta en un intento de identificar combinaciones v\\u00e1lidas de nombre de usuario y contrase\\u00f1a o un atacante remoto autenticado para establecer una sesi\\u00f3n VPN SSL sin cliente con un usuario no autorizado. Esta vulnerabilidad se debe a una separaci\\u00f3n inadecuada de autenticaci\\u00f3n, autorizaci\\u00f3n y contabilidad (AAA) entre la funci\\u00f3n VPN de acceso remoto y las funciones de administraci\\u00f3n HTTPS y VPN de sitio a sitio. Un atacante podr\\u00eda aprovechar esta vulnerabilidad especificando un perfil de conexi\\u00f3n predeterminada profile/tunnel group mientras realiza un ataque de fuerza bruta o establece una sesi\\u00f3n VPN SSL sin cliente utilizando credenciales v\\u00e1lidas. Un exploit exitoso podr\\u00eda permitir al atacante lograr uno o ambos de los siguientes: Identificar credenciales v\\u00e1lidas que luego podr\\u00edan usarse para establecer una sesi\\u00f3n VPN de acceso remoto no autorizada. Establezca una sesi\\u00f3n VPN SSL sin cliente (solo cuando ejecute la versi\\u00f3n 9.16 o anterior del software Cisco ASA). Notas: No es posible establecer un t\\u00fanel VPN de acceso remoto basado en cliente ya que estos perfiles de conexi\\u00f3n predeterminados profile/tunnel group no tienen ni pueden tener un grupo de direcciones IP configurado. Esta vulnerabilidad no permite que un atacante eluda la autenticaci\\u00f3n. Para establecer con \\u00e9xito una sesi\\u00f3n VPN de acceso remoto, se requieren credenciales v\\u00e1lidas, incluido un segundo factor v\\u00e1lido si est\\u00e1 configurada la autenticaci\\u00f3n multifactor (MFA). Cisco lanzar\\u00e1 actualizaciones de software que aborden esta vulnerabilidad. Existen workarounds que abordan esta vulnerabilidad.\"}]",
"id": "CVE-2023-20269",
"lastModified": "2024-11-21T07:41:02.433",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N\", \"baseScore\": 5.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.1, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.2}]}",
"published": "2023-09-06T18:15:08.303",
"references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-288\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-20269\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2023-09-06T18:15:08.303\",\"lastModified\":\"2025-10-28T13:59:45.003\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\\r\\n\\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\\r\\n\\r \\r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\\r \\r Notes:\\r\\n\\r \\r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\\r \\r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la funci\u00f3n VPN de acceso remoto del software Cisco Adaptive Security Appliance (ASA) y el Software Cisco Firepower Threat Defense (FTD) podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de fuerza bruta en un intento de identificar combinaciones v\u00e1lidas de nombre de usuario y contrase\u00f1a o un atacante remoto autenticado para establecer una sesi\u00f3n VPN SSL sin cliente con un usuario no autorizado. Esta vulnerabilidad se debe a una separaci\u00f3n inadecuada de autenticaci\u00f3n, autorizaci\u00f3n y contabilidad (AAA) entre la funci\u00f3n VPN de acceso remoto y las funciones de administraci\u00f3n HTTPS y VPN de sitio a sitio. Un atacante podr\u00eda aprovechar esta vulnerabilidad especificando un perfil de conexi\u00f3n predeterminada profile/tunnel group mientras realiza un ataque de fuerza bruta o establece una sesi\u00f3n VPN SSL sin cliente utilizando credenciales v\u00e1lidas. Un exploit exitoso podr\u00eda permitir al atacante lograr uno o ambos de los siguientes: Identificar credenciales v\u00e1lidas que luego podr\u00edan usarse para establecer una sesi\u00f3n VPN de acceso remoto no autorizada. Establezca una sesi\u00f3n VPN SSL sin cliente (solo cuando ejecute la versi\u00f3n 9.16 o anterior del software Cisco ASA). Notas: No es posible establecer un t\u00fanel VPN de acceso remoto basado en cliente ya que estos perfiles de conexi\u00f3n predeterminados profile/tunnel group no tienen ni pueden tener un grupo de direcciones IP configurado. Esta vulnerabilidad no permite que un atacante eluda la autenticaci\u00f3n. Para establecer con \u00e9xito una sesi\u00f3n VPN de acceso remoto, se requieren credenciales v\u00e1lidas, incluido un segundo factor v\u00e1lido si est\u00e1 configurada la autenticaci\u00f3n multifactor (MFA). Cisco lanzar\u00e1 actualizaciones de software que aborden esta vulnerabilidad. Existen workarounds que abordan esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.1,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"cisaExploitAdd\":\"2023-09-13\",\"cisaActionDue\":\"2023-10-04\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.\",\"cisaVulnerabilityName\":\"Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability\",\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-288\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D482F818-0A8E-49D7-8E3E-0958019FA629\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E7BFB57-BC02-4930-A02F-83583E6A0FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026F1960-C879-4611-A60A-96311B63CCA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAF8B33E-0C95-467D-A865-0A234E69D0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF144F5-D933-4DE4-818C-001BD9E3958A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00112ED3-FE7B-425B-9A28-1E5F2BC8BB01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD491D5-FAAB-493F-91A6-D2F3B5F5970E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1519F49D-588F-4B70-B38F-EF4F3E13FEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15354443-5EB7-4712-B2DE-61DB33830759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"248D6B44-E134-4DEC-A947-636824E3FDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0820A79C-F3EF-407F-9AC7-DCAB4CD39C89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D3E8805-85D2-4345-8076-039513209A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BB907B-D75A-4F5E-B20D-5457A71A70EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F118B803-4C55-436A-A136-0C1FEA49858F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A272121-408E-45F6-A2A1-0BA6EBC060A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3910211-D4DB-4CA7-BBEA-DD8246FF10ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C260BF30-7A33-4C70-9509-404856C93666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF894850-39EC-4B57-BBFF-F1AB4F8389A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FAFCF9-0ABE-483E-9604-329762BB7870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83DB4278-3126-4765-97C4-6C0A8C78DA78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174E631B-6099-47DE-8790-BBF4B7FDB8CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE3538B-F612-4105-BFDE-A4B594482DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3143B0FF-C855-485E-A908-E48974B1643C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DD9992-6D98-4E03-9599-ECF38A186FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DCEAE6-355B-40AE-A7C8-AF744FCA8A86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2097E81E-B422-4B93-AF09-F300A0E8AF71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454DEA31-A607-4054-82D3-24A4FEB7358F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F0B213-8187-4465-84F1-FB8D92B36020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E540771E-BA0B-42D1-8251-B576B0F142C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC2A833-BECF-4000-A592-6113A84C2D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077F1416-924A-4D25-9CEE-3BD66A96A019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CD5619-E534-4F40-998D-39DC19FA0451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5D0EB11-14B1-44B3-8D46-B9DD872F772C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA399CF-12DB-42E0-A66F-14508B52A453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5A7608-E737-420E-9B5E-836600DAC701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EB6801-336D-4F41-ADE7-1C58C63C3F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8413DA41-02A5-4269-8C88-9DD5076AF91B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA00285F-6914-4749-8A47-FC4EDAFFF3C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA4D367-32B9-4F54-8352-A959F61A1FDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2259FF9E-0C8B-440F-B1AC-51BDE3F60E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C522B55-904D-4C08-B73E-1457D877C0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4483056A-FBF3-4E00-81EB-1E97334EF240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48677330-06AB-4C7F-B2AD-F7E465A9632A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEA80D2-5DB8-4334-9A88-7DDE395832C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1C38A5-1028-4AD3-8CC7-A00091091E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848147B2-C49A-43F6-9069-FC8885BDFDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6FEF0DA-741E-4361-8143-068EB47D6520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F002FD55-F881-450E-BC1B-8073E188F47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA940C4F-13BB-465F-BB8D-CBD0109BF012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0434F5-9A50-4B57-9C5B-E09415D098C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE727035-06CB-4E37-A9D2-96BD54502120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE52B81-2CF8-48E5-A7BA-A163A25A669B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E8D7C9-5272-40E6-869B-B33959F9F0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE8D5D71-5C85-4644-8A84-F073549ADB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0790DDC2-7BA0-42DC-A157-754C0CBBE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882394EA-70C8-4D86-9AEF-5D273D8E518C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855AD3CC-F404-48C5-80D2-7F2765D16D72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B6BF72-9124-4213-B3C0-BD31B46E8C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"149C3872-8DA9-48DD-ADD0-2E84C1A76A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E23ACB0-DF8B-4672-A819-4DCD3104CE4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4723B88-62BA-40E6-AA89-BAC02D6A036F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C698819-3C8E-4A16-8F52-42FF1E54C076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3CE74E-59E7-448A-8417-18F97C05C798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0986C171-0E75-4F6F-A9BD-276830104E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A2777A-7831-4324-AEB2-5D93B5F6C04B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37045680-9189-4B7F-A4F7-4E682FE20A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6C9F37B-CF3C-4861-A969-C7CF4946274A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB938E58-4963-4A31-8836-88E958592B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E317897-EE97-44F3-96BB-E54228D72A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF7FAB2-158D-4C48-9246-E7AD3BF1D801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"056D43AE-ECDB-40D2-A196-18DDCD02629E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E555F3-3580-4D71-8D8D-92FE72763D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93013503-8B9A-4160-AF7E-277958FA6E9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B009FD-0F2B-4511-8EDF-C3E670623F89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52579D8D-E855-42B3-B406-32DD1C39F721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E44FC6-12A2-4F76-A095-28F3804B619F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42917E5E-E362-4B40-B2B2-3C77BA35641C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F98B1683-914F-43D3-AE1C-311D3A90BE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D24656-CAB1-4A98-A440-482927FEDD16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E504557C-DA5D-4D0F-A813-4CE7D5109F15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D2A067-C717-4921-BBF5-3EFBE02736EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DDEC5B-4BEA-499C-9F34-BB3D39B7A963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D83C3A-ED0B-42D5-A08A-97D27E189875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A649E319-D408-4AA2-8293-C9E37AF14BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4187EFE-4D7E-4493-A6E0-24C98256CF79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6730194F-5069-40AB-AE66-871D3992560C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E257F98-D1A0-4D28-9504-1749CC090D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF1A5FC-73BE-4218-86D9-2E81FA64EABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589E46F3-8038-4B87-8C40-55C6268B82F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3B73F6-139E-42DC-B895-DDD17B5A1138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4FD5E3-7E82-4294-8B05-D2045D857029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E998A4A-5346-4CFA-A617-FD1106C6B7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91265549-A16E-4A00-A031-4F1EB8D6881C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE6D033-7B8B-4F61-B653-0C0EF13466EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14441650-DAD5-4959-83DF-4D6F3D6A05FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B21ABC9-A64B-43E4-8951-1E6C0F427DBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48EC041-322F-422D-B95B-0FC07BDA2B6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE0D50C0-DADB-4747-8649-8A5257111FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE2699F-353F-44CB-A778-981783DDC31F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8E50BD-1FBD-483B-9C27-70E95C732E55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F46E5E4F-787C-4C05-B1E7-C39BB9125D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A29312-38E7-456B-94DD-4D7329691114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27F7BB31-C733-4C32-BF0F-33B5AF020156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC313568-33A6-435B-98FF-8A7091D9C451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F85710A-28CE-4913-8523-356461908FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6069950-016B-419A-B754-D58956CB6D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A2F3FEC-624F-47C5-B056-836861BB038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0B9B73-A9E6-4924-9EAE-B57E534938FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012812C4-EFF8-465F-A771-134BEB617CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06141A9-8C37-445A-B58A-45739AFE7D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EDC09E5-51D3-4672-B910-B34A9CBD6128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED7A71-81CB-444C-A4ED-EA4A58D5E73C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD13331-0EB8-4C8D-85CC-D96CA9F829AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7137F22B-F993-4620-9378-9412DAEA9EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923A40E8-6456-4288-B9AB-DBF5F9C4246A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F57A86-6284-4269-823E-B30C57185D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6560447-039C-40FA-A24D-C8994AC2743B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378ED826-F5FE-40BA-9FC0-9C185A13518B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"130B6FD9-764D-4EF8-91AA-37E52AE9B3E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225861CE-FFF8-4AFA-A07B-CB8D5BC9C361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD08C4E8-3ADB-4048-9B3C-4F0385201523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4875811-F209-49ED-B310-8377B2F87FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C52C7B-B626-4A3C-A2EC-28A20E7FA95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08CCBF5E-257A-4A1F-8930-3643A9588838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"782BC9ED-1395-472B-9F34-DED812AA5BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153449C0-B93F-49A2-8A6A-BE84305E8D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853A002C-839A-4372-8485-750A86E9F6E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32F1365-EAF8-4570-B2FF-45E47E8586F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD07F9B-6BB3-4423-8DBE-4E89A6478E65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FE4F28-B704-4325-AE8A-C790163FEE71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E832BC0C-8439-4779-9064-C2D93F231031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA99DF94-D031-4375-9A16-306606FE28F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC149D03-5609-46E6-A1B3-F4D91F282B49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D7FC6F-1370-4272-97E5-226C2ED1D335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164D5774-D51B-47C6-AD32-ED6B84E78BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27ACBA2A-87A7-4836-A474-AFD7D22F820D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73E0B2E-BABF-4998-A1D7-4E803F9D78AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"959107AC-E9EC-467C-901B-A3164E3762E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F944F8F-0255-42BE-BD44-D21EC9F0FFC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F39C535-5A41-47CE-A9CF-B360998D4BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA16A6D-2747-4DAC-A30A-166F1FD906FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"289F9874-FC01-4809-9BDA-1AF583FB60B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74EDFC67-E4EE-4D2C-BF9F-5881C987C662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"826869BE-4874-4BBA-9392-14851560BA10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF52D477-3045-45D1-9FD3-12F396266463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88E310BF-F1F6-4124-A875-81967B9B531E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B330F8F-F0DA-472C-A932-AD1D232C7DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF59DAA-268C-4FCF-A0AA-7967128AEBC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140ED95D-173C-4ADB-A2E6-97F0D595D1AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9B00E1-3E50-4356-B6D9-F84BCD552402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552319A9-01F7-47BA-83B3-B2DD648AA07E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEE52F59-AABA-4069-A909-64AD5DFD2B18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20D7966E-B02B-48C8-BF96-723DD6C25314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA618249-E76F-4104-9326-C9F2DC8DE3D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C925E1F-6BD9-4CD1-8AC4-4263A9094786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EE76D9-6D18-4823-B6B0-E1394A4D140C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D726F07-06F1-4B0A-B010-E607E0C2A280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FAD2427-82A3-4E64-ADB5-FA4F40B568F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D5A647-AC21-40AC-8B3C-EE5D3EDA038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BAE999A-5244-46CF-8C12-D68E789BDEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6468D3D-C5A7-4FAE-B4B9-AD862CD11055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E4808D-592E-46A6-A83A-A46227D817B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB45136-ACCD-4230-8975-0EBB30D5B375\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C39AC1-1B96-4253-9FC8-4CC26D6261F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9102C8-F211-4E50-967F-FD51C7FC904F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4933642-89E5-4909-AD3C-862CD3B77790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A6C776-79B3-47ED-B013-100B8F08E1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E504F28A-44CE-4B3E-9330-6A98728E3AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA0DD43-D206-4C1C-8B17-DA47F96B3BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1983172D-4F52-479F-BF14-A84B92D36864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4122D982-A57A-4249-A8DC-CE9FC6C98803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96464380-F665-4266-B0AD-693E078C9F82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C230B8A-570D-4F58-83E1-AFA50B813EA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD3F39CB-C4C2-4B13-94F0-9E44322314BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A71873-0EB2-418F-AE33-8474A1010FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DF0B07-8C2A-4341-8AFF-DE7E5E5B3A43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E6BD0EE-649E-4ED6-A09C-8364335DEF52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE11554-FE3C-4C8B-8986-5D88E4967342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C11983-22A8-4859-A240-571A7815FF54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CD0B0A-2B91-45DD-9522-8D1D3850CC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7026F0E-72A7-4CDF-BADC-E34FE6FADC51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63B85369-FBAE-456C-BC99-5418B043688A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86434346-D5F0-49BA-803E-244C3266E361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2FA7B3C-002D-4755-B323-CA24B770A5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CB7EBC-F3D5-4855-A8D8-BA5AB21FD719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A5530C-DF29-421B-9712-3454C1769446\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41170977-FEEA-4B51-BF98-8493096CD691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B05791F9-0B31-4C4C-A9BA-9268CAA45FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D975CBA-7F01-4A4C-991B-9571410C4F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D7AF29-4E08-4BFD-AFE0-994309E66F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2EFA476-5021-4A00-859E-1643009D6156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6E3A5DC-A237-46E4-A4E5-F135482F984A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD69468-8067-4A5D-B2B0-EC510D889AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20AE4051-FA3B-4F0B-BD3D-083A14269FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67FB5ABE-3C40-4C58-B91F-0621C2180FAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53909FD6-EC74-4D2F-99DA-26E70400B53F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55FE024D-0D43-40AD-9645-8C54ECF17824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC411A8D-CD39-46F5-B8FC-6753E618FAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D46E2E00-BA86-4002-B67B-2C1A6C1AAAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91AD8BA2-EB8D-4D8B-B707-AF5C2A831998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F22403-B4EE-4303-9C94-915D3E0AC944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"828E3DE1-B62E-4FEC-AAD3-EB0E452C9CBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596EC5DD-D7F4-44C8-B4B5-E2DC142FC486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C356E0E6-5B87-40CF-996E-6FFEDFD82A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBCA75A6-0A3E-4393-8884-9F3CE190641E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3C12D3-7662-46C5-9E88-D1BE6CF605E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046B53A0-6BC1-461A-9C28-C534CE12C4BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1C767F-3E06-43B7-A0CC-D51D97A053EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A950B0-A7CA-4CE7-A393-A18C8C41B08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E221CB-BD0F-4AEE-8646-998B75647714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225382DE-2919-48F4-9CC0-DE685EAAFDF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA2DFE7-F478-46EC-9832-4B2C738FC879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39FE5927-2421-4CBE-97EA-6AED892DA1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D619BF54-1BA9-45D0-A876-92D7010088A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EA365-DED5-4436-AAC2-5553529DE700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D94F400-5A35-41F5-B37F-E9DA6F87ED8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5364CB94-BEA3-4E9A-A2F9-EE96A2D7F8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FD5D12-CF1A-4990-99B3-1840EFBA5611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD2D11D-FF08-44E4-BF67-D8DD1E701FCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F788D156-1F1F-4A08-848B-257BC4CCE000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795ED164-7800-4D50-8E37-665BE30190D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B0664B8-1670-4F47-A01E-089D05A9618A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6826018-5620-4924-BE92-6A245378F610\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49A07CF-12BA-481C-B5FF-754520080A8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F203C7D1-AA92-4367-B7A5-EBAE6B76EE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC0C3DC-4761-488A-90A9-6EA45EE61526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EE065B-F8B6-4125-8486-B2EE0566B27A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5245DEF8-64BE-47C9-AA3C-DF3F7F92A89F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:7.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E08AAC-9C5E-4D18-817C-C466D1D6C4DE\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20269\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC\", \"name\": \"cisco-sa-asaftd-ravpn-auth-8LyfCkeC\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:05:36.935Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20269\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-11-15T16:35:58.673645Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-09-13\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20269\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-09-13T00:00:00+00:00\", \"value\": \"CVE-2023-20269 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-20269\", \"tags\": [\"government-resource\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-23T18:58:10.521Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCwh23100\", \"CSCwh45108\"], \"advisory\": \"cisco-sa-asaftd-ravpn-auth-8LyfCkeC\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Adaptive Security Appliance (ASA) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.8.1\"}, {\"status\": \"affected\", \"version\": \"9.8.1.5\"}, {\"status\": \"affected\", \"version\": \"9.8.1.7\"}, {\"status\": \"affected\", \"version\": \"9.8.2\"}, {\"status\": \"affected\", \"version\": \"9.8.2.8\"}, {\"status\": \"affected\", \"version\": \"9.8.2.14\"}, {\"status\": \"affected\", \"version\": \"9.8.2.15\"}, {\"status\": \"affected\", \"version\": \"9.8.2.17\"}, {\"status\": \"affected\", \"version\": \"9.8.2.20\"}, {\"status\": \"affected\", \"version\": \"9.8.2.24\"}, {\"status\": \"affected\", \"version\": \"9.8.2.26\"}, {\"status\": \"affected\", \"version\": \"9.8.2.28\"}, {\"status\": \"affected\", \"version\": \"9.8.2.33\"}, {\"status\": \"affected\", \"version\": \"9.8.2.35\"}, {\"status\": \"affected\", \"version\": \"9.8.2.38\"}, {\"status\": \"affected\", \"version\": \"9.8.3.8\"}, {\"status\": \"affected\", \"version\": \"9.8.3.11\"}, {\"status\": \"affected\", \"version\": \"9.8.3.14\"}, {\"status\": \"affected\", \"version\": \"9.8.3.16\"}, {\"status\": \"affected\", \"version\": \"9.8.3.18\"}, {\"status\": \"affected\", \"version\": \"9.8.3.21\"}, {\"status\": \"affected\", \"version\": \"9.8.3\"}, {\"status\": \"affected\", \"version\": \"9.8.3.26\"}, {\"status\": \"affected\", \"version\": \"9.8.3.29\"}, {\"status\": \"affected\", \"version\": \"9.8.4\"}, {\"status\": \"affected\", \"version\": \"9.8.4.3\"}, {\"status\": \"affected\", \"version\": \"9.8.4.7\"}, {\"status\": \"affected\", \"version\": \"9.8.4.8\"}, {\"status\": \"affected\", \"version\": \"9.8.4.10\"}, {\"status\": \"affected\", \"version\": \"9.8.4.12\"}, {\"status\": \"affected\", \"version\": \"9.8.4.15\"}, {\"status\": \"affected\", \"version\": \"9.8.4.17\"}, {\"status\": \"affected\", \"version\": \"9.8.4.25\"}, {\"status\": \"affected\", \"version\": \"9.8.4.20\"}, {\"status\": \"affected\", \"version\": \"9.8.4.22\"}, {\"status\": \"affected\", \"version\": \"9.8.4.26\"}, {\"status\": \"affected\", \"version\": \"9.8.4.29\"}, {\"status\": \"affected\", \"version\": \"9.8.4.32\"}, {\"status\": \"affected\", \"version\": \"9.8.4.33\"}, {\"status\": \"affected\", \"version\": \"9.8.4.34\"}, {\"status\": \"affected\", \"version\": \"9.8.4.35\"}, {\"status\": \"affected\", \"version\": \"9.8.4.39\"}, {\"status\": \"affected\", \"version\": \"9.8.4.40\"}, {\"status\": \"affected\", \"version\": \"9.8.4.41\"}, {\"status\": \"affected\", \"version\": \"9.8.4.43\"}, {\"status\": \"affected\", \"version\": \"9.8.4.44\"}, {\"status\": \"affected\", \"version\": \"9.8.4.45\"}, {\"status\": \"affected\", \"version\": \"9.8.4.46\"}, {\"status\": \"affected\", \"version\": \"9.8.4.48\"}, {\"status\": \"affected\", \"version\": \"9.12.1\"}, {\"status\": \"affected\", \"version\": \"9.12.1.2\"}, {\"status\": \"affected\", \"version\": \"9.12.1.3\"}, {\"status\": \"affected\", \"version\": \"9.12.2\"}, {\"status\": \"affected\", \"version\": \"9.12.2.4\"}, {\"status\": \"affected\", \"version\": \"9.12.2.5\"}, {\"status\": \"affected\", \"version\": \"9.12.2.9\"}, {\"status\": \"affected\", \"version\": \"9.12.3\"}, {\"status\": \"affected\", \"version\": \"9.12.3.2\"}, {\"status\": \"affected\", \"version\": \"9.12.3.7\"}, {\"status\": \"affected\", \"version\": \"9.12.4\"}, {\"status\": \"affected\", \"version\": \"9.12.3.12\"}, {\"status\": \"affected\", \"version\": \"9.12.3.9\"}, {\"status\": \"affected\", \"version\": \"9.12.2.1\"}, {\"status\": \"affected\", \"version\": \"9.12.4.2\"}, {\"status\": \"affected\", \"version\": \"9.12.4.4\"}, {\"status\": \"affected\", \"version\": \"9.12.4.7\"}, {\"status\": \"affected\", \"version\": \"9.12.4.10\"}, {\"status\": \"affected\", \"version\": \"9.12.4.13\"}, {\"status\": \"affected\", \"version\": \"9.12.4.8\"}, {\"status\": \"affected\", \"version\": \"9.12.4.18\"}, {\"status\": \"affected\", \"version\": \"9.12.4.24\"}, {\"status\": \"affected\", \"version\": \"9.12.4.26\"}, {\"status\": \"affected\", \"version\": \"9.12.4.29\"}, {\"status\": \"affected\", \"version\": \"9.12.4.30\"}, {\"status\": \"affected\", \"version\": \"9.12.4.35\"}, {\"status\": \"affected\", \"version\": \"9.12.4.37\"}, {\"status\": \"affected\", \"version\": \"9.12.4.38\"}, {\"status\": \"affected\", \"version\": \"9.12.4.39\"}, {\"status\": \"affected\", \"version\": \"9.12.4.40\"}, {\"status\": \"affected\", \"version\": \"9.12.4.41\"}, {\"status\": \"affected\", \"version\": \"9.12.4.47\"}, {\"status\": \"affected\", \"version\": \"9.12.4.48\"}, {\"status\": \"affected\", \"version\": \"9.12.4.50\"}, {\"status\": \"affected\", \"version\": \"9.12.4.52\"}, {\"status\": \"affected\", \"version\": \"9.12.4.54\"}, {\"status\": \"affected\", \"version\": \"9.12.4.55\"}, {\"status\": \"affected\", \"version\": \"9.12.4.56\"}, {\"status\": \"affected\", \"version\": \"9.12.4.58\"}, {\"status\": \"affected\", \"version\": \"9.14.1\"}, {\"status\": \"affected\", \"version\": \"9.14.1.10\"}, {\"status\": \"affected\", \"version\": \"9.14.1.6\"}, {\"status\": \"affected\", \"version\": \"9.14.1.15\"}, {\"status\": \"affected\", \"version\": \"9.14.1.19\"}, {\"status\": \"affected\", \"version\": \"9.14.1.30\"}, {\"status\": \"affected\", \"version\": \"9.14.2\"}, {\"status\": \"affected\", \"version\": \"9.14.2.4\"}, {\"status\": \"affected\", \"version\": \"9.14.2.8\"}, {\"status\": \"affected\", \"version\": \"9.14.2.13\"}, {\"status\": \"affected\", \"version\": \"9.14.2.15\"}, {\"status\": \"affected\", \"version\": \"9.14.3\"}, {\"status\": \"affected\", \"version\": \"9.14.3.1\"}, {\"status\": \"affected\", \"version\": \"9.14.3.9\"}, {\"status\": \"affected\", \"version\": \"9.14.3.11\"}, {\"status\": \"affected\", \"version\": \"9.14.3.13\"}, {\"status\": \"affected\", \"version\": \"9.14.3.18\"}, {\"status\": \"affected\", \"version\": \"9.14.3.15\"}, {\"status\": \"affected\", \"version\": \"9.14.4\"}, {\"status\": \"affected\", \"version\": \"9.14.4.6\"}, {\"status\": \"affected\", \"version\": \"9.14.4.7\"}, {\"status\": \"affected\", \"version\": \"9.14.4.12\"}, {\"status\": \"affected\", \"version\": \"9.14.4.13\"}, {\"status\": \"affected\", \"version\": \"9.14.4.14\"}, {\"status\": \"affected\", \"version\": \"9.14.4.15\"}, {\"status\": \"affected\", \"version\": \"9.14.4.17\"}, {\"status\": \"affected\", \"version\": \"9.14.4.22\"}, {\"status\": \"affected\", \"version\": \"9.14.4.23\"}, {\"status\": \"affected\", \"version\": \"9.15.1\"}, {\"status\": \"affected\", \"version\": \"9.15.1.7\"}, {\"status\": \"affected\", \"version\": \"9.15.1.10\"}, {\"status\": \"affected\", \"version\": \"9.15.1.15\"}, {\"status\": \"affected\", \"version\": \"9.15.1.16\"}, {\"status\": \"affected\", \"version\": \"9.15.1.17\"}, {\"status\": \"affected\", \"version\": \"9.15.1.1\"}, {\"status\": \"affected\", \"version\": \"9.15.1.21\"}, {\"status\": \"affected\", \"version\": \"9.16.1\"}, {\"status\": \"affected\", \"version\": \"9.16.1.28\"}, {\"status\": \"affected\", \"version\": \"9.16.2\"}, {\"status\": \"affected\", \"version\": \"9.16.2.3\"}, {\"status\": \"affected\", \"version\": \"9.16.2.7\"}, {\"status\": \"affected\", \"version\": \"9.16.2.11\"}, {\"status\": \"affected\", \"version\": \"9.16.2.13\"}, {\"status\": \"affected\", \"version\": \"9.16.2.14\"}, {\"status\": \"affected\", \"version\": \"9.16.3\"}, {\"status\": \"affected\", \"version\": \"9.16.3.3\"}, {\"status\": \"affected\", \"version\": \"9.16.3.14\"}, {\"status\": \"affected\", \"version\": \"9.16.3.15\"}, {\"status\": \"affected\", \"version\": \"9.16.3.19\"}, {\"status\": \"affected\", \"version\": \"9.16.3.23\"}, {\"status\": \"affected\", \"version\": \"9.16.4\"}, {\"status\": \"affected\", \"version\": \"9.16.4.9\"}, {\"status\": \"affected\", \"version\": \"9.16.4.14\"}, {\"status\": \"affected\", \"version\": \"9.16.4.18\"}, {\"status\": \"affected\", \"version\": \"9.16.4.19\"}, {\"status\": \"affected\", \"version\": \"9.16.4.27\"}, {\"status\": \"affected\", \"version\": \"9.16.4.38\"}, {\"status\": \"affected\", \"version\": \"9.17.1\"}, {\"status\": \"affected\", \"version\": \"9.17.1.7\"}, {\"status\": \"affected\", \"version\": \"9.17.1.9\"}, {\"status\": \"affected\", \"version\": \"9.17.1.10\"}, {\"status\": \"affected\", \"version\": \"9.17.1.11\"}, {\"status\": \"affected\", \"version\": \"9.17.1.13\"}, {\"status\": \"affected\", \"version\": \"9.17.1.15\"}, {\"status\": \"affected\", \"version\": \"9.17.1.20\"}, {\"status\": \"affected\", \"version\": \"9.17.1.30\"}, {\"status\": \"affected\", \"version\": \"9.18.1\"}, {\"status\": \"affected\", \"version\": \"9.18.1.3\"}, {\"status\": \"affected\", \"version\": \"9.18.2\"}, {\"status\": \"affected\", \"version\": \"9.18.2.5\"}, {\"status\": \"affected\", \"version\": \"9.18.2.7\"}, {\"status\": \"affected\", \"version\": \"9.18.2.8\"}, {\"status\": \"affected\", \"version\": \"9.18.3\"}, {\"status\": \"affected\", \"version\": \"9.18.3.39\"}, {\"status\": \"affected\", \"version\": \"9.18.3.46\"}, {\"status\": \"affected\", \"version\": \"9.18.3.53\"}, {\"status\": \"affected\", \"version\": \"9.18.3.55\"}, {\"status\": \"affected\", \"version\": \"9.19.1\"}, {\"status\": \"affected\", \"version\": \"9.19.1.5\"}, {\"status\": \"affected\", \"version\": \"9.19.1.9\"}, {\"status\": \"affected\", \"version\": \"9.19.1.12\"}, {\"status\": \"affected\", \"version\": \"9.19.1.18\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Firepower Threat Defense Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.3\"}, {\"status\": \"affected\", \"version\": \"6.2.3.1\"}, {\"status\": \"affected\", \"version\": \"6.2.3.2\"}, {\"status\": \"affected\", \"version\": \"6.2.3.3\"}, {\"status\": \"affected\", \"version\": \"6.2.3.4\"}, {\"status\": \"affected\", \"version\": \"6.2.3.5\"}, {\"status\": \"affected\", \"version\": \"6.2.3.6\"}, {\"status\": \"affected\", \"version\": \"6.2.3.7\"}, {\"status\": \"affected\", \"version\": \"6.2.3.8\"}, {\"status\": \"affected\", \"version\": \"6.2.3.10\"}, {\"status\": \"affected\", \"version\": \"6.2.3.11\"}, {\"status\": \"affected\", \"version\": \"6.2.3.9\"}, {\"status\": \"affected\", \"version\": \"6.2.3.12\"}, {\"status\": \"affected\", \"version\": \"6.2.3.13\"}, {\"status\": \"affected\", \"version\": \"6.2.3.14\"}, {\"status\": \"affected\", \"version\": \"6.2.3.15\"}, {\"status\": \"affected\", \"version\": \"6.2.3.16\"}, {\"status\": \"affected\", \"version\": \"6.2.3.17\"}, {\"status\": \"affected\", \"version\": \"6.2.3.18\"}, {\"status\": \"affected\", \"version\": \"6.6.0\"}, {\"status\": \"affected\", \"version\": \"6.6.0.1\"}, {\"status\": \"affected\", \"version\": \"6.6.1\"}, {\"status\": \"affected\", \"version\": \"6.6.3\"}, {\"status\": \"affected\", \"version\": \"6.6.4\"}, {\"status\": \"affected\", \"version\": \"6.6.5\"}, {\"status\": \"affected\", \"version\": \"6.6.5.1\"}, {\"status\": \"affected\", \"version\": \"6.6.5.2\"}, {\"status\": \"affected\", \"version\": \"6.6.7\"}, {\"status\": \"affected\", \"version\": \"6.6.7.1\"}, {\"status\": \"affected\", \"version\": \"6.4.0\"}, {\"status\": \"affected\", \"version\": \"6.4.0.1\"}, {\"status\": \"affected\", \"version\": \"6.4.0.3\"}, {\"status\": \"affected\", \"version\": \"6.4.0.2\"}, {\"status\": \"affected\", \"version\": \"6.4.0.4\"}, {\"status\": \"affected\", \"version\": \"6.4.0.5\"}, {\"status\": \"affected\", \"version\": \"6.4.0.6\"}, {\"status\": \"affected\", \"version\": \"6.4.0.7\"}, {\"status\": \"affected\", \"version\": \"6.4.0.8\"}, {\"status\": \"affected\", \"version\": \"6.4.0.9\"}, {\"status\": \"affected\", \"version\": \"6.4.0.10\"}, {\"status\": \"affected\", \"version\": \"6.4.0.11\"}, {\"status\": \"affected\", \"version\": \"6.4.0.12\"}, {\"status\": \"affected\", \"version\": \"6.4.0.13\"}, {\"status\": \"affected\", \"version\": \"6.4.0.14\"}, {\"status\": \"affected\", \"version\": \"6.4.0.15\"}, {\"status\": \"affected\", \"version\": \"6.4.0.16\"}, {\"status\": \"affected\", \"version\": \"6.7.0\"}, {\"status\": \"affected\", \"version\": \"6.7.0.1\"}, {\"status\": \"affected\", \"version\": \"6.7.0.2\"}, {\"status\": \"affected\", \"version\": \"6.7.0.3\"}, {\"status\": \"affected\", \"version\": \"7.0.0\"}, {\"status\": \"affected\", \"version\": \"7.0.0.1\"}, {\"status\": \"affected\", \"version\": \"7.0.1\"}, {\"status\": \"affected\", \"version\": \"7.0.1.1\"}, {\"status\": \"affected\", \"version\": \"7.0.2\"}, {\"status\": \"affected\", \"version\": \"7.0.2.1\"}, {\"status\": \"affected\", \"version\": \"7.0.3\"}, {\"status\": \"affected\", \"version\": \"7.0.4\"}, {\"status\": \"affected\", \"version\": \"7.0.5\"}, {\"status\": \"affected\", \"version\": \"7.0.6\"}, {\"status\": \"affected\", \"version\": \"7.1.0\"}, {\"status\": \"affected\", \"version\": \"7.1.0.1\"}, {\"status\": \"affected\", \"version\": \"7.1.0.2\"}, {\"status\": \"affected\", \"version\": \"7.1.0.3\"}, {\"status\": \"affected\", \"version\": \"7.2.0\"}, {\"status\": \"affected\", \"version\": \"7.2.0.1\"}, {\"status\": \"affected\", \"version\": \"7.2.1\"}, {\"status\": \"affected\", \"version\": \"7.2.2\"}, {\"status\": \"affected\", \"version\": \"7.2.3\"}, {\"status\": \"affected\", \"version\": \"7.2.4\"}, {\"status\": \"affected\", \"version\": \"7.2.4.1\"}, {\"status\": \"affected\", \"version\": \"7.2.5\"}, {\"status\": \"affected\", \"version\": \"7.3.0\"}, {\"status\": \"affected\", \"version\": \"7.3.1\"}, {\"status\": \"affected\", \"version\": \"7.3.1.1\"}, {\"status\": \"affected\", \"version\": \"7.4.0\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"In August 2023, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability once available and apply one of the suggested workarounds in the meantime.\\r\\n\\r\\nFor information on observed attempted exploitation of this vulnerability, see the Cisco blog post on Akira Ransomware Targeting VPNs without Multi-Factor Authentication [\\\"https://blogs.cisco.com/security/akira-ransomware-targeting-vpns-without-multi-factor-authentication\\\"]. As explained in this blog post, organizations can significantly reduce the risk of unauthorized access, including a potential ransomware infection, by enabling MFA in VPN implementations.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC\", \"name\": \"cisco-sa-asaftd-ravpn-auth-8LyfCkeC\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\\r\\n\\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\\r\\n\\r \\r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\\r \\r Notes:\\r\\n\\r \\r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\\r \\r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-288\", \"description\": \"Authentication Bypass Using an Alternate Path or Channel\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-01-25T16:58:36.839Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-20269\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:05:39.522Z\", \"dateReserved\": \"2022-10-27T18:47:50.373Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2023-09-06T17:09:29.663Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…