cve-2024-41927
Vulnerability from cvelistv5
Published
2024-09-04 00:43
Modified
2024-09-04 13:59
Severity ?
Summary
Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.
Impacted products
Vendor Product Version
IDEC Corporation FC6B Series MICROSmart All-in-One CPU module Version: Ver.2.60 and earlier
IDEC Corporation FC6A Series MICROSmart Plus CPU module Version: Ver.2.40 and earlier
IDEC Corporation FC6B Series MICROSmart Plus CPU module Version: Ver.2.60 and earlier
IDEC Corporation FT1A Series SmartAXIS Pro/Lite Version: Ver.2.41 and earlier
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41927",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-04T13:59:49.820372Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-04T13:59:57.911Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "FC6A Series MICROSmart All-in-One CPU module",
          "vendor": "IDEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.60 and earlier"
            }
          ]
        },
        {
          "product": "FC6B Series MICROSmart All-in-One CPU module",
          "vendor": "IDEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.60 and earlier"
            }
          ]
        },
        {
          "product": "FC6A Series MICROSmart Plus CPU module",
          "vendor": "IDEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.40 and earlier"
            }
          ]
        },
        {
          "product": "FC6B Series MICROSmart Plus CPU module",
          "vendor": "IDEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.60 and earlier"
            }
          ]
        },
        {
          "product": "FT1A Series SmartAXIS Pro/Lite",
          "vendor": "IDEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.41 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC\u0027s serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cleartext transmission of sensitive information",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-04T00:43:55.555Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://us.idec.com/media/24-RD-0256-EN.pdf"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU96959731/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-41927",
    "datePublished": "2024-09-04T00:43:55.555Z",
    "dateReserved": "2024-08-01T01:18:07.241Z",
    "dateUpdated": "2024-09-04T13:59:57.911Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-kc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"C5591819-239C-40EC-AA71-287BB29AEBB6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-kc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2519C69F-CBCD-499A-822B-2DCA7FA7411E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-pc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"E8B390E0-E868-4200-A398-419589E45525\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-pc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF8595-9323-4049-9EC8-BB7CCECA7C53\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"393B2F7C-29EB-4C42-827E-75C28285066D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2506B27-5362-4938-ACC3-94AF3A8957D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-ra-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"AFA52C42-13C2-4552-9B04-326FDFB88C0B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-ra-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D2A46ED-1B97-4487-98FB-E6164E137B61\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-ra-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"B2BF8E45-263C-4454-9C94-5A49B893C2B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-ra-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"778905B0-444B-492A-8434-FD381A2563B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-ra-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"B727FEF0-A8C9-4030-A7CA-B7D088B76374\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-ra-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF27ED81-A706-4094-BE6F-601AC3C2299E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-rc-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"5EF64248-E833-4084-8544-DCF0E1B2C25F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-rc-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4832324-A5ED-43C5-BD76-9C92366F5A1E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-rc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"536DF463-9E0C-4DDE-A418-C2FA36B23595\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-rc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25DF4C0F-9774-4405-A6CE-AD7874D1D967\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-rc-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"B8478BED-B7BF-4D6F-B559-8ECD24ABDF68\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-rc-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0039449B-4E8D-4C49-81A2-0E60C00C4934\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-24-rc-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"42110BE3-85E8-4CBA-9463-455CA886ED9B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-24-rc-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2973B81D-0530-479F-81D2-1491019246A5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c24r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"AAB12A99-B793-40B0-83EC-A1B5AB591B11\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c24r-hg2g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD3DE846-8DFF-431E-92E0-68F3840F46AD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c24r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"2FE9949A-1D37-48AB-92D2-8AE0CA940B9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c24r-hg3g-v8hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBDFB055-5F8C-42D9-A293-DA44DCEFA8A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c24r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"49CD5716-8AAD-4FF6-99DA-32CB2162AB8E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c24r-hg3g-vahp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E20C8F-EADD-4985-A468-2C30002922AD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c24r-hg4g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"5B0303EB-2957-4D7A-ACCE-495BD1C15CE9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c24r-hg4g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11EB1BEC-267B-4B86-9934-CCF719952324\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c24r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"F90375E5-9CB7-4AE4-9595-9B0DA523D23D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c24r-hg5g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC4ACD71-2DBD-4BC2-AC25-26626BAA3EC1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-pc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6\", \"matchCriteriaId\": \"5C4F4E52-38D3-456E-B697-577B621FF313\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-pc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC8C836F-876D-40F0-8CF0-CA790F410B5B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"D039014E-7F69-4B70-A9A2-997140335636\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C894A83-E990-4986-95B2-19A0959C9B1B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-kc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"9251E5A1-0023-4907-A9F5-D21CC6CA99EB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-kc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74FD009F-7337-418A-BCCD-868F7BF9AA57\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-ra-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"57CF1294-F942-4438-8E5B-80C160DBB85D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-ra-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73EFC4AB-E652-4779-BE78-A0D4782CD0DF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-ra-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"927AF3EF-C32B-4A0B-8C1E-D57F4554B1B1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-ra-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"465F818B-C957-493D-8BBF-AB16C44A01E6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-ra-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"C9B64AC0-5CC1-4572-B8A9-313583148708\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-ra-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"171ECFD7-F4BF-4439-86BA-4D00375F0994\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-rc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"A4051DC2-0C60-4E92-96BA-5C4618FE598B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-rc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC0DC0EB-C78D-44A3-964E-5E8D6E44C9A6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-rc-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"CD0B1F0C-3D9B-4C78-AAB9-8A41B2344986\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-rc-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92F4A9E2-E2C0-4BFD-951F-7227FEE021E9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-rc-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"6B7E19B2-28CE-4E90-AC3E-456B79D29794\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-rc-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4F85331-7082-4D99-B924-F7A40874B7E4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-rc-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"1AB98499-11E2-453E-9417-D8623E84FD6A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-rc-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42674165-3A64-4ABB-8435-CAF9AE29933A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-kd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"65112070-580F-4F9B-B505-BD1A59DA9351\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-kd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F696DEB-2B0D-46F1-8481-C27D6E6F8438\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-pd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"95986F89-5016-4156-80F9-99246A2769D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-pd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB9F2351-9489-49C3-865A-6DED905703D6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c16r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"AB347A48-2081-4385-A5E5-B3AA55B11DF4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c16r-hg2g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05A6747E-93F4-4619-BC4D-EE2D7FAA093A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c16r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"514B9777-8FD0-413A-A2CB-B24A20BF7794\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c16r-hg3g-v8hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4A972DA-CBAD-4141-867F-CDD36D0AFF31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c16r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"05062F00-81F4-45AA-A34E-754FABE769FC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c16r-hg3g-vahp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6A8DFB5-B9AE-45D8-B259-48BF12853953\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"F52D1AD7-C7FF-49F0-867D-C800CA35A759\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c16r-hg5g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549ACBF-D0D3-4FD2-BB4B-EB82971248FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-c16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"F52D1AD7-C7FF-49F0-867D-C800CA35A759\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-c16r-hg5g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549ACBF-D0D3-4FD2-BB4B-EB82971248FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-rd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"E272F507-63D8-412E-A56B-8EA3B943E4EF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-rd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A5013BA-BF99-4728-BF33-08030B3322D8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-16-rd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"E272F507-63D8-412E-A56B-8EA3B943E4EF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-16-rd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A5013BA-BF99-4728-BF33-08030B3322D8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-40-kd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"A912AD4A-6F44-49B3-B5BC-532E573B783B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-40-kd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE6E09EE-FE9D-4BD1-8B02-7A11A519A1B6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-40-pc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"6916FAF0-78DD-40C0-BA8B-995037AF01F5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-40-pc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD572A95-1B47-4592-80CA-5572C749BD96\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-40-pd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"C8DA45F7-3B60-4570-AF31-848D083E14E3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-40-pd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D3E6DA9-46D5-4ED2-A442-112B69320209\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-40-ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"811F1405-B33F-4AA4-90ED-425332E86548\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-40-ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0698390-2E86-4F19-B6B6-3ACFA33FD0DA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-40-rd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"F3EC3FED-A41F-41D8-A50D-F35EEAEBB944\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-40-rd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB9A6521-C87A-42CF-BF14-4CFF8066DF1A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-40-rc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.60\", \"matchCriteriaId\": \"84F73641-D7BD-491B-B000-BE0768571F78\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-40-rc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42931BD1-A53C-4D15-8C71-2D71EAD4ED98\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16p-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"3715E883-6C7E-448E-9013-CD9F843AF016\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16p-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40B9F3F9-31CA-487C-B731-DB13F80D211A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16p-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"59BB2D09-6A62-434D-B3D4-12A57CB5DC1F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16p-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8947F40B-1506-4D8E-9750-39CDD940F479\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16p-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"42D9290F-155C-4E11-8AB1-4D6B5857DF22\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16p-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CA659F9-8C4B-4628-B2C8-E476D7EA43D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"D9D2CAB8-0A0F-438C-B32A-06EA5BECECE7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EF5AC88-2BD3-4E26-9E02-BC480717C448\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"9C493595-910F-4908-8727-01C003E83337\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4B242E-BC30-40B5-857A-FBC302E5D191\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"A4F0C2C3-5CC6-44A5-A8CB-70FC322DA369\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg3g-v8hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A82E112-5AF0-4512-96A3-DE2A05896A2A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"AF4321C8-93F1-42CC-BFD3-60B5B2C8CB00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg3g-vahp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43A176A-AA2E-4182-BB54-502963EE194C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg4g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"5594A0F2-FBA8-4FE1-B56B-AFFDA26794B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg4g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF6D8A84-52C3-4687-AD0D-33FFE6E07764\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"CE5C694C-435E-4710-B6D5-E3A9441D62F5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg5g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4ACB61B-1D40-4388-BE93-7CFAD75CF765\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"42C7F307-B5AC-4600-88C3-1FDC51BD2A3D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"083FC621-B444-474A-8344-7DB3C32320D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"4FCC7EA9-AF43-45A2-BB3D-7509FEC8BFB3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-vhp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27E6A7B1-1E3D-4133-95C4-65F4230031DA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-p16-k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"BDD06B86-B260-40FB-8323-839AB11D1BA0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-p16-k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DE4C5C2-32D0-41B9-BACD-02B8B480D983\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-p16-r_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"C0C83520-0600-4C29-8E32-712A26A6F8BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-p16-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8AD540-B55B-49B3-B6BE-72FD672CAF82\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-p16-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"600E6643-752F-461E-9901-CBD164A0109F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-p16-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2964052B-CD99-4299-85BD-270854BE80A8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-h12ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"8A58080C-7D7C-4A32-B5EC-F7A5B12D5B2D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-h12ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05E43E48-30D2-4721-9AF2-852E606FD990\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-h24ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"0AF0A218-CC2B-4138-999C-8A2BAA8B95F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-h24ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D25D6F3-A93A-418D-A896-132C11C54ABF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-h24rc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"02E100ED-CB88-4ED1-9FE7-C2C5F97F077F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-h24rc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D05FF9C-4838-4BA8-93FE-FEB6FABE4084\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-h12rc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"337052CA-AACF-40B7-BB67-D72D1C05C1D5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-h12rc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1E009EB-206C-4B89-ABFC-97C339A3F982\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-b12ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"1032FB1D-E64D-4756-992B-97E4A75213FE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-b12ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB778A9F-4A9A-4D32-AF91-29E6BF01CE37\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-b24ra_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"C7009CEF-8515-4D0D-9469-C5175EC4E730\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-b24ra:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2E7090E-81E4-42F1-B9C4-D23CA3A61D01\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-12-bac_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"29731477-84A0-40B7-905B-26D66286DC8A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-12-bac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"814A2490-ED4F-48B7-AB4B-94CD8515B333\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-12-hac_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"C781F354-2908-4CA8-AEB6-DB27D77ECB57\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-12-hac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6B15ED2-AB2B-4A49-992C-E8DAA620C989\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-12-bdc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"7E793E94-D411-4F46-A2D2-2D9CD079BEAA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-12-bdc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F04E0C7F-8B77-466F-AA11-D7FF2B857996\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-12-hdc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"6191E6D6-35DC-4DCB-9681-1431F70DB416\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-12-hdc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A2B9CAB-BD62-48B8-A0ED-F3ADC400FF05\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-24-hac_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"AA39B3FF-0497-4A2E-B39C-DB6F96039682\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-24-hac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECDEFAC7-5705-4892-A0F0-A9409D637129\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-24-bac_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"9E75060D-BEFB-43B8-95DD-1BC39C4E072E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-24-bac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE7F4B16-63AC-4C9B-B5B0-1EC7C691C59A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-24-bdc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"2DEA3C76-C290-4935-96D1-90905E2FB7F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-24-bdc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C01E3DE-CC72-4974-A207-6611B1D8B183\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-24-hdc_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"19D55D03-D3F3-4F2A-84D1-9BB358176188\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-24-hdc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB5BADFB-11C8-4395-A507-65CEA8297483\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-40-bac-r_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"A4649782-34A4-4190-B4B5-63823EA7EB5A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-40-bac-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE34F122-20C4-4A20-8F0D-9095EFC77836\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-40-bdc-rk_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"FD2D5E18-A2B0-4E12-B80B-967841DC3FA1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-40-bdc-rk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49243944-969C-46DF-B0E1-9981F1BDD591\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-40-bdc-rs_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"A6F55920-D9D7-43E9-8937-946908543F7B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-40-bdc-rs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C0C71A9-99C6-4077-BA69-0775F8760744\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-40-hac-r_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"D075D7DD-1B5B-41C7-BDE9-D2D943944D73\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-40-hac-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ABC5140-2624-4349-A430-0DCE42E1C31F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-40-hdc-rk_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"87FE8EE5-D7DB-4544-A4C7-6A5C5921AFB5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-40-hdc-rk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A225EC25-F68E-4C02-92CE-1D1B223EF4ED\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-bac-k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"77AF90A5-6040-43A7-A04C-02BAD2AFF516\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-bac-k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"725D65CF-FFD9-4C97-95FB-9FFE4DA7292F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-40-hdc-rs_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"E1170E1B-41A5-4B5C-9266-B2FAAD643B0C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-40-hdc-rs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFA3E11F-7F85-4403-BBBF-1814F0D28A34\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-bac-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"5CD74126-7918-47BD-BF46-172EC3F63747\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-bac-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD2C8B00-7C46-4FB6-9F17-4E38C1BA4539\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-bdc-k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"D1D7F1C4-69FD-438D-9F29-C8410B1F265C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-bdc-k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"857E7778-8415-408E-B88E-56DAF162C824\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-hac-k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"775DF4C7-EE1B-49E3-A9FA-A9FC2D289293\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-hac-k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDC22C55-846F-4041-8D2F-61196EF372FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-hac-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"03090AE2-2571-4190-8445-85E5D4BC5C56\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-hac-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11672168-5733-47F3-B948-0DFFCBBF3473\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-hac-k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"775DF4C7-EE1B-49E3-A9FA-A9FC2D289293\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-hac-k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDC22C55-846F-4041-8D2F-61196EF372FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-hdc-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"271848FB-16E8-4624-AAAF-359AFC7C61A4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-hdc-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E319607D-93D1-46B1-8FFB-5FF025F24FCA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-smart-48-bdc-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"09CFB949-DCB1-4F0F-8E70-617F21F8C76B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-smart-48-bdc-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCB2F29-AC93-42D0-8E96-23A499F52B7E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-pc1_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"39757AB6-1C7B-4D8F-A967-21AD0B217276\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-pc1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7765A7E7-CAB9-47A6-80EE-85C8F644ED0F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-pc2_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"9310BD27-FCC3-4E6C-8820-AAEC3B2B3F04\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-pc2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62CE33D5-6165-4ACD-98EA-0AF383C368BF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-pc3_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"DF3629D5-B20E-43E3-9D61-7EE204720296\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-pc3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CE609B6-B337-4C90-9B69-C14B4DDCB9B6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft1a-pm1_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"0CFF5CCA-CF62-436E-91F6-1221CE09BE9F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft1a-pm1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"533F200D-12B4-469D-B0C2-0CB4662A5B95\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft9z-1a01_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"893252A2-E885-43C0-9C20-E8B9CC22539C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft9z-1a01:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AD744D6-1765-4B46-A8EF-2665E084C905\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:ft9z-psp1pn05_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"78A6DE64-1D61-43E4-85BE-D12093B6CCA3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:ft9z-psp1pn05:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B8C7825-E7EC-4389-B34E-1EEE6BA87DDB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:hg9z-xcm2a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"7865E0D0-1164-4FE1-B979-5433EF61A5BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:hg9z-xcm2a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E37C15A3-67C9-470F-9EBA-9177CA755092\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d32p-hg1g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"3C191287-9F15-4FCB-A6F0-F49AC213889C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d32p-hg1g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3ACF8A3-5836-4901-90E7-71C7B1B56FAF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d32p-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"25FB0D4B-3CC9-4916-9C53-E717BA569A43\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d32p-hg2g-5tn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B865828-82F6-47A6-B78F-38E6B105F088\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-d32p-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"5B07EDF2-35F3-40CB-B2A1-554EFD5B3DFE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-d32p-hg2g-5tt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C4B4261-B80F-4177-BDDC-18EB196AFFCB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-p32-k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"7B354E58-9F30-4BB9-9027-D9050EFE3062\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-p32-k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76EF08C3-A02E-4939-A088-4F3E1E5D5AA4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:idec:kit-fc6a-p32-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.40\", \"matchCriteriaId\": \"40FEFB26-7FBB-453B-AB19-47915394338E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:idec:kit-fc6a-p32-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72D65E62-F6E5-4885-87F0-28CDFFB1352E\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC\u0027s serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de transmisi\\u00f3n de informaci\\u00f3n confidencial en texto plano en varios PLC de IDEC. Si un atacante env\\u00eda un comando espec\\u00edfico al puerto de comunicaci\\u00f3n en serie del PLC, se pueden obtener las credenciales del usuario. Como resultado, se puede obtener el programa del PLC y manipularlo.\"}]",
      "id": "CVE-2024-41927",
      "lastModified": "2024-09-19T15:10:57.793",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 3.6}]}",
      "published": "2024-09-04T01:15:11.827",
      "references": "[{\"url\": \"https://jvn.jp/en/vu/JVNVU96959731/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://us.idec.com/media/24-RD-0256-EN.pdf\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-319\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-41927\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-09-04T01:15:11.827\",\"lastModified\":\"2024-09-19T15:10:57.793\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC\u0027s serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de transmisi\u00f3n de informaci\u00f3n confidencial en texto plano en varios PLC de IDEC. Si un atacante env\u00eda un comando espec\u00edfico al puerto de comunicaci\u00f3n en serie del PLC, se pueden obtener las credenciales del usuario. Como resultado, se puede obtener el programa del PLC y manipularlo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-kc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"C5591819-239C-40EC-AA71-287BB29AEBB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-kc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2519C69F-CBCD-499A-822B-2DCA7FA7411E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"E8B390E0-E868-4200-A398-419589E45525\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF8595-9323-4049-9EC8-BB7CCECA7C53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"393B2F7C-29EB-4C42-827E-75C28285066D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2506B27-5362-4938-ACC3-94AF3A8957D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-ra-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"AFA52C42-13C2-4552-9B04-326FDFB88C0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-ra-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D2A46ED-1B97-4487-98FB-E6164E137B61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-ra-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"B2BF8E45-263C-4454-9C94-5A49B893C2B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-ra-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778905B0-444B-492A-8434-FD381A2563B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-ra-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"B727FEF0-A8C9-4030-A7CA-B7D088B76374\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-ra-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF27ED81-A706-4094-BE6F-601AC3C2299E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-rc-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"5EF64248-E833-4084-8544-DCF0E1B2C25F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-rc-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4832324-A5ED-43C5-BD76-9C92366F5A1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-rc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"536DF463-9E0C-4DDE-A418-C2FA36B23595\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-rc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DF4C0F-9774-4405-A6CE-AD7874D1D967\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-rc-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"B8478BED-B7BF-4D6F-B559-8ECD24ABDF68\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-rc-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0039449B-4E8D-4C49-81A2-0E60C00C4934\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-24-rc-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"42110BE3-85E8-4CBA-9463-455CA886ED9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-24-rc-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2973B81D-0530-479F-81D2-1491019246A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c24r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"AAB12A99-B793-40B0-83EC-A1B5AB591B11\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c24r-hg2g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD3DE846-8DFF-431E-92E0-68F3840F46AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c24r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"2FE9949A-1D37-48AB-92D2-8AE0CA940B9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c24r-hg3g-v8hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBDFB055-5F8C-42D9-A293-DA44DCEFA8A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c24r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"49CD5716-8AAD-4FF6-99DA-32CB2162AB8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c24r-hg3g-vahp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E20C8F-EADD-4985-A468-2C30002922AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c24r-hg4g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"5B0303EB-2957-4D7A-ACCE-495BD1C15CE9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c24r-hg4g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11EB1BEC-267B-4B86-9934-CCF719952324\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c24r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"F90375E5-9CB7-4AE4-9595-9B0DA523D23D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c24r-hg5g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4ACD71-2DBD-4BC2-AC25-26626BAA3EC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6\",\"matchCriteriaId\":\"5C4F4E52-38D3-456E-B697-577B621FF313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8C836F-876D-40F0-8CF0-CA790F410B5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"D039014E-7F69-4B70-A9A2-997140335636\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C894A83-E990-4986-95B2-19A0959C9B1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-kc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"9251E5A1-0023-4907-A9F5-D21CC6CA99EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-kc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FD009F-7337-418A-BCCD-868F7BF9AA57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-ra-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"57CF1294-F942-4438-8E5B-80C160DBB85D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-ra-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73EFC4AB-E652-4779-BE78-A0D4782CD0DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-ra-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"927AF3EF-C32B-4A0B-8C1E-D57F4554B1B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-ra-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465F818B-C957-493D-8BBF-AB16C44A01E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-ra-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"C9B64AC0-5CC1-4572-B8A9-313583148708\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-ra-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171ECFD7-F4BF-4439-86BA-4D00375F0994\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-rc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"A4051DC2-0C60-4E92-96BA-5C4618FE598B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-rc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC0DC0EB-C78D-44A3-964E-5E8D6E44C9A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-rc-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"CD0B1F0C-3D9B-4C78-AAB9-8A41B2344986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-rc-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F4A9E2-E2C0-4BFD-951F-7227FEE021E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-rc-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"6B7E19B2-28CE-4E90-AC3E-456B79D29794\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-rc-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4F85331-7082-4D99-B924-F7A40874B7E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-rc-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"1AB98499-11E2-453E-9417-D8623E84FD6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-rc-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42674165-3A64-4ABB-8435-CAF9AE29933A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-kd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"65112070-580F-4F9B-B505-BD1A59DA9351\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-kd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F696DEB-2B0D-46F1-8481-C27D6E6F8438\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-pd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"95986F89-5016-4156-80F9-99246A2769D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9F2351-9489-49C3-865A-6DED905703D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c16r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"AB347A48-2081-4385-A5E5-B3AA55B11DF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c16r-hg2g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05A6747E-93F4-4619-BC4D-EE2D7FAA093A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c16r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"514B9777-8FD0-413A-A2CB-B24A20BF7794\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c16r-hg3g-v8hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4A972DA-CBAD-4141-867F-CDD36D0AFF31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c16r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"05062F00-81F4-45AA-A34E-754FABE769FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c16r-hg3g-vahp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6A8DFB5-B9AE-45D8-B259-48BF12853953\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"F52D1AD7-C7FF-49F0-867D-C800CA35A759\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c16r-hg5g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549ACBF-D0D3-4FD2-BB4B-EB82971248FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-c16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"F52D1AD7-C7FF-49F0-867D-C800CA35A759\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-c16r-hg5g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549ACBF-D0D3-4FD2-BB4B-EB82971248FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-rd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"E272F507-63D8-412E-A56B-8EA3B943E4EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-rd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A5013BA-BF99-4728-BF33-08030B3322D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-16-rd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"E272F507-63D8-412E-A56B-8EA3B943E4EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-16-rd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A5013BA-BF99-4728-BF33-08030B3322D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-40-kd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"A912AD4A-6F44-49B3-B5BC-532E573B783B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-40-kd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6E09EE-FE9D-4BD1-8B02-7A11A519A1B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-40-pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"6916FAF0-78DD-40C0-BA8B-995037AF01F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-40-pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD572A95-1B47-4592-80CA-5572C749BD96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-40-pd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"C8DA45F7-3B60-4570-AF31-848D083E14E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-40-pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D3E6DA9-46D5-4ED2-A442-112B69320209\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-40-ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"811F1405-B33F-4AA4-90ED-425332E86548\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-40-ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0698390-2E86-4F19-B6B6-3ACFA33FD0DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-40-rd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"F3EC3FED-A41F-41D8-A50D-F35EEAEBB944\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-40-rd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9A6521-C87A-42CF-BF14-4CFF8066DF1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-40-rc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.60\",\"matchCriteriaId\":\"84F73641-D7BD-491B-B000-BE0768571F78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-40-rc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42931BD1-A53C-4D15-8C71-2D71EAD4ED98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16p-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"3715E883-6C7E-448E-9013-CD9F843AF016\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16p-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B9F3F9-31CA-487C-B731-DB13F80D211A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16p-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"59BB2D09-6A62-434D-B3D4-12A57CB5DC1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16p-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8947F40B-1506-4D8E-9750-39CDD940F479\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16p-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"42D9290F-155C-4E11-8AB1-4D6B5857DF22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16p-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA659F9-8C4B-4628-B2C8-E476D7EA43D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"D9D2CAB8-0A0F-438C-B32A-06EA5BECECE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EF5AC88-2BD3-4E26-9E02-BC480717C448\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"9C493595-910F-4908-8727-01C003E83337\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4B242E-BC30-40B5-857A-FBC302E5D191\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"A4F0C2C3-5CC6-44A5-A8CB-70FC322DA369\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg3g-v8hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A82E112-5AF0-4512-96A3-DE2A05896A2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"AF4321C8-93F1-42CC-BFD3-60B5B2C8CB00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg3g-vahp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43A176A-AA2E-4182-BB54-502963EE194C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg4g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"5594A0F2-FBA8-4FE1-B56B-AFFDA26794B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg4g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF6D8A84-52C3-4687-AD0D-33FFE6E07764\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"CE5C694C-435E-4710-B6D5-E3A9441D62F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg5g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4ACB61B-1D40-4388-BE93-7CFAD75CF765\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"42C7F307-B5AC-4600-88C3-1FDC51BD2A3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"083FC621-B444-474A-8344-7DB3C32320D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"4FCC7EA9-AF43-45A2-BB3D-7509FEC8BFB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-vhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E6A7B1-1E3D-4133-95C4-65F4230031DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-p16-k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"BDD06B86-B260-40FB-8323-839AB11D1BA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-p16-k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DE4C5C2-32D0-41B9-BACD-02B8B480D983\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-p16-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"C0C83520-0600-4C29-8E32-712A26A6F8BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-p16-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8AD540-B55B-49B3-B6BE-72FD672CAF82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-p16-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"600E6643-752F-461E-9901-CBD164A0109F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-p16-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2964052B-CD99-4299-85BD-270854BE80A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-h12ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"8A58080C-7D7C-4A32-B5EC-F7A5B12D5B2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-h12ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E43E48-30D2-4721-9AF2-852E606FD990\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-h24ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"0AF0A218-CC2B-4138-999C-8A2BAA8B95F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-h24ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D25D6F3-A93A-418D-A896-132C11C54ABF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-h24rc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"02E100ED-CB88-4ED1-9FE7-C2C5F97F077F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-h24rc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D05FF9C-4838-4BA8-93FE-FEB6FABE4084\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-h12rc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"337052CA-AACF-40B7-BB67-D72D1C05C1D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-h12rc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1E009EB-206C-4B89-ABFC-97C339A3F982\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-b12ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"1032FB1D-E64D-4756-992B-97E4A75213FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-b12ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB778A9F-4A9A-4D32-AF91-29E6BF01CE37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-b24ra_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"C7009CEF-8515-4D0D-9469-C5175EC4E730\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-b24ra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E7090E-81E4-42F1-B9C4-D23CA3A61D01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-12-bac_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"29731477-84A0-40B7-905B-26D66286DC8A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-12-bac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"814A2490-ED4F-48B7-AB4B-94CD8515B333\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-12-hac_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"C781F354-2908-4CA8-AEB6-DB27D77ECB57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-12-hac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6B15ED2-AB2B-4A49-992C-E8DAA620C989\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-12-bdc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"7E793E94-D411-4F46-A2D2-2D9CD079BEAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-12-bdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04E0C7F-8B77-466F-AA11-D7FF2B857996\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-12-hdc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"6191E6D6-35DC-4DCB-9681-1431F70DB416\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-12-hdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A2B9CAB-BD62-48B8-A0ED-F3ADC400FF05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-24-hac_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"AA39B3FF-0497-4A2E-B39C-DB6F96039682\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-24-hac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECDEFAC7-5705-4892-A0F0-A9409D637129\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-24-bac_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"9E75060D-BEFB-43B8-95DD-1BC39C4E072E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-24-bac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7F4B16-63AC-4C9B-B5B0-1EC7C691C59A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-24-bdc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"2DEA3C76-C290-4935-96D1-90905E2FB7F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-24-bdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C01E3DE-CC72-4974-A207-6611B1D8B183\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-24-hdc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"19D55D03-D3F3-4F2A-84D1-9BB358176188\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-24-hdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5BADFB-11C8-4395-A507-65CEA8297483\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-40-bac-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"A4649782-34A4-4190-B4B5-63823EA7EB5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-40-bac-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE34F122-20C4-4A20-8F0D-9095EFC77836\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-40-bdc-rk_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"FD2D5E18-A2B0-4E12-B80B-967841DC3FA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-40-bdc-rk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49243944-969C-46DF-B0E1-9981F1BDD591\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-40-bdc-rs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"A6F55920-D9D7-43E9-8937-946908543F7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-40-bdc-rs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0C71A9-99C6-4077-BA69-0775F8760744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-40-hac-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"D075D7DD-1B5B-41C7-BDE9-D2D943944D73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-40-hac-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABC5140-2624-4349-A430-0DCE42E1C31F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-40-hdc-rk_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"87FE8EE5-D7DB-4544-A4C7-6A5C5921AFB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-40-hdc-rk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A225EC25-F68E-4C02-92CE-1D1B223EF4ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-bac-k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"77AF90A5-6040-43A7-A04C-02BAD2AFF516\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-bac-k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725D65CF-FFD9-4C97-95FB-9FFE4DA7292F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-40-hdc-rs_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"E1170E1B-41A5-4B5C-9266-B2FAAD643B0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-40-hdc-rs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA3E11F-7F85-4403-BBBF-1814F0D28A34\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-bac-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"5CD74126-7918-47BD-BF46-172EC3F63747\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-bac-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2C8B00-7C46-4FB6-9F17-4E38C1BA4539\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-bdc-k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"D1D7F1C4-69FD-438D-9F29-C8410B1F265C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-bdc-k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857E7778-8415-408E-B88E-56DAF162C824\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-hac-k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"775DF4C7-EE1B-49E3-A9FA-A9FC2D289293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-hac-k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDC22C55-846F-4041-8D2F-61196EF372FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-hac-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"03090AE2-2571-4190-8445-85E5D4BC5C56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-hac-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11672168-5733-47F3-B948-0DFFCBBF3473\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-hac-k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"775DF4C7-EE1B-49E3-A9FA-A9FC2D289293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-hac-k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDC22C55-846F-4041-8D2F-61196EF372FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-hdc-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"271848FB-16E8-4624-AAAF-359AFC7C61A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-hdc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E319607D-93D1-46B1-8FFB-5FF025F24FCA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-smart-48-bdc-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"09CFB949-DCB1-4F0F-8E70-617F21F8C76B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-smart-48-bdc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCB2F29-AC93-42D0-8E96-23A499F52B7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-pc1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"39757AB6-1C7B-4D8F-A967-21AD0B217276\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-pc1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7765A7E7-CAB9-47A6-80EE-85C8F644ED0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-pc2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"9310BD27-FCC3-4E6C-8820-AAEC3B2B3F04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-pc2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CE33D5-6165-4ACD-98EA-0AF383C368BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-pc3_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"DF3629D5-B20E-43E3-9D61-7EE204720296\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-pc3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CE609B6-B337-4C90-9B69-C14B4DDCB9B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft1a-pm1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"0CFF5CCA-CF62-436E-91F6-1221CE09BE9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft1a-pm1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533F200D-12B4-469D-B0C2-0CB4662A5B95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft9z-1a01_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"893252A2-E885-43C0-9C20-E8B9CC22539C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft9z-1a01:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD744D6-1765-4B46-A8EF-2665E084C905\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:ft9z-psp1pn05_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"78A6DE64-1D61-43E4-85BE-D12093B6CCA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:ft9z-psp1pn05:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B8C7825-E7EC-4389-B34E-1EEE6BA87DDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:hg9z-xcm2a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"7865E0D0-1164-4FE1-B979-5433EF61A5BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:hg9z-xcm2a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37C15A3-67C9-470F-9EBA-9177CA755092\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d32p-hg1g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"3C191287-9F15-4FCB-A6F0-F49AC213889C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d32p-hg1g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3ACF8A3-5836-4901-90E7-71C7B1B56FAF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d32p-hg2g-5tn_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"25FB0D4B-3CC9-4916-9C53-E717BA569A43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d32p-hg2g-5tn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B865828-82F6-47A6-B78F-38E6B105F088\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-d32p-hg2g-5tt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"5B07EDF2-35F3-40CB-B2A1-554EFD5B3DFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-d32p-hg2g-5tt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4B4261-B80F-4177-BDDC-18EB196AFFCB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-p32-k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"7B354E58-9F30-4BB9-9027-D9050EFE3062\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-p32-k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EF08C3-A02E-4939-A088-4F3E1E5D5AA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:idec:kit-fc6a-p32-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.40\",\"matchCriteriaId\":\"40FEFB26-7FBB-453B-AB19-47915394338E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:idec:kit-fc6a-p32-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72D65E62-F6E5-4885-87F0-28CDFFB1352E\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU96959731/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://us.idec.com/media/24-RD-0256-EN.pdf\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41927\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-04T13:59:49.820372Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-04T13:59:54.937Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"IDEC Corporation\", \"product\": \"FC6A Series MICROSmart All-in-One CPU module\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.60 and earlier\"}]}, {\"vendor\": \"IDEC Corporation\", \"product\": \"FC6B Series MICROSmart All-in-One CPU module\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.60 and earlier\"}]}, {\"vendor\": \"IDEC Corporation\", \"product\": \"FC6A Series MICROSmart Plus CPU module\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.40 and earlier\"}]}, {\"vendor\": \"IDEC Corporation\", \"product\": \"FC6B Series MICROSmart Plus CPU module\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.60 and earlier\"}]}, {\"vendor\": \"IDEC Corporation\", \"product\": \"FT1A Series SmartAXIS Pro/Lite\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.41 and earlier\"}]}], \"references\": [{\"url\": \"https://us.idec.com/media/24-RD-0256-EN.pdf\"}, {\"url\": \"https://jvn.jp/en/vu/JVNVU96959731/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC\u0027s serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Cleartext transmission of sensitive information\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2024-09-04T00:43:55.555Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-41927\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-04T13:59:57.911Z\", \"dateReserved\": \"2024-08-01T01:18:07.241Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2024-09-04T00:43:55.555Z\", \"assignerShortName\": \"jpcert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.