gsd-2023-20269
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:
Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.
Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).
Notes:
Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.
This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.
Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-20269", "id": "GSD-2023-20269" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20269" ], "details": "A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\r\n\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\r\n\r \r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\r \r Notes:\r\n\r \r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\r \r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.", "id": "GSD-2023-20269", "modified": "2023-12-13T01:20:28.355802Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Adaptive Security Appliance (ASA) Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "9.8.1" }, { "version_affected": "=", "version_value": "9.8.1.5" }, { "version_affected": "=", "version_value": "9.8.1.7" }, { "version_affected": "=", "version_value": "9.8.2" }, { "version_affected": "=", "version_value": "9.8.2.8" }, { "version_affected": "=", "version_value": "9.8.2.14" }, { "version_affected": "=", "version_value": "9.8.2.15" }, { "version_affected": "=", "version_value": "9.8.2.17" }, { "version_affected": "=", "version_value": "9.8.2.20" }, { "version_affected": "=", "version_value": "9.8.2.24" }, { "version_affected": "=", "version_value": "9.8.2.26" }, { "version_affected": "=", "version_value": "9.8.2.28" }, { "version_affected": "=", "version_value": "9.8.2.33" }, { "version_affected": "=", "version_value": "9.8.2.35" }, { "version_affected": "=", "version_value": "9.8.2.38" }, { "version_affected": "=", "version_value": "9.8.3.8" }, { "version_affected": "=", "version_value": "9.8.3.11" }, { "version_affected": "=", "version_value": "9.8.3.14" }, { "version_affected": "=", "version_value": "9.8.3.16" }, { "version_affected": "=", "version_value": "9.8.3.18" }, { "version_affected": "=", "version_value": "9.8.3.21" }, { "version_affected": "=", "version_value": "9.8.3" }, { "version_affected": "=", "version_value": "9.8.3.26" }, { "version_affected": "=", "version_value": "9.8.3.29" }, { "version_affected": "=", "version_value": "9.8.4" }, { "version_affected": "=", "version_value": "9.8.4.3" }, { "version_affected": "=", "version_value": "9.8.4.7" }, { "version_affected": "=", "version_value": "9.8.4.8" }, { "version_affected": "=", "version_value": "9.8.4.10" }, { "version_affected": "=", "version_value": "9.8.4.12" }, { "version_affected": "=", "version_value": "9.8.4.15" }, { "version_affected": "=", "version_value": "9.8.4.17" }, { "version_affected": "=", "version_value": "9.8.4.25" }, { "version_affected": "=", "version_value": "9.8.4.20" }, { "version_affected": "=", "version_value": "9.8.4.22" }, { "version_affected": "=", "version_value": "9.8.4.26" }, { "version_affected": "=", "version_value": "9.8.4.29" }, { "version_affected": "=", "version_value": "9.8.4.32" }, { "version_affected": "=", "version_value": "9.8.4.33" }, { "version_affected": "=", "version_value": "9.8.4.34" }, { "version_affected": "=", "version_value": "9.8.4.35" }, { "version_affected": "=", "version_value": "9.8.4.39" }, { "version_affected": "=", "version_value": "9.8.4.40" }, { "version_affected": "=", "version_value": "9.8.4.41" }, { "version_affected": "=", "version_value": "9.8.4.43" }, { "version_affected": "=", "version_value": "9.8.4.44" }, { "version_affected": "=", "version_value": "9.8.4.45" }, { "version_affected": "=", "version_value": "9.8.4.46" }, { "version_affected": "=", "version_value": "9.8.4.48" }, { "version_affected": "=", "version_value": "9.12.1" }, { "version_affected": "=", "version_value": "9.12.1.2" }, { "version_affected": "=", "version_value": "9.12.1.3" }, { "version_affected": "=", "version_value": "9.12.2" }, { "version_affected": "=", "version_value": "9.12.2.4" }, { "version_affected": "=", "version_value": "9.12.2.5" }, { "version_affected": "=", "version_value": "9.12.2.9" }, { "version_affected": "=", "version_value": "9.12.3" }, { "version_affected": "=", "version_value": "9.12.3.2" }, { "version_affected": "=", "version_value": "9.12.3.7" }, { "version_affected": "=", "version_value": "9.12.4" }, { "version_affected": "=", "version_value": "9.12.3.12" }, { "version_affected": "=", "version_value": "9.12.3.9" }, { "version_affected": "=", "version_value": "9.12.2.1" }, { "version_affected": "=", "version_value": "9.12.4.2" }, { "version_affected": "=", "version_value": "9.12.4.4" }, { "version_affected": "=", "version_value": "9.12.4.7" }, { "version_affected": "=", "version_value": "9.12.4.10" }, { "version_affected": "=", "version_value": "9.12.4.13" }, { "version_affected": "=", "version_value": "9.12.4.8" }, { "version_affected": "=", "version_value": "9.12.4.18" }, { "version_affected": "=", "version_value": "9.12.4.24" }, { "version_affected": "=", "version_value": "9.12.4.26" }, { "version_affected": "=", "version_value": "9.12.4.29" }, { "version_affected": "=", "version_value": "9.12.4.30" }, { "version_affected": "=", "version_value": "9.12.4.35" }, { "version_affected": "=", "version_value": "9.12.4.37" }, { "version_affected": "=", "version_value": "9.12.4.38" }, { "version_affected": "=", "version_value": "9.12.4.39" }, { "version_affected": "=", "version_value": "9.12.4.40" }, { "version_affected": "=", "version_value": "9.12.4.41" }, { "version_affected": "=", "version_value": "9.12.4.47" }, { "version_affected": "=", "version_value": "9.12.4.48" }, { "version_affected": "=", "version_value": "9.12.4.50" }, { "version_affected": "=", "version_value": "9.12.4.52" }, { "version_affected": "=", "version_value": "9.12.4.54" }, { "version_affected": "=", "version_value": "9.12.4.55" }, { "version_affected": "=", "version_value": "9.12.4.56" }, { "version_affected": "=", "version_value": "9.12.4.58" }, { "version_affected": "=", "version_value": "9.14.1" }, { "version_affected": "=", "version_value": "9.14.1.10" }, { "version_affected": "=", "version_value": "9.14.1.6" }, { "version_affected": "=", "version_value": "9.14.1.15" }, { "version_affected": "=", "version_value": "9.14.1.19" }, { "version_affected": "=", "version_value": "9.14.1.30" }, { "version_affected": "=", "version_value": "9.14.2" }, { "version_affected": "=", "version_value": "9.14.2.4" }, { "version_affected": "=", "version_value": "9.14.2.8" }, { "version_affected": "=", "version_value": "9.14.2.13" }, { "version_affected": "=", "version_value": "9.14.2.15" }, { "version_affected": "=", "version_value": "9.14.3" }, { "version_affected": "=", "version_value": "9.14.3.1" }, { "version_affected": "=", "version_value": "9.14.3.9" }, { "version_affected": "=", "version_value": "9.14.3.11" }, { "version_affected": "=", "version_value": "9.14.3.13" }, { "version_affected": "=", "version_value": "9.14.3.18" }, { "version_affected": "=", "version_value": "9.14.3.15" }, { "version_affected": "=", "version_value": "9.14.4" }, { "version_affected": "=", "version_value": "9.14.4.6" }, { "version_affected": "=", "version_value": "9.14.4.7" }, { "version_affected": "=", "version_value": "9.14.4.12" }, { "version_affected": "=", "version_value": "9.14.4.13" }, { "version_affected": "=", "version_value": "9.14.4.14" }, { "version_affected": "=", "version_value": "9.14.4.15" }, { "version_affected": "=", "version_value": "9.14.4.17" }, { "version_affected": "=", "version_value": "9.14.4.22" }, { "version_affected": "=", "version_value": "9.14.4.23" }, { "version_affected": "=", "version_value": "9.15.1" }, { "version_affected": "=", "version_value": "9.15.1.7" }, { "version_affected": "=", "version_value": "9.15.1.10" }, { "version_affected": "=", "version_value": "9.15.1.15" }, { "version_affected": "=", "version_value": "9.15.1.16" }, { "version_affected": "=", "version_value": "9.15.1.17" }, { "version_affected": "=", "version_value": "9.15.1.1" }, { "version_affected": "=", "version_value": "9.15.1.21" }, { "version_affected": "=", "version_value": "9.16.1" }, { "version_affected": "=", "version_value": "9.16.1.28" }, { "version_affected": "=", "version_value": "9.16.2" }, { "version_affected": "=", "version_value": "9.16.2.3" }, { "version_affected": "=", "version_value": "9.16.2.7" }, { "version_affected": "=", "version_value": "9.16.2.11" }, { "version_affected": "=", "version_value": "9.16.2.13" }, { "version_affected": "=", "version_value": "9.16.2.14" }, { "version_affected": "=", "version_value": "9.16.3" }, { "version_affected": "=", "version_value": "9.16.3.3" }, { "version_affected": "=", "version_value": "9.16.3.14" }, { "version_affected": "=", "version_value": "9.16.3.15" }, { "version_affected": "=", "version_value": "9.16.3.19" }, { "version_affected": "=", "version_value": "9.16.3.23" }, { "version_affected": "=", "version_value": "9.16.4" }, { "version_affected": "=", "version_value": "9.16.4.9" }, { "version_affected": "=", "version_value": "9.16.4.14" }, { "version_affected": "=", "version_value": "9.16.4.18" }, { "version_affected": "=", "version_value": "9.16.4.19" }, { "version_affected": "=", "version_value": "9.16.4.27" }, { "version_affected": "=", "version_value": "9.16.4.38" }, { "version_affected": "=", "version_value": "9.17.1" }, { "version_affected": "=", "version_value": "9.17.1.7" }, { "version_affected": "=", "version_value": "9.17.1.9" }, { "version_affected": "=", "version_value": "9.17.1.10" }, { "version_affected": "=", "version_value": "9.17.1.11" }, { "version_affected": "=", "version_value": "9.17.1.13" }, { "version_affected": "=", "version_value": "9.17.1.15" }, { "version_affected": "=", "version_value": "9.17.1.20" }, { "version_affected": "=", "version_value": "9.17.1.30" }, { "version_affected": "=", "version_value": "9.18.1" }, { "version_affected": "=", "version_value": "9.18.1.3" }, { "version_affected": "=", "version_value": "9.18.2" }, { "version_affected": "=", "version_value": "9.18.2.5" }, { "version_affected": "=", "version_value": "9.18.2.7" }, { "version_affected": "=", "version_value": "9.18.2.8" }, { "version_affected": "=", "version_value": "9.18.3" }, { "version_affected": "=", "version_value": "9.18.3.39" }, { "version_affected": "=", "version_value": "9.18.3.46" }, { "version_affected": "=", "version_value": "9.18.3.53" }, { "version_affected": "=", "version_value": "9.18.3.55" }, { "version_affected": "=", "version_value": "9.19.1" }, { "version_affected": "=", "version_value": "9.19.1.5" }, { "version_affected": "=", "version_value": "9.19.1.9" }, { "version_affected": "=", "version_value": "9.19.1.12" }, { "version_affected": "=", "version_value": "9.19.1.18" } ] } }, { "product_name": "Cisco Firepower Threat Defense Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.2.3" }, { "version_affected": "=", "version_value": "6.2.3.1" }, { "version_affected": "=", "version_value": "6.2.3.2" }, { "version_affected": "=", "version_value": "6.2.3.3" }, { "version_affected": "=", "version_value": "6.2.3.4" }, { "version_affected": "=", "version_value": "6.2.3.5" }, { "version_affected": "=", "version_value": "6.2.3.6" }, { "version_affected": "=", "version_value": "6.2.3.7" }, { "version_affected": "=", "version_value": "6.2.3.8" }, { "version_affected": "=", "version_value": "6.2.3.10" }, { "version_affected": "=", "version_value": "6.2.3.11" }, { "version_affected": "=", "version_value": "6.2.3.9" }, { "version_affected": "=", "version_value": "6.2.3.12" }, { "version_affected": "=", "version_value": "6.2.3.13" }, { "version_affected": "=", "version_value": "6.2.3.14" }, { "version_affected": "=", "version_value": "6.2.3.15" }, { "version_affected": "=", "version_value": "6.2.3.16" }, { "version_affected": "=", "version_value": "6.2.3.17" }, { "version_affected": "=", "version_value": "6.2.3.18" }, { "version_affected": "=", "version_value": "6.6.0" }, { "version_affected": "=", "version_value": "6.6.0.1" }, { "version_affected": "=", "version_value": "6.6.1" }, { "version_affected": "=", "version_value": "6.6.3" }, { "version_affected": "=", "version_value": "6.6.4" }, { "version_affected": "=", "version_value": "6.6.5" }, { "version_affected": "=", "version_value": "6.6.5.1" }, { "version_affected": "=", "version_value": "6.6.5.2" }, { "version_affected": "=", "version_value": "6.6.7" }, { "version_affected": "=", "version_value": "6.6.7.1" }, { "version_affected": "=", "version_value": "6.4.0" }, { "version_affected": "=", "version_value": "6.4.0.1" }, { "version_affected": "=", "version_value": "6.4.0.3" }, { "version_affected": "=", "version_value": "6.4.0.2" }, { "version_affected": "=", "version_value": "6.4.0.4" }, { "version_affected": "=", "version_value": "6.4.0.5" }, { "version_affected": "=", "version_value": "6.4.0.6" }, { "version_affected": "=", "version_value": "6.4.0.7" }, { "version_affected": "=", "version_value": "6.4.0.8" }, { "version_affected": "=", "version_value": "6.4.0.9" }, { "version_affected": "=", "version_value": "6.4.0.10" }, { "version_affected": "=", "version_value": "6.4.0.11" }, { "version_affected": "=", "version_value": "6.4.0.12" }, { "version_affected": "=", "version_value": "6.4.0.13" }, { "version_affected": "=", "version_value": "6.4.0.14" }, { "version_affected": "=", "version_value": "6.4.0.15" }, { "version_affected": "=", "version_value": "6.4.0.16" }, { "version_affected": "=", "version_value": "6.7.0" }, { "version_affected": "=", "version_value": "6.7.0.1" }, { "version_affected": "=", "version_value": "6.7.0.2" }, { "version_affected": "=", "version_value": "6.7.0.3" }, { "version_affected": "=", "version_value": "7.0.0" }, { "version_affected": "=", "version_value": "7.0.0.1" }, { "version_affected": "=", "version_value": "7.0.1" }, { "version_affected": "=", "version_value": "7.0.1.1" }, { "version_affected": "=", "version_value": "7.0.2" }, { "version_affected": "=", "version_value": "7.0.2.1" }, { "version_affected": "=", "version_value": "7.0.3" }, { "version_affected": "=", "version_value": "7.0.4" }, { "version_affected": "=", "version_value": "7.0.5" }, { "version_affected": "=", "version_value": "7.0.6" }, { "version_affected": "=", "version_value": "7.1.0" }, { "version_affected": "=", "version_value": "7.1.0.1" }, { "version_affected": "=", "version_value": "7.1.0.2" }, { "version_affected": "=", "version_value": "7.1.0.3" }, { "version_affected": "=", "version_value": "7.2.0" }, { "version_affected": "=", "version_value": "7.2.0.1" }, { "version_affected": "=", "version_value": "7.2.1" }, { "version_affected": "=", "version_value": "7.2.2" }, { "version_affected": "=", "version_value": "7.2.3" }, { "version_affected": "=", "version_value": "7.2.4" }, { "version_affected": "=", "version_value": "7.2.4.1" }, { "version_affected": "=", "version_value": "7.2.5" }, { "version_affected": "=", "version_value": "7.3.0" }, { "version_affected": "=", "version_value": "7.3.1" }, { "version_affected": "=", "version_value": "7.3.1.1" }, { "version_affected": "=", "version_value": "7.4.0" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\r\n\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\r\n\r \r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\r \r Notes:\r\n\r \r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\r \r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "In August 2023, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild. Cisco strongly recommends that customers upgrade to a fixed software release to remediate this vulnerability once available and apply one of the suggested workarounds in the meantime.\r\n\r\nFor information on observed attempted exploitation of this vulnerability, see the Cisco blog post on Akira Ransomware Targeting VPNs without Multi-Factor Authentication [\"https://blogs.cisco.com/security/akira-ransomware-targeting-vpns-without-multi-factor-authentication\"]. As explained in this blog post, organizations can significantly reduce the risk of unauthorized access, including a potential ransomware infection, by enabling MFA in VPN implementations." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-288", "lang": "eng", "value": "Authentication Bypass Using an Alternate Path or Channel" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC" } ] }, "source": { "advisory": "cisco-sa-asaftd-ravpn-auth-8LyfCkeC", "defects": [ "CSCwh23100", "CSCwh45108" ], "discovery": "EXTERNAL" } }, "nvd.nist.gov": { "cve": { "cisaActionDue": "2023-10-04", "cisaExploitAdd": "2023-09-13", "cisaRequiredAction": "Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.", "cisaVulnerabilityName": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C01E8C87-8982-491F-B0ED-5AD17BDBBC1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E881DFE5-9180-49BA-8D66-2BD96FC23BE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "81FC6BE6-1DF5-41FE-B66D-05A8D3DCDDD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6033411-4722-4CDD-BF8A-152C13FA3926", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "37495D3A-FB87-40F6-B6E6-7870393F8D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E59E5B90-18F4-48D6-A38A-D4BDFE8C3091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "6458E8C7-84F0-49DF-99DC-99810AA71AF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E59FF48-5291-4CC2-9A2E-38819B7322AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E40F113E-208E-4015-815C-492EFC7F7C99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "905B866F-B3E8-4240-9942-8DBEAB2F3C08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "B3DE2A18-0E0F-4926-BC8A-B44558EA8DBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "13E5F3D0-02BB-45E6-81B8-B7CC09346FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "DA3A6F7D-CF96-492E-9C03-827382B0D0A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "153216C5-8239-4F62-8751-49AFD5A1B600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "DB28D358-3C2E-4D55-B429-EF805689691D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "52E3338A-93BC-4263-B3D7-13F1EC35004C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "4B849B7C-A3DE-4230-B765-3335864EE02A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "9B84A0B2-8631-4CE7-9636-9E4956073DA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.2.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "4BCE1C81-A824-43A9-B0F2-C5F8C4B98B60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "348B0FAC-A97D-4A9C-8D98-C0C347532112", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E4213D8C-4A4A-4C95-8500-3B056EF537C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E713AF7B-6C50-4205-8320-CE833D5C7409", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5AEDA6C9-B87B-446E-AE63-6A0BAD3A20B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1B2EE3B-D640-476E-BFBD-A5147EC4134A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8117D925-7E20-45BB-8A75-740700FD216F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1529CCAE-3A67-41C7-8A14-5E85D8D43C13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E8BF178-C267-4571-9581-224F7488BDA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "843C4F5F-C0B3-40C9-BC03-9F5B21D18637", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5E7FBCD9-10D2-470B-9B29-4DD1E3240DE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "A872D2D1-3391-4A4A-8409-5760ACA8C252", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8738A0E2-489E-42C3-B675-243BAF46E7F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "9123ACEF-35AB-4EC2-A2C4-B6A6C570951B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A11043D9-DFA6-43E0-A58C-1D7FA52A8D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "BC0CCF6C-E140-4C76-B2EC-7BDA9F9291D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "C13B826E-FB8D-49E5-B866-2606AD904513", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "D6AB1039-6A7C-42A5-A931-3C3C2D6DDB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BE4B4C7-9686-4BC4-925C-23D700416875", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "761ADC40-51DF-455D-8E43-BED6F98A68B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8540F8BE-B396-47CB-AB8C-A32AF1942C70", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CE7CF2BE-D6F0-4C95-9FC8-9F2611D7E2BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "D027DA95-EC2D-4CDA-9458-E5315E8EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "20FB8F1C-2757-4C48-BA17-9D0BEF671ACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "89D368A3-6202-4C14-9DD6-6FE73B5F06F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "28AE56F0-52C7-4BF3-BBA2-FC6946C2617B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "33E5B23F-8986-49D2-BE0C-E3576C703EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.6.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B41A653B-E947-4C3B-82AA-42F5F282FA29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEFB54B2-5026-482B-B226-FC07841C6FC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BBBF462-9E15-4526-A437-B78CA24832C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D00BA69-08A6-4796-BDE6-E5E2D7C66E23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "BF2B032F-6C40-4D12-8D7F-C41A6F75941F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D05CDFBE-0206-490E-B916-EEFE787CE975", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B8A26CA-12C8-44B5-902E-D450127A0197", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45E1B068-FF70-4A61-9932-02626A2207CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "92F386BB-96E5-47FF-92FE-BB19B83FF054", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9CBC03FE-3A54-450E-A8CE-844C4A6E54B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "078352DC-CEB3-47BC-B1F7-05AA3DBD5D8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "096B8FFA-6C54-44A9-97C9-0479C802E25C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "028024EF-84D1-4250-B697-D33E8E79DE9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC687-1EEF-4F47-B509-2E9D7D7DB21A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1197F620-536D-4891-97B0-B17D7F76B621", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "68C616AE-4B20-47A1-854E-89899BBF79B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BE03156-2E96-4D0E-909F-E424515C12D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FE43737-1463-4C93-9549-1D5BF3BB308B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5DD95E7-841A-475C-A302-6E7D48E887C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C12C224-AB9E-42A7-8A26-94D6B4378CEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D482F818-0A8E-49D7-8E3E-0958019FA629", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "8E7BFB57-BC02-4930-A02F-83583E6A0FC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "026F1960-C879-4611-A60A-96311B63CCA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "EFF144F5-D933-4DE4-818C-001BD9E3958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "00112ED3-FE7B-425B-9A28-1E5F2BC8BB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "DDD491D5-FAAB-493F-91A6-D2F3B5F5970E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "1519F49D-588F-4B70-B38F-EF4F3E13FEAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "0820A79C-F3EF-407F-9AC7-DCAB4CD39C89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "9D3E8805-85D2-4345-8076-039513209A31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "14BB907B-D75A-4F5E-B20D-5457A71A70EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*", "matchCriteriaId": "F118B803-4C55-436A-A136-0C1FEA49858F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*", "matchCriteriaId": "6A272121-408E-45F6-A2A1-0BA6EBC060A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "A3910211-D4DB-4CA7-BBEA-DD8246FF10ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "C260BF30-7A33-4C70-9509-404856C93666", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "AF894850-39EC-4B57-BBFF-F1AB4F8389A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "174E631B-6099-47DE-8790-BBF4B7FDB8CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "3143B0FF-C855-485E-A908-E48974B1643C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "24DCEAE6-355B-40AE-A7C8-AF744FCA8A86", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "2097E81E-B422-4B93-AF09-F300A0E8AF71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "454DEA31-A607-4054-82D3-24A4FEB7358F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "57F0B213-8187-4465-84F1-FB8D92B36020", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "E540771E-BA0B-42D1-8251-B576B0F142C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "BEC2A833-BECF-4000-A592-6113A84C2D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "077F1416-924A-4D25-9CEE-3BD66A96A019", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "23CD5619-E534-4F40-998D-39DC19FA0451", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "C5D0EB11-14B1-44B3-8D46-B9DD872F772C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "C7EB6801-336D-4F41-ADE7-1C58C63C3F6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "8413DA41-02A5-4269-8C88-9DD5076AF91B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "AA00285F-6914-4749-8A47-FC4EDAFFF3C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "4AA4D367-32B9-4F54-8352-A959F61A1FDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "2259FF9E-0C8B-440F-B1AC-51BDE3F60E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "3C522B55-904D-4C08-B73E-1457D877C0AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "4483056A-FBF3-4E00-81EB-1E97334EF240", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*", "matchCriteriaId": "48677330-06AB-4C7F-B2AD-F7E465A9632A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*", "matchCriteriaId": "7AEA80D2-5DB8-4334-9A88-7DDE395832C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*", "matchCriteriaId": "FB1C38A5-1028-4AD3-8CC7-A00091091E76", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*", "matchCriteriaId": "848147B2-C49A-43F6-9069-FC8885BDFDA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*", "matchCriteriaId": "D6FEF0DA-741E-4361-8143-068EB47D6520", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "69289C72-01B5-4280-A382-665C1224C850", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "F002FD55-F881-450E-BC1B-8073E188F47E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA940C4F-13BB-465F-BB8D-CBD0109BF012", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8B0434F5-9A50-4B57-9C5B-E09415D098C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9FE52B81-2CF8-48E5-A7BA-A163A25A669B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8E8D7C9-5272-40E6-869B-B33959F9F0CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0790DDC2-7BA0-42DC-A157-754C0CBBE178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "882394EA-70C8-4D86-9AEF-5D273D8E518C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "855AD3CC-F404-48C5-80D2-7F2765D16D72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "26B6BF72-9124-4213-B3C0-BD31B46E8C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "149C3872-8DA9-48DD-ADD0-2E84C1A76A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E23ACB0-DF8B-4672-A819-4DCD3104CE4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "7C698819-3C8E-4A16-8F52-42FF1E54C076", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "8D3CE74E-59E7-448A-8417-18F97C05C798", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "0986C171-0E75-4F6F-A9BD-276830104E5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "66A2777A-7831-4324-AEB2-5D93B5F6C04B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "37045680-9189-4B7F-A4F7-4E682FE20A09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "B6C9F37B-CF3C-4861-A969-C7CF4946274A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "FB938E58-4963-4A31-8836-88E958592B30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "1E317897-EE97-44F3-96BB-E54228D72A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "1EF7FAB2-158D-4C48-9246-E7AD3BF1D801", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "056D43AE-ECDB-40D2-A196-18DDCD02629E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "D3E555F3-3580-4D71-8D8D-92FE72763D62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "93013503-8B9A-4160-AF7E-277958FA6E9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "A3B009FD-0F2B-4511-8EDF-C3E670623F89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "52579D8D-E855-42B3-B406-32DD1C39F721", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*", "matchCriteriaId": "E7E44FC6-12A2-4F76-A095-28F3804B619F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*", "matchCriteriaId": "42917E5E-E362-4B40-B2B2-3C77BA35641C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*", "matchCriteriaId": "CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1683-914F-43D3-AE1C-311D3A90BE8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*", "matchCriteriaId": "A8D24656-CAB1-4A98-A440-482927FEDD16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*", "matchCriteriaId": "E504557C-DA5D-4D0F-A813-4CE7D5109F15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*", "matchCriteriaId": "04D2A067-C717-4921-BBF5-3EFBE02736EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.58:*:*:*:*:*:*:*", "matchCriteriaId": "36DDEC5B-4BEA-499C-9F34-BB3D39B7A963", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "52D83C3A-ED0B-42D5-A08A-97D27E189875", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "A649E319-D408-4AA2-8293-C9E37AF14BA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "F4187EFE-4D7E-4493-A6E0-24C98256CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "6730194F-5069-40AB-AE66-871D3992560C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "9E257F98-D1A0-4D28-9504-1749CC090D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "589E46F3-8038-4B87-8C40-55C6268B82F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B73F6-139E-42DC-B895-DDD17B5A1138", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "3E4FD5E3-7E82-4294-8B05-D2045D857029", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "4E998A4A-5346-4CFA-A617-FD1106C6B7A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "91265549-A16E-4A00-A031-4F1EB8D6881C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "ECE6D033-7B8B-4F61-B653-0C0EF13466EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "14441650-DAD5-4959-83DF-4D6F3D6A05FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "1B21ABC9-A64B-43E4-8951-1E6C0F427DBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "A48EC041-322F-422D-B95B-0FC07BDA2B6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "FE0D50C0-DADB-4747-8649-8A5257111FE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "FEE2699F-353F-44CB-A778-981783DDC31F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "7D8E50BD-1FBD-483B-9C27-70E95C732E55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "F46E5E4F-787C-4C05-B1E7-C39BB9125D16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "D6A29312-38E7-456B-94DD-4D7329691114", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "27F7BB31-C733-4C32-BF0F-33B5AF020156", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "DC313568-33A6-435B-98FF-8A7091D9C451", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "7F85710A-28CE-4913-8523-356461908FBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D6069950-016B-419A-B754-D58956CB6D14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5A2F3FEC-624F-47C5-B056-836861BB038A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA0B9B73-A9E6-4924-9EAE-B57E534938FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "012812C4-EFF8-465F-A771-134BEB617CC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E06141A9-8C37-445A-B58A-45739AFE7D4C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC09E5-51D3-4672-B910-B34A9CBD6128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "71ED7A71-81CB-444C-A4ED-EA4A58D5E73C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "CAD13331-0EB8-4C8D-85CC-D96CA9F829AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "7137F22B-F993-4620-9378-9412DAEA9EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "923A40E8-6456-4288-B9AB-DBF5F9C4246A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "F6560447-039C-40FA-A24D-C8994AC2743B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "378ED826-F5FE-40BA-9FC0-9C185A13518B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "130B6FD9-764D-4EF8-91AA-37E52AE9B3E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "225861CE-FFF8-4AFA-A07B-CB8D5BC9C361", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "FD08C4E8-3ADB-4048-9B3C-4F0385201523", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "A4875811-F209-49ED-B310-8377B2F87FF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "99C52C7B-B626-4A3C-A2EC-28A20E7FA95F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "08CCBF5E-257A-4A1F-8930-3643A9588838", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "782BC9ED-1395-472B-9F34-DED812AA5BFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "153449C0-B93F-49A2-8A6A-BE84305E8D2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "853A002C-839A-4372-8485-750A86E9F6E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "D32F1365-EAF8-4570-B2FF-45E47E8586F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFD07F9B-6BB3-4423-8DBE-4E89A6478E65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "34FE4F28-B704-4325-AE8A-C790163FEE71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "E832BC0C-8439-4779-9064-C2D93F231031", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "FA99DF94-D031-4375-9A16-306606FE28F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "FC149D03-5609-46E6-A1B3-F4D91F282B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "B5D7FC6F-1370-4272-97E5-226C2ED1D335", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "164D5774-D51B-47C6-AD32-ED6B84E78BBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "27ACBA2A-87A7-4836-A474-AFD7D22F820D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C73E0B2E-BABF-4998-A1D7-4E803F9D78AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "959107AC-E9EC-467C-901B-A3164E3762E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "6F944F8F-0255-42BE-BD44-D21EC9F0FFC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "0F39C535-5A41-47CE-A9CF-B360998D4BF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "0BA16A6D-2747-4DAC-A30A-166F1FD906FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "289F9874-FC01-4809-9BDA-1AF583FB60B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "74EDFC67-E4EE-4D2C-BF9F-5881C987C662", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "826869BE-4874-4BBA-9392-14851560BA10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "EF52D477-3045-45D1-9FD3-12F396266463", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "88E310BF-F1F6-4124-A875-81967B9B531E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B330F8F-F0DA-472C-A932-AD1D232C7DB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "6BF59DAA-268C-4FCF-A0AA-7967128AEBC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*", "matchCriteriaId": "140ED95D-173C-4ADB-A2E6-97F0D595D1AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.53:*:*:*:*:*:*:*", "matchCriteriaId": "BC9B00E1-3E50-4356-B6D9-F84BCD552402", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.55:*:*:*:*:*:*:*", "matchCriteriaId": "552319A9-01F7-47BA-83B3-B2DD648AA07E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEE52F59-AABA-4069-A909-64AD5DFD2B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "20D7966E-B02B-48C8-BF96-723DD6C25314", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "FA618249-E76F-4104-9326-C9F2DC8DE3D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "7C925E1F-6BD9-4CD1-8AC4-4263A9094786", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "C5EE76D9-6D18-4823-B6B0-E1394A4D140C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D726F07-06F1-4B0A-B010-E607E0C2A280", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0FAD2427-82A3-4E64-ADB5-FA4F40B568F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "08D5A647-AC21-40AC-8B3C-EE5D3EDA038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0BAE999A-5244-46CF-8C12-D68E789BDEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D6468D3D-C5A7-4FAE-B4B9-AD862CD11055", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "D6E4808D-592E-46A6-A83A-A46227D817B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "1AB45136-ACCD-4230-8975-0EBB30D5B375", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2C39AC1-1B96-4253-9FC8-4CC26D6261F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "DE9102C8-F211-4E50-967F-FD51C7FC904F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4933642-89E5-4909-AD3C-862CD3B77790", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "A9A6C776-79B3-47ED-B013-100B8F08E1C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "E504F28A-44CE-4B3E-9330-6A98728E3AEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "FEA0DD43-D206-4C1C-8B17-DA47F96B3BAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "1983172D-4F52-479F-BF14-A84B92D36864", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "4122D982-A57A-4249-A8DC-CE9FC6C98803", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "96464380-F665-4266-B0AD-693E078C9F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "4C230B8A-570D-4F58-83E1-AFA50B813EA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "FD3F39CB-C4C2-4B13-94F0-9E44322314BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "59A71873-0EB2-418F-AE33-8474A1010FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2DF0B07-8C2A-4341-8AFF-DE7E5E5B3A43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E6BD0EE-649E-4ED6-A09C-8364335DEF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1AE11554-FE3C-4C8B-8986-5D88E4967342", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1C11983-22A8-4859-A240-571A7815FF54", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "24CD0B0A-2B91-45DD-9522-8D1D3850CC9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B7026F0E-72A7-4CDF-BADC-E34FE6FADC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "63B85369-FBAE-456C-BC99-5418B043688A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "86434346-D5F0-49BA-803E-244C3266E361", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D2FA7B3C-002D-4755-B323-CA24B770A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F1CB7EBC-F3D5-4855-A8D8-BA5AB21FD719", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2A5530C-DF29-421B-9712-3454C1769446", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "41170977-FEEA-4B51-BF98-8493096CD691", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "B05791F9-0B31-4C4C-A9BA-9268CAA45FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "4D975CBA-7F01-4A4C-991B-9571410C4F07", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B6D7AF29-4E08-4BFD-AFE0-994309E66F08", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D2EFA476-5021-4A00-859E-1643009D6156", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6E3A5DC-A237-46E4-A4E5-F135482F984A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "DCD69468-8067-4A5D-B2B0-EC510D889AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20AE4051-FA3B-4F0B-BD3D-083A14269FF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "67FB5ABE-3C40-4C58-B91F-0621C2180FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "53909FD6-EC74-4D2F-99DA-26E70400B53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "55FE024D-0D43-40AD-9645-8C54ECF17824", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC411A8D-CD39-46F5-B8FC-6753E618FAEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D46E2E00-BA86-4002-B67B-2C1A6C1AAAE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "91AD8BA2-EB8D-4D8B-B707-AF5C2A831998", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85F22403-B4EE-4303-9C94-915D3E0AC944", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "828E3DE1-B62E-4FEC-AAD3-EB0E452C9CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "596EC5DD-D7F4-44C8-B4B5-E2DC142FC486", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C356E0E6-5B87-40CF-996E-6FFEDFD82A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BBCA75A6-0A3E-4393-8884-9F3CE190641E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3C12D3-7662-46C5-9E88-D1BE6CF605E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "046B53A0-6BC1-461A-9C28-C534CE12C4BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5D1C767F-3E06-43B7-A0CC-D51D97A053EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "43A950B0-A7CA-4CE7-A393-A18C8C41B08E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A7E221CB-BD0F-4AEE-8646-998B75647714", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "225382DE-2919-48F4-9CC0-DE685EAAFDF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FBA2DFE7-F478-46EC-9832-4B2C738FC879", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "39FE5927-2421-4CBE-97EA-6AED892DA1C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D619BF54-1BA9-45D0-A876-92D7010088A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "469EA365-DED5-4436-AAC2-5553529DE700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4D94F400-5A35-41F5-B37F-E9DA6F87ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5364CB94-BEA3-4E9A-A2F9-EE96A2D7F8AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "16FD5D12-CF1A-4990-99B3-1840EFBA5611", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCD2D11D-FF08-44E4-BF67-D8DD1E701FCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F788D156-1F1F-4A08-848B-257BC4CCE000", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "795ED164-7800-4D50-8E37-665BE30190D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1B0664B8-1670-4F47-A01E-089D05A9618A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F6826018-5620-4924-BE92-6A245378F610", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "A49A07CF-12BA-481C-B5FF-754520080A8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F203C7D1-AA92-4367-B7A5-EBAE6B76EE6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC0C3DC-4761-488A-90A9-6EA45EE61526", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "62EE065B-F8B6-4125-8486-B2EE0566B27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5245DEF8-64BE-47C9-AA3C-DF3F7F92A89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAC0A7B7-2FE5-40ED-80F3-70F6CC2065F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B066DB88-FB86-467E-8AE2-3AC76B202082", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "8A356E12-DFC8-45D3-A72B-133C72011A85", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "40955D09-9351-436D-A93A-266913CFE407", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CCDA8B7D-108E-4851-BDDD-E81C58131B8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "975AA7EF-3BE1-4112-AAAE-80C678DF06FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "EDDC513A-8B98-4904-BC39-E178D6CABD86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4E4A8-3FB8-4EAA-ADD8-D8A48269C7A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00E1A95-4D81-4D8C-8E9F-02F9866DEC19", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "968A5890-B604-4AF7-88FD-52512DE60A0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "C3390375-1D75-4D28-AA2B-4D28FC006B2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "134FBA88-E8BF-4757-9ED5-449A03ED4FEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "17F83FA7-11A1-48D1-AAD9-80EB8330C576", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.35:*:*:*:*:*:*:*", "matchCriteriaId": "2250FD43-E360-4BB9-8444-47C6014E77F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.2.38:*:*:*:*:*:*:*", "matchCriteriaId": "33E18DBD-6477-4DEF-9A4F-884F0987C89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "41A26F87-4A82-4BF1-9B69-3FDA62659237", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "82B5E7C5-CE7E-45CF-9B02-D174F99D3379", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "6A59FF9C-0A15-4F9F-A807-5F4B5FDD83F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "E0912860-7B6E-4AF9-8208-0F51A11B0CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "1136F1DA-65C0-4D46-87EE-63A5EA8BCC82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "DEA9D4DA-1CC3-4F76-8AC2-936DF68608A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "A1A05215-3700-4DF3-8CDF-25E40065B539", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "BBE017C1-28CE-4219-9BC4-E7AC61A836E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "BDB86586-4D1A-415D-9070-EAAFFFF670AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "2443A527-3A65-4226-A643-B683072CB664", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "BA645994-0744-446B-96EA-21915AF3BEC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA1E87A4-A9EB-4BFC-9070-F32ABD32D33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5B63317-7612-4B7C-8AE8-F18AEFAF4560", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "4CF8BD7E-31C0-4F05-A092-64D9918ED5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "0BBD9E97-0BC5-4120-8E03-1EE9D11E3359", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "4D724096-92CD-457E-8CC5-B8099A8E3187", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "66EA1792-85AC-4AD1-8213-A992F623D743", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "86C7966B-2EB0-4970-B2D5-9F892F2D1C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "50C1D4AD-01C0-4591-9308-625FEF736D7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "4EE06D7A-8DF5-4C98-AEDB-CF0DC5DFF565", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "3B9027F6-F91E-49D3-9328-C72E18625292", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "E1C4EBE8-60A7-4F71-959A-1127DAF2A262", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "3484693F-1D88-44AA-B739-6E0B2C359A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "413E425D-9BD5-4A9B-9FE6-6190C488C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "753121F0-AE17-49FE-B5F3-71DFBD9A4634", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "A583EEC5-7EA9-422E-8C1C-4C28CDBC65F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "3FDAA778-942A-433F-88E5-359490AA28CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "5DC8A5AE-032F-49C7-B1D3-FA68351E9C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "D0F554EB-CCF5-4779-B199-B5F54DDEF79A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.43:*:*:*:*:*:*:*", "matchCriteriaId": "E2FD6008-65F5-4AA5-A824-674863D55F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.44:*:*:*:*:*:*:*", "matchCriteriaId": "21908446-BEEC-4E62-AC98-A29CC1130C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.45:*:*:*:*:*:*:*", "matchCriteriaId": "66F24887-C173-4EEB-A299-104C1E3FA701", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.46:*:*:*:*:*:*:*", "matchCriteriaId": "8040CC3D-FC71-4E9F-B47F-29C076A45783", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.8.4.48:*:*:*:*:*:*:*", "matchCriteriaId": "E828CC88-B141-42C4-8A99-6B7D21AEB955", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "55711FD3-EF2E-4247-883B-03A40FD97612", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "91495846-B9D1-4EBD-9AB3-3B93B85AC279", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2C17961-8069-4D62-ABC1-DCAB7329C3FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "B2D742BF-6E32-4510-A484-EB478EE12132", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED71E067-9788-4369-BD9B-DAC3AA1A26BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "344AAD16-48F8-470F-A292-1CA3D21A75D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF6A591D-2AC6-4A28-B6CD-BD2A3F8D3C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "95EC0A62-B604-4913-B52F-478FA03A5949", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "934198F1-D461-4881-B8C7-8CCECB730FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E357084A-5E12-41E8-9944-1451A55A2D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "B5D877E6-5623-41B0-BE45-4D8697DF1715", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "EA3917D9-E072-4474-B236-AE25875AA509", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "0561BA9E-415A-4D2A-95A2-0C4A706E19A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "52E4A054-1837-436E-A1BF-68FF5213EE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B2CC50D9-10AC-4098-8C09-E46A3BB2DB2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "420D097B-8D7F-455A-8FFD-3D07722CB232", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "FBBAE927-0B79-4EFA-BC6B-08134B03DAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "3B9CA5A8-6C58-44DA-8786-0A1784D73A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "42E47AFC-3BC4-4B8D-AC45-D71A0DB8937C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "A81420A1-7B35-4C48-AF03-82F0ACDEC038", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "7FAC37E6-81AC-4B7C-9C8B-EE9AFB4EF36B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "CD9D1E08-2203-4C5D-A6CA-1041312AAAC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "874B8CDA-1A5B-4F26-B7DF-34204FD481CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "D9C2D047-BE9B-4A8C-A34E-77D9F1E4EEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "D0481146-DDE9-4B0A-907E-867CCCA79F8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "EA8D47A5-60F7-48F7-B8D1-BCE9E9976CFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "6362C627-390E-4183-B6D2-981E0EA1C89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B3D4927A-2CC4-4BAD-B365-4844FDE85583", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "D1733786-193E-4107-A3E7-A640905A14EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "A9272CE2-6C53-4486-BBC5-1DABBBA3E609", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "44DD2A20-7E82-41D7-8DF0-5C4EF7550159", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.47:*:*:*:*:*:*:*", "matchCriteriaId": "54039A5F-6CF5-45C5-A34E-5426BD5BBDE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.48:*:*:*:*:*:*:*", "matchCriteriaId": "9A4B5CFF-9F97-4F99-A07A-5E18019DB2DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.50:*:*:*:*:*:*:*", "matchCriteriaId": "47C355F9-7B58-4CA6-AE00-7D985E2C647F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.52:*:*:*:*:*:*:*", "matchCriteriaId": "0A2A893A-99DD-4892-9771-65BD52C6596A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.54:*:*:*:*:*:*:*", "matchCriteriaId": "56279156-4E4C-4CEC-869A-E244CDC320FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.55:*:*:*:*:*:*:*", "matchCriteriaId": "D984A56E-7B51-4D35-94AC-0395409C9E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.56:*:*:*:*:*:*:*", "matchCriteriaId": "F56FB13C-1AF0-411E-B341-7BAFF75B79B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.12.4.58:*:*:*:*:*:*:*", "matchCriteriaId": "C0C8EF96-D9CB-44A6-A4DA-81C24319D6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "22038B43-6CE2-413A-8334-32BF9137E574", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "15464E33-3166-4401-993D-FEB12DBF0CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0BEAC68D-1A73-492B-A932-50048090A855", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "82EB29B3-F12B-41DC-B573-3FFC0EB9D26B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "41F732E6-A003-4B38-9057-A962C7EDFC6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "1AF57890-3CD7-41A3-A93A-4E3609CA1BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2183862-4E0A-4046-AA22-53B8CFFAE9C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B87C2BF2-D4F5-43FD-805C-B93D752ABAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "21AF5911-BFE9-414B-AD39-F1E2E06377C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "02C8586E-8BBE-45FA-80AA-5C1F2AC79BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "4726A373-71E1-4E12-BEBB-62DF6293B45B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "03F02586-FB92-4A39-8141-A9BD55C52D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66B0B2F-B191-47A2-917E-AC4616CC39AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "88A3E2E8-2E7E-469F-B396-902706C5863F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "E247E151-E5C3-4A39-AA3F-BA77FBD743D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "73F35B92-5A4B-4194-A7F0-721E12F7A427", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "D7F58F94-4010-4B3F-BD37-5DB291BFC082", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "756045B0-6A52-4B98-9EE3-455A71F39034", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "E2B09FED-126F-494A-BCAD-01B020B1C1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "06B44703-0EDC-4E7C-B381-8016F354A3AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "71F1C7CE-8BFD-4270-BFE3-5479D6712484", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "F1E9D7E5-8A81-432F-8B17-6CF95B2622B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "DFF2AF6B-13FD-4EED-8A53-FE417BDFF9AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CBBBB059-A956-4C74-A4F4-1D1BEA5C42E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "DF3512B9-0995-4004-B6FB-921A01B48F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9A95F782-0124-427A-B838-CE16730537F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "F328B623-F3E2-4EBF-86F8-854F8E683F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.14.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "BCD6F39C-4558-4A2B-95D0-F0C0EB691933", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "E02DCB5D-818B-498E-B077-6C73568EC7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8C65E767-7E10-45CE-B46D-32A512D37E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9B33FEB-0DB6-4F2F-BCB8-67CB26C5F127", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "03700A91-CFC9-4038-AEC6-1D693F2577C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "929439FB-D5E7-4E13-979B-8F0E407E17B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C107667C-A223-4EA1-ABB0-45E0AC6E0A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "143F8F07-9B3B-4015-AC57-B17F007D92E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.15.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "A963BCC1-C1EF-4294-AF84-6969807E9B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "52E31CF5-7241-4DC5-97F9-C2EFC9E44A90", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "D0D20C10-2129-4AEE-87A1-05BD05690823", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D84F31E-6830-4B79-BC20-584E622E3861", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2A45DA2B-089E-476D-B2B5-18337AA54B6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CA21B4B-0D0D-4F43-AC83-D979EFCCCBAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "8D06B1D5-4CDE-406C-A667-1A2226B5229A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "01C7232A-EDE8-4AF1-BEF0-B1E32CB7FA3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "B727AF3E-0332-4708-A791-07609C159B3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FB43006-7ADB-4A2A-9F25-2AA15EFF12A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C9AD0F0D-4E30-42ED-AAD5-2B910703E92D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "381D4076-593A-4A0B-B889-2A7A24566E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "795BFE71-D25D-4B46-BCCC-F130BEEA4244", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "1E77F26B-0367-4242-BB76-87CC94E5586C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "1EFBEFEC-27C0-40A9-82EC-FCC32656C2E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "DEF1F7B4-E4EC-4A4B-9E1A-3DD040CB1336", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "4D9F9738-5EAA-4A38-928F-83386F37042E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E0C8A97-27C9-4DB0-A6B4-A281741DAF88", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1C460231-555D-4AB8-A262-F26CB2CC48D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "848C6044-C8DF-4BA3-9C58-096AC6C847DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E9CDBB14-52F1-4FD7-8971-433650DF9944", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.16.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "9535E887-28C2-4F4D-BDAE-6FD2ECCDC26E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D5859D3-D831-44BB-A72C-E2509054BB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "B2C7225F-B430-48DF-ACFF-61687A4A2448", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "F02E16DE-FF05-4629-90E5-C26077BA9100", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "113B5A3A-C36B-4A5E-8B24-D7706F496DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D086EF92-21C5-4F14-BEBB-A35648E6DA1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "6D758AFC-A874-4137-800A-B8E1630DAA81", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F7AA2E52-0636-47E4-BA09-BAAACE9C9DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "FC35A95F-6F7D-4767-856D-7CE8D214520F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.17.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "AC285311-2538-4337-B87F-50264DC2F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "063B39F3-7D62-4E4A-864A-54EF5ADA46F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BE8AF564-B9A1-4236-BFED-C42B759EA1D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBA7D1-6CFF-45BC-9342-8079E4624552", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7748A078-8185-4C38-A47E-C44105C3EE3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB406721-7B8D-48EC-9521-AC74D3877AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "65D5E552-2677-4E8E-809E-53A6B1889154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "EFDDE002-A886-4C6D-9373-7FEB4D6B6A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "28FA58BD-B33E-45EC-AA58-A33CEC12C6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.46:*:*:*:*:*:*:*", "matchCriteriaId": "373DE7AE-EF8A-47C2-8BAF-25E6C762EEB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.53:*:*:*:*:*:*:*", "matchCriteriaId": "2973DA5E-B5EE-430F-93CD-E9288C5BF3FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.18.3.55:*:*:*:*:*:*:*", "matchCriteriaId": "F9362F3E-9E96-47D0-B059-A4A350E2BC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "98FFEC19-5D89-414A-94C4-744C72E057B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "09635D47-0FD8-46EE-ADF8-D7C191C67F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "2678EC5C-F330-485E-9901-2AB410E10581", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "D1EC0911-A71B-43CC-8C48-0292E518E157", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:9.19.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "2BE9BF7D-C928-402C-A90D-B35AF4210B7F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.\r\n\r This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:\r\n\r \r Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.\r Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).\r \r Notes:\r\n\r \r Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.\r This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.\r \r Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n VPN de acceso remoto del software Cisco Adaptive Security Appliance (ASA) y el Software Cisco Firepower Threat Defense (FTD) podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de fuerza bruta en un intento de identificar combinaciones v\u00e1lidas de nombre de usuario y contrase\u00f1a o un atacante remoto autenticado para establecer una sesi\u00f3n VPN SSL sin cliente con un usuario no autorizado. Esta vulnerabilidad se debe a una separaci\u00f3n inadecuada de autenticaci\u00f3n, autorizaci\u00f3n y contabilidad (AAA) entre la funci\u00f3n VPN de acceso remoto y las funciones de administraci\u00f3n HTTPS y VPN de sitio a sitio. Un atacante podr\u00eda aprovechar esta vulnerabilidad especificando un perfil de conexi\u00f3n predeterminada profile/tunnel group mientras realiza un ataque de fuerza bruta o establece una sesi\u00f3n VPN SSL sin cliente utilizando credenciales v\u00e1lidas. Un exploit exitoso podr\u00eda permitir al atacante lograr uno o ambos de los siguientes: Identificar credenciales v\u00e1lidas que luego podr\u00edan usarse para establecer una sesi\u00f3n VPN de acceso remoto no autorizada. Establezca una sesi\u00f3n VPN SSL sin cliente (solo cuando ejecute la versi\u00f3n 9.16 o anterior del software Cisco ASA). Notas: No es posible establecer un t\u00fanel VPN de acceso remoto basado en cliente ya que estos perfiles de conexi\u00f3n predeterminados profile/tunnel group no tienen ni pueden tener un grupo de direcciones IP configurado. Esta vulnerabilidad no permite que un atacante eluda la autenticaci\u00f3n. Para establecer con \u00e9xito una sesi\u00f3n VPN de acceso remoto, se requieren credenciales v\u00e1lidas, incluido un segundo factor v\u00e1lido si est\u00e1 configurada la autenticaci\u00f3n multifactor (MFA). Cisco lanzar\u00e1 actualizaciones de software que aborden esta vulnerabilidad. Existen workarounds que abordan esta vulnerabilidad." } ], "id": "CVE-2023-20269", "lastModified": "2024-04-03T16:12:23.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2023-09-06T18:15:08.303", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-288" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.