CVE-2025-20181 (GCVE-0-2025-20181)

Vulnerability from cvelistv5 – Published: 2025-05-07 17:35 – Updated: 2025-05-07 19:45
VLAI?
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
CWE
  • CWE-347 - Improper Verification of Cryptographic Signature
Assigner
Impacted products
Vendor Product Version
Cisco IOS Affected: 15.0(1)XO1
Affected: 15.0(1)XO
Affected: 15.0(2)XO
Affected: 15.0(1)EY
Affected: 15.0(1)EY1
Affected: 15.0(1)EY2
Affected: 15.0(2)SE8
Affected: 15.0(1)EX
Affected: 15.0(2)EX
Affected: 15.0(2)EX1
Affected: 15.0(2)EX2
Affected: 15.0(2)EX3
Affected: 15.0(2)EX4
Affected: 15.0(2)EX5
Affected: 15.0(2)EX8
Affected: 15.0(2a)EX5
Affected: 15.0(2)EX10
Affected: 15.0(2)EX11
Affected: 15.0(2)EX13
Affected: 15.0(2)EX12
Affected: 15.2(2)E
Affected: 15.2(3)E
Affected: 15.2(2)E1
Affected: 15.2(4)E
Affected: 15.2(3)E1
Affected: 15.2(2)E2
Affected: 15.2(2a)E1
Affected: 15.2(2)E3
Affected: 15.2(2a)E2
Affected: 15.2(3)E2
Affected: 15.2(3a)E
Affected: 15.2(3)E3
Affected: 15.2(4)E1
Affected: 15.2(2)E4
Affected: 15.2(2)E5
Affected: 15.2(4)E2
Affected: 15.2(3)E4
Affected: 15.2(5)E
Affected: 15.2(4)E3
Affected: 15.2(2)E6
Affected: 15.2(5)E1
Affected: 15.2(5b)E
Affected: 15.2(2)E5a
Affected: 15.2(2)E5b
Affected: 15.2(4)E4
Affected: 15.2(2)E7
Affected: 15.2(5)E2
Affected: 15.2(6)E
Affected: 15.2(4)E5
Affected: 15.2(2)E8
Affected: 15.2(6)E0a
Affected: 15.2(6)E1
Affected: 15.2(6)E0c
Affected: 15.2(4)E6
Affected: 15.2(6)E2
Affected: 15.2(2)E9
Affected: 15.2(4)E7
Affected: 15.2(7)E
Affected: 15.2(2)E10
Affected: 15.2(4)E8
Affected: 15.2(6)E2a
Affected: 15.2(6)E2b
Affected: 15.2(7)E1
Affected: 15.2(7)E0a
Affected: 15.2(7)E0b
Affected: 15.2(7)E0s
Affected: 15.2(6)E3
Affected: 15.2(4)E9
Affected: 15.2(7)E2
Affected: 15.2(7a)E0b
Affected: 15.2(4)E10
Affected: 15.2(7)E3
Affected: 15.2(7)E1a
Affected: 15.2(7b)E0b
Affected: 15.2(7)E2a
Affected: 15.2(4)E10a
Affected: 15.2(7)E4
Affected: 15.2(7)E3k
Affected: 15.2(8)E
Affected: 15.2(8)E1
Affected: 15.2(7)E5
Affected: 15.2(7)E6
Affected: 15.2(8)E2
Affected: 15.2(4)E10d
Affected: 15.2(7)E7
Affected: 15.2(8)E3
Affected: 15.2(7)E8
Affected: 15.2(8)E4
Affected: 15.2(7)E9
Affected: 15.2(8)E5
Affected: 15.2(8)E6
Affected: 15.2(7)E10
Affected: 15.2(6)EB
Affected: 15.2(4)EA7
Affected: 15.2(4)EA8
Affected: 15.2(4)EA9
Affected: 15.2(4)EA9a
Affected: 15.0(2)SQD
Affected: 15.0(2)SQD1
Affected: 15.0(2)SQD2
Affected: 15.0(2)SQD3
Affected: 15.0(2)SQD4
Affected: 15.0(2)SQD5
Affected: 15.0(2)SQD6
Affected: 15.0(2)SQD7
Affected: 15.0(2)SQD8
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20181",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-07T18:56:17.739877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:45:02.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "15.0(1)XO1"
            },
            {
              "status": "affected",
              "version": "15.0(1)XO"
            },
            {
              "status": "affected",
              "version": "15.0(2)XO"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE8"
            },
            {
              "status": "affected",
              "version": "15.0(1)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX1"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX3"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX4"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX8"
            },
            {
              "status": "affected",
              "version": "15.0(2a)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX10"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX11"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX13"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX12"
            },
            {
              "status": "affected",
              "version": "15.2(2)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3a)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5"
            },
            {
              "status": "affected",
              "version": "15.2(4)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E4"
            },
            {
              "status": "affected",
              "version": "15.2(5)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E6"
            },
            {
              "status": "affected",
              "version": "15.2(5)E1"
            },
            {
              "status": "affected",
              "version": "15.2(5b)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5a"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E7"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2"
            },
            {
              "status": "affected",
              "version": "15.2(6)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E5"
            },
            {
              "status": "affected",
              "version": "15.2(2)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E1"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0c"
            },
            {
              "status": "affected",
              "version": "15.2(4)E6"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2)E9"
            },
            {
              "status": "affected",
              "version": "15.2(4)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E10"
            },
            {
              "status": "affected",
              "version": "15.2(4)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0s"
            },
            {
              "status": "affected",
              "version": "15.2(6)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E9"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2"
            },
            {
              "status": "affected",
              "version": "15.2(7a)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1a"
            },
            {
              "status": "affected",
              "version": "15.2(7b)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3k"
            },
            {
              "status": "affected",
              "version": "15.2(8)E"
            },
            {
              "status": "affected",
              "version": "15.2(8)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E5"
            },
            {
              "status": "affected",
              "version": "15.2(7)E6"
            },
            {
              "status": "affected",
              "version": "15.2(8)E2"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10d"
            },
            {
              "status": "affected",
              "version": "15.2(7)E7"
            },
            {
              "status": "affected",
              "version": "15.2(8)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E8"
            },
            {
              "status": "affected",
              "version": "15.2(8)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E9"
            },
            {
              "status": "affected",
              "version": "15.2(8)E5"
            },
            {
              "status": "affected",
              "version": "15.2(8)E6"
            },
            {
              "status": "affected",
              "version": "15.2(7)E10"
            },
            {
              "status": "affected",
              "version": "15.2(6)EB"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA7"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA8"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9a"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "cvssV3_0"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "Improper Verification of Cryptographic Signature",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-07T17:35:31.850Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
        }
      ],
      "source": {
        "advisory": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
        "defects": [
          "CSCvd75918"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20181",
    "datePublished": "2025-05-07T17:35:31.850Z",
    "dateReserved": "2024-10-10T19:15:13.225Z",
    "dateUpdated": "2025-05-07T19:45:02.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-20181\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-05-07T18:15:37.973\",\"lastModified\":\"2025-08-04T18:51:54.673\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\\r\\n\\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\\r\\n\\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189B0C7C-D794-43EB-A6C6-F29C4B9623A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28722F17-AF23-4435-AF9B-996798ACF2C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587450DF-77E4-4320-9191-383EBE5A6CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C965E814-7ABE-4C45-8EA8-B6818BC213F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4556022D-5B0C-4F7A-868C-9EC01F716D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7760B1FF-BC56-49F4-8020-439EA2F53AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49229E8B-19ED-4E5E-AA2E-F699C033F4A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A4AC61-4386-4218-91B7-6CE776D8050B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59403A6B-3488-4F81-BE3C-A06AF1731B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ABF12A-78BD-459D-BF53-065A56C385AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D15A929-0C2B-4C3D-99E4-0E7D46217216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D00EB0E-92D3-4C5B-B107-730B47BD6E01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF7F6A52-9AA9-4441-A137-7EE3470C155C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92CEEA13-0B40-4203-8BAE-09374C9B1FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611A649F-161B-4683-98D5-4C8150838039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D39E1ED-2F67-4116-9BF5-44CA8EF9A016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"729613AF-4C56-4514-9ECD-6A466C278E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"368F2F9E-FD52-4A74-8378-DF246252B745\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E452976-8876-40D7-8880-29197DB5457A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE5C762-5329-47E9-8D0C-C0A546AC24CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D93F335-8058-45BA-8653-9F3E4A5FA28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF152F35-32C6-4C2A-BC91-90AAE442F239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2a\\\\)ex5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD47CBD-A833-4CD0-A62C-22FBB7A4244D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72782F95-948D-489B-A19A-9DAB825DFE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0F2B2A-F273-4166-826F-88B54A480BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C846C74-7644-4DAB-A4B8-B33464EBE92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E5F96-48DB-41C4-B45E-5BE0367DD7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80114F8D-320D-41FF-ADD3-729E250A8CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879C4495-3B26-4370-8708-16F5002E37CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C2BB1F-79DF-4471-B75F-C22CEBB5380F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5A55B3-49E4-4C48-B942-4816504BAA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AADD63-CEA3-461B-94EA-0CDAB4A2ED00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB704746-C27B-4C6B-948C-B8C0A3F40782\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F354F8F6-70D3-43EE-BF08-DFB87E83E847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F908B0-7ECE-40F8-8549-29BD1A070606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378E67DD-779C-4852-BF29-38C2DFFB1BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9033ACC7-1CCC-44E7-8275-73499C0E6E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD4AF73-6C03-4978-BC43-857188BF7E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785E177-C04E-4170-9C35-B4259D14EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAE727E-E552-4222-8FF0-6146A813BDEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7850295-C728-4448-ABA7-D01397DBBE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C104A47-53EE-47FC-BAE5-21925BEE98E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD28874B-148A-4299-9AA1-67A550B25F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29B2E6F-ED6C-4568-9042-7A1BD96A9E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DEE2C71-C401-43D1-86DC-725FE5FDF87E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758F264-96F9-4EE9-9CA9-AD5407885547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2842F6-4CD5-457C-AC75-241A5AB9534B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE0470-E94A-4CAF-865D-73E2607A0DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CCD7E3-C62B-4151-96FF-1175D4896E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6437E689-A049-4D48-AB7A-49CA7EBDE8B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110B699D-169E-4932-A480-6EBB90CAE94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C12918-E5BB-465E-9DA4-06B7351DD805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4862C453-8BD7-4D53-B2D6-CE3E44A4915A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C4E1F4-AD64-418C-A308-85501E0F3EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57ED9CDC-FC03-4DA7-A791-CE61D0D8364D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB8C3BBA-4829-4006-B7EB-F552D86922C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F980EFA3-BB92-49D3-8D5F-2804BB44ABB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e3k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6D0AA7-E879-4303-AB2D-4FEF3574B60E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345C9300-CAC2-4427-A6B4-8DBC72573E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BFCF66-DE06-46DA-8F9D-60A446DC0F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BDF6ABA-F0A4-423F-9056-A57C6A074137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956FE25C-3CB8-4479-850D-719827123A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23ABB581-90EF-4F6C-9778-735932D2B08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3FD874-5EDF-48E0-A5AC-415A620C1FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F396D6-9B6E-4E6A-B561-9822DB13C7AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7a\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1374E243-4EC2-4A81-991C-B5705135CAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7b\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECA6101-94BA-4209-8243-A56AF02963EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFF00927-80B0-4BE3-BF7C-E663A5E7763A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9795E31D-A642-4100-A980-CD49C291AB7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C79479-27C6-4273-BC80-70395D609197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28ACC494-2B4B-4BCE-9275-B7B10CC69B1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602A88C0-30D1-4B63-A8F7-EF1D35350897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(8\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3AE0C5-D071-44B4-B820-422296FDC259\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5B6046-6377-471B-9639-D7F635B08190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFCF1E00-1C43-486E-A64E-14F5BEF82362\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76048CE-58D5-4F67-8679-9C863D41F15E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7DC221-0BA1-4051-8643-1180C9EA682A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00CEE576-6C55-4BD4-B9F2-33E40483437B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2683677D-9FD4-416B-8CFF-D81AF3174B3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"548B1FAF-946A-446B-8248-10BC194496B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3531645A-C4FB-4F6D-BBD2-D2852AA13509\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46984315-BF1E-4146-9960-328AEFA73D54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"927762E0-6EE5-48C9-A7EE-8824BEBED08A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F1CA06-D540-4CDB-BACB-5D528C830753\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53A6E90-DA02-420A-B4A7-BC6D73C4B95A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48837AB-F3DB-4246-90E2-6D8CD8BCF658\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B888C8-9E13-4353-A8D8-96900726AE77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA35A21E-9FB8-4694-B46D-E9381CB3D0C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5F1600-30A5-4B31-A518-7B84BFE16883\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03D0B73-B854-4385-9AD2-EAC7B041558D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868B074C-2A14-4242-829A-202095A2CFF1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C990D9F-42F4-4722-AF6E-2933E5872C17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C76EA7-969F-4A5F-B045-995C9445B415\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567757A5-74CB-4FB6-9BDA-FA4F51A02998\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7794B87E-C70E-4DA3-9FC8-0170A0898557\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BEB1267-B23F-4001-B6E2-49894CF6EC38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845DDB35-3BB6-41CB-8304-340F444B6FE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAC629E-531F-4B99-9A07-15E113169FCA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63DC2E4-83AB-487E-80D5-036723D930F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F543085-A2E2-4D7E-96EC-E9C6B964AED2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64C85B3-D227-4BE7-BE7B-B05F86FE0583\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A153EAF3-C3DC-49C5-BBBA-7459850B1F57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2000D5-E0C0-4488-8213-DC3079301050\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63AF0F69-A0E0-4AAC-B96B-1C1B59D76669\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179F9893-1C6B-468E-84F3-1CAAAE0A7671\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABDF97F-B703-40A0-B510-D73859139E87\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6637D9D4-14CE-48D2-90D4-19EF761F4193\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE430A-2446-4F29-88D8-D452D1022B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DF34EC-7BC3-44DC-B7B1-94162245CBBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06EEDB4F-BD1E-4914-AF79-64D42643683D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54BFFB02-7C84-4569-8129-74B84A5E7310\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12A3197-0CE2-44F4-B310-DE8D4A72B00D\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20181\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-07T18:56:17.739877Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-07T18:56:19.192Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCvd75918\"], \"advisory\": \"cisco-sa-c2960-3560-sboot-ZtqADrHq\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_0\", \"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 6.8, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"IOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"15.0(1)XO1\"}, {\"status\": \"affected\", \"version\": \"15.0(1)XO\"}, {\"status\": \"affected\", \"version\": \"15.0(2)XO\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EY\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EY1\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EY2\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SE8\"}, {\"status\": \"affected\", \"version\": \"15.0(1)EX\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX1\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX2\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX3\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX4\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX5\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX8\"}, {\"status\": \"affected\", \"version\": \"15.0(2a)EX5\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX10\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX11\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX13\"}, {\"status\": \"affected\", \"version\": \"15.0(2)EX12\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(2a)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(2a)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(3a)E\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(3)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(5)E\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(5)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(5b)E\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E5a\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E5b\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E7\"}, {\"status\": \"affected\", \"version\": \"15.2(5)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E8\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E0a\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E0c\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E9\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E7\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E\"}, {\"status\": \"affected\", \"version\": \"15.2(2)E10\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E8\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E2a\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E2b\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E0a\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E0b\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E0s\"}, {\"status\": \"affected\", \"version\": \"15.2(6)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E9\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(7a)E0b\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E10\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E1a\"}, {\"status\": \"affected\", \"version\": \"15.2(7b)E0b\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E2a\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E10a\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E3k\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E1\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E2\"}, {\"status\": \"affected\", \"version\": \"15.2(4)E10d\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E7\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E3\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E8\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E4\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E9\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E5\"}, {\"status\": \"affected\", \"version\": \"15.2(8)E6\"}, {\"status\": \"affected\", \"version\": \"15.2(7)E10\"}, {\"status\": \"affected\", \"version\": \"15.2(6)EB\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA7\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA8\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA9\"}, {\"status\": \"affected\", \"version\": \"15.2(4)EA9a\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD1\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD2\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD3\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD4\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD5\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD6\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD7\"}, {\"status\": \"affected\", \"version\": \"15.0(2)SQD8\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq\", \"name\": \"cisco-sa-c2960-3560-sboot-ZtqADrHq\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\\r\\n\\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\\r\\n\\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-347\", \"description\": \"Improper Verification of Cryptographic Signature\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-05-07T17:35:31.850Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-20181\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-07T19:45:02.742Z\", \"dateReserved\": \"2024-10-10T19:15:13.225Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2025-05-07T17:35:31.850Z\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…