VAR-200901-0448

Vulnerability from variot - Updated: 2023-12-18 12:39

Multiple cross-site scripting (XSS) vulnerabilities in the HTTP server in Cisco IOS 11.0 through 12.4 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to the ping program or (2) unspecified other aspects of the URI. The web-based interface implemented in Cisco IOS is vulnerable to cross-site scripting. Some versions of the Cisco IOS provide a web-based interface to configure the device. This web-based interface contains a cross-site scripting vulnerability. A wide range of versions are affected. If the web-based interface is disabled, it is not affected. Some versions of the Cisco IOS have the web-based interface enabled by default. For more information, refer to the information provided by Cisco. NOBUHIRO TSUJI of NTT DATA SECURITY CORPORATION reported this vulnerability to IPA. JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. These issues are tracked by Cisco bug IDs CSCsi13344 and CSCsr72301. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. The attacker may also perform cross-site request-forgery attacks on the same scripts and parameters. Other attacks may also be possible. This type of attack may result in replacing the target's management interface, or redirecting confidential information to an unauthorized third party, for example, the data returned by the /level/15/exec/-/show/run/CR URL can be modified through the XMLHttpRequest object. For example, injecting an img tag pointing to /level/15/configure/-/enable/secret/newpass will change the enable password to newpass.

SOLUTION: Update to a fixed version (please see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: 1) Adrian Pastor and Richard J. Brain of ProCheckUp.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20090114-http.shtml

ProCheckUp: http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19

JVN: http://jvn.jp/en/jp/JVN28344798/index.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. ProCheckup has posted a Security Advisory titled "XSS on Cisco IOS HTTP Server" posted at http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19

Cisco would like to thank Adrian Pastor and Richard J. A system that contains the IOS HTTP server or HTTP secure server, but does not have it enabled, is not affected.

To determine if the HTTP server is running on your device, issue the show ip http server status | include status and the show ip http server secure status | include status commands at the prompt and look for output similar to:

Router#show ip http server status | include status
HTTP server status: Enabled
HTTP secure server status: Enabled

If the device is not running the HTTP server, you should see output similar to:

Router#show ip http server status | include status
HTTP server status: Disabled
HTTP secure server status: Disabled

These vulnerabilities are documented in the following Cisco bug IDs:

  • Cisco bug ID CSCsi13344 - XSS in IOS HTTP Server Special Characters are not escaped in URL strings sent to the HTTP server.
  • Cisco bug ID CSCsr72301 - XSS in IOS HTTP Server (ping parameter) Special Characters are not escaped in URL strings sent to the HTTP server, via the ping parameter. The ping parameter is used both by external applications such as Router and Security Device Manager (SDM) as well as a direct HTTP session to Cisco IOS http server.

These vulnerabilities are independent of each other. These vulnerabilities have been assigned Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-3821.

Workaround +---------

If the HTTP server is not used for any legitimate purposes on the device, it is a best practice to disable it by issuing the following commands in configure mode:

no ip http server
no ip http secure-server

If the HTTP server is required, it is a recommended best practice to control which hosts may access the HTTP server to only trusted sources. To control which hosts can access the HTTP server, you can apply an access list to the HTTP server. To apply an access list to the HTTP server, use the following command in global configuration mode:

ip http access-class {access-list-number | access-list-name}

The following example shows an access list that allows only trusted hosts to access the Cisco IOS HTTP server:

ip access-list standard 20
permit 192.168.1.0 0.0.0.255
remark "Above is a trusted subnet"
remark "Add further trusted subnets or hosts below"

! (Note: all other access implicitly denied)
! (Apply the access-list to the http server)

ip http access-class 20

For additional information on configuring the Cisco IOS HTTP server, consult Using the Cisco Web Browser User Interface.

For additional information on cross-site scripting attacks and the methods used to exploit these vulnerabilities, please refer to the Cisco Applied Mitigation Bulletin "Understanding Cross-Site Scripting (XSS) Threat Vectors", which is available at the following link: http://www.cisco.com/warp/public/707/cisco-amb-20060922-understanding-xss.shtml

Further Problem Description +--------------------------

This vulnerability is about escaping characters in the URL that are sent to the HTTP server. The fix for this vulnerability is to escape special characters in the URL string echoed in the response generated by the web exec application.

Software Version and Fixes +-------------------------

When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center ("TAC") or your contracted maintenance provider for assistance.

Each row of the Cisco IOS software table (below) describes a release train and the platforms or products for which it is intended. If a given release train is vulnerable, then the earliest possible releases that contain the fix (the "First Fixed Release") and the anticipated date of availability for each are listed in the "Rebuild" and "Maintenance" columns. A device running a release in the given train that is earlier than the release in a specific column (less than the First Fixed Release) is known to be vulnerable. The release should be upgraded at least to the indicated release or a later version (greater than or equal to the First Fixed Release label).

For more information on the terms "Rebuild" and "Maintenance," consult the following URL: http://www.cisco.com/warp/public/620/1.html

+----------------------------------------+ | Major | Availability of Repaired | | Release | Releases | |------------+---------------------------| | Affected | First Fixed | Recommended | | 12.0-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0 | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0DA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0DB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0DC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | 12.0(33)S3; | | | 12.0S | Available | | | | on | | | | 03-APR-2009 | | |------------+-------------+-------------| | | Vulnerable; | | | 12.0SC | first fixed | | | | in 12.0S | | |------------+-------------+-------------| | | Vulnerable; | | | 12.0SL | first fixed | | | | in 12.0S | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0SP | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | | | 12.0ST | first fixed | | | | in 12.0S | | |------------+-------------+-------------| | | Vulnerable; | | | 12.0SX | first fixed | | | | in 12.0S | | |------------+-------------+-------------| | | Vulnerable; | | | 12.0SY | first fixed | | | | in 12.0S | | |------------+-------------+-------------| | | Vulnerable; | | | 12.0SZ | first fixed | | | | in 12.0S | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0T | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.0(3c)W5 | | 12.0W | first fixed | (8) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0WC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.0WT | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XD | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XE | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.0XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XG | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XH | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(4)XI2 | | | | are | | | | vulnerable, | | | 12.0XI | release | 12.4(15) | | | 12.0(4)XI2 | T812.4(23) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XJ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XK | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XL | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XM | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XN | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XQ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XR | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XS | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XT | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.0XV | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.1-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1 | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1AA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | | | 12.1AX | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.1AY | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.1AZ | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1CX | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1DA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1DB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1DC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.1E | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.1EA | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | 12.1EB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.2(33) | | 12.1EC | first fixed | SCA212.2 | | | in 12.3BC | (33)SCB12.3 | | | | (23)BC6 | |------------+-------------+-------------| | 12.1EO | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.2(31) | | 12.1EU | first fixed | SGA912.2 | | | in 12.2SG | (50)SG | |------------+-------------+-------------| | | Vulnerable; | 12.2(20) | | 12.1EV | first fixed | S1212.2(33) | | | in 12.4 | SB312.4(15) | | | | T812.4(23) | |------------+-------------+-------------| | | | 12.2(31) | | | Vulnerable; | SGA912.2 | | 12.1EW | first fixed | (50)SG12.4 | | | in 12.4 | (15)T812.4 | | | | (23) | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1EX | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.1EY | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1EZ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1GA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1GB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1T | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XD | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XE | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XF | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XG | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XH | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XI | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XJ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XL | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XM | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XP | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XQ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XR | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XS | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XT | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XU | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XV | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XW | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XX | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XY | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1XZ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1YA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1YB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1YC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1YD | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(5)YE6 | | | | are | | | | vulnerable, | | | 12.1YE | release | 12.4(15) | | | 12.1(5)YE6 | T812.4(23) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1YF | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.1YH | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.1YI | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.1YJ | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.2-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2 | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2B | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | | 12.2(33) | | | Vulnerable; | SCA212.2 | | 12.2BC | first fixed | (33)SCB12.3 | | | in 12.4 | (23)BC612.4 | | | | (15)T812.4 | | | | (23) | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2BW | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.2(33) | | 12.2BX | first fixed | SB312.4(15) | | | in 12.4 | T812.4(23) | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2BY | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2BZ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | | 12.2(33) | | | Vulnerable; | SCA212.2 | | 12.2CX | first fixed | (33)SCB12.3 | | | in 12.4 | (23)BC612.4 | | | | (15)T812.4 | | | | (23) | |------------+-------------+-------------| | | | 12.2(33) | | | Vulnerable; | SCA212.2 | | 12.2CY | first fixed | (33)SCB12.3 | | | in 12.4 | (23)BC612.4 | | | | (15)T812.4 | | | | (23) | |------------+-------------+-------------| | | Vulnerable; | 12.2(20) | | 12.2CZ | first fixed | S1212.2(33) | | | in 12.2SB | SB3 | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2DA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2DD | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2DX | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.2(31) | | 12.2EW | first fixed | SGA912.2 | | | in 12.2SG | (50)SG | |------------+-------------+-------------| | | Vulnerable; | 12.2(31) | | 12.2EWA | first fixed | SGA912.2 | | | in 12.2SG | (50)SG | |------------+-------------+-------------| | 12.2EX | 12.2(40)EX | 12.2(44)EX1 | |------------+-------------+-------------| | | 12.2(44)EY; | 12.2(46)EY; | | 12.2EY | Available | Available | | | on | on | | | 30-JAN-2009 | 23-JAN-2009 | |------------+-------------+-------------| | | Vulnerable; | | | 12.2EZ | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2FX | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | 12.2(44) | | 12.2FY | first fixed | EX112.2(44) | | | in 12.2EX | SE4 | |------------+-------------+-------------| | | Vulnerable; | | | 12.2FZ | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | 12.2IRA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IRB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2IXB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2IXC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2IXD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2IXE | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2IXF | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2IXG | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2JA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2JK | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2MB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2MC | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2S | first fixed | 12.2(20)S12 | | | in 12.2SB | | |------------+-------------+-------------| | | 12.2(33) | | | | SB12.2(31) | | | 12.2SB | SB14; | 12.2(33)SB3 | | | Available | | | | on | | | | 16-JAN-2009 | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SBC | first fixed | 12.2(33)SB3 | | | in 12.2SB | | |------------+-------------+-------------| | 12.2SCA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SCB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SE | 12.2(40)SE | 12.2(44)SE4 | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SEA | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SEB | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SEC | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SED | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SEE | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SEF | first fixed | 12.2(44)SE4 | | | in 12.2SE | | |------------+-------------+-------------| | | Vulnerable; | 12.2(44) | | 12.2SEG | first fixed | EX112.2(44) | | | in 12.2EX | SE4 | |------------+-------------+-------------| | 12.2SG | 12.2(44)SG | 12.2(50)SG | |------------+-------------+-------------| | 12.2SGA | 12.2(31) | 12.2(31) | | | SGA9 | SGA9 | |------------+-------------+-------------| | 12.2SL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SM | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SO | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SR | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SRA | migrate to | 12.2(33) | | | any release | SRC3 | | | in 12.2SRC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SRB | migrate to | 12.2(33) | | | any release | SRC3 | | | in 12.2SRC | | |------------+-------------+-------------| | 12.2SRC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2STE | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2SU | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | 12.2SV | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SVA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SVC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SVD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SVE | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2SW | first fixed | 12.4(15)T8 | | | in 12.4SW | | |------------+-------------+-------------| | 12.2SX | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SXA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SXB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SXD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SXE | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SXF | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2SXH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXI | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.2(20) | | 12.2SY | first fixed | S1212.2(33) | | | in 12.2SB | SB3 | |------------+-------------+-------------| | | Vulnerable; | 12.2(20) | | 12.2SZ | first fixed | S1212.2(33) | | | in 12.2SB | SB3 | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2T | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.2TPC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XB | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XC | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XD | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XE | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | | 12.2(33) | | | Vulnerable; | SCA212.2 | | 12.2XF | first fixed | (33)SCB12.3 | | | in 12.4 | (23)BC612.4 | | | | (15)T812.4 | | | | (23) | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XG | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XH | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XI | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XJ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XK | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XL | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XM | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | | 12.2(20) | | | | S1212.2(33) | | | | SB312.2(33) | | 12.2XN | 12.2(33)XN1 | SRC312.2 | | | | (33) | | | | XNA212.2 | | | | (33r)SRD2 | |------------+-------------+-------------| | 12.2XNA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XNB | Not | | | | Vulnerable | | |------------+-------------+-------------| | | 12.2(46)XO; | 12.2(46)XO; | | 12.2XO | Available | Available | | | on | on | | | 02-FEB-2009 | 02-FEB-2009 | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XQ | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XR | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XS | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XT | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XU | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XV | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2XW | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2YA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.2YB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YE | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YF | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YG | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YH | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YJ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YK | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YL | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2YM | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | 12.2YN | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YO | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2YP | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.2YQ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YR | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YS | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YT | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YU | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YV | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YW | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YX | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YY | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2YZ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2ZA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2ZB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.2(13)ZC | | | | are | | | 12.2ZC | vulnerable, | | | | release | | | | 12.2(13)ZC | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.2ZD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2ZE | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2ZF | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2ZG | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.2ZH | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.2ZJ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2ZL | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2ZP | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2ZU | migrate to | | | | any release | | | | in 12.2SXH | | |------------+-------------+-------------| | | Vulnerable; | | | 12.2ZX | first fixed | 12.2(33)SB3 | | | in 12.2SB | | |------------+-------------+-------------| | 12.2ZY | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2ZYA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.3-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3 | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3B | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | 12.3BC | 12.3(23)BC6 | 12.3(23)BC6 | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3BW | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | 12.3EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.3JEA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.3JEB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.3JEC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3JK | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | 12.3JL | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.3JX | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3T | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | 12.3TPC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3VA | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XA | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.3XB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XC | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XD | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XE | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | 12.3XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XG | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3XI | first fixed | 12.2(33)SB3 | | | in 12.2SB | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3XJ | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XK | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XL | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XQ | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XR | first fixed | T812.4(23) | | | in 12.4 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XS | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3XU | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3XW | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XX | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XY | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3XZ | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | 12.4(15) | | 12.3YA | first fixed | T812.4(23) | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YD | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YF | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YG | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YH | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YI | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YJ | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YK | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YM | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YQ | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YS | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YT | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YU | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YX | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | 12.3YZ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | | | 12.3ZA | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.4-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | 12.4 | 12.4(16) | 12.4(23) | |------------+-------------+-------------| | 12.4JA | 12.4(16b)JA | 12.4(16b) | | | | JA1 | |------------+-------------+-------------| | 12.4JDA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4JK | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4JL | 12.4(3)JL1 | 12.4(3)JL1 | |------------+-------------+-------------| | 12.4JMA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4JMB | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(16b) | | 12.4JX | first fixed | JA1 | | | in 12.4JA | | |------------+-------------+-------------| | 12.4MD | 12.4(15)MD | 12.4(15)MD2 | |------------+-------------+-------------| | 12.4MR | 12.4(16)MR | | |------------+-------------+-------------| | 12.4SW | 12.4(11)SW3 | 12.4(15)T8 | |------------+-------------+-------------| | 12.4T | 12.4(15)T | 12.4(15)T8 | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XA | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XB | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XC | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XD | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XE | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | 12.4XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XG | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XJ | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XK | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | 12.4XL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XP | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XR | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | | | 12.4XT | first fixed | 12.4(15)T8 | | | in 12.4T | | |------------+-------------+-------------| | 12.4XV | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | | 12.4(11) | | | | XW10; | | 12.4XW | 12.4(11)XW3 | Available | | | | on | | | | 22-JAN-2009 | |------------+-------------+-------------| | 12.4XY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4YA | Not | | | | Vulnerable | | +----------------------------------------+

Status of this Notice: FINAL

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.

Revision History

+---------------------------------------+ | Revision | | Initial | | 1.0 | 2009-January-14 | public | | | | release | +---------------------------------------+

Cisco Security Procedures

Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (Darwin)

iEYEARECAAYFAkluC58ACgkQ86n/Gc8U/uA6vACfY36eBjbCbnJsrnJlOCE0Mr6Y JqUAn1TVyUvBk8lGTm94F+tvmZy4n3Ke =cGUi -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200901-0448",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xi"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0t"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0w"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0wc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "12.0xd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.4xv"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.4"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.3xx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.3"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.2xv"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.2"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.1xx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.1xv"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.1"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.0xv"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "12.0"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2see"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2jk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xs"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sve"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2t"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ya"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2seg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0sp"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sva"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sec"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sbc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sm"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3t"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yq"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1eb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4jda"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2cy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3b"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yp"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2srb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ew"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xs"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2by"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1gb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ex"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3jl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sed"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yt"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xm"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3jec"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ay"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sra"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0sl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yq"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sxd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1cx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2cz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2so"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3bc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2su"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0da"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2tpc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xq"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1dc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2dd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xt"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yt"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2svc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3jk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yi"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4t"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sxe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xn"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1eu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2bx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1t"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3za"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2mb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2bz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sef"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3jeb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2s"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ye"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xs"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xt"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2za"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ze"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2bc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2fz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0sc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0sz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2cx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sxa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zya"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1eo"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xt"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3tpc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3ya"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4jmb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ec"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3ys"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ez"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ex"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ja"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4jl"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0sx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2se"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3jea"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0dc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xi"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ey"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1aa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xq"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2mc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xp"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ew"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2dx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2fx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yv"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ga"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xn"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0s"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4md"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2fy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3ym"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xh"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xt"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ym"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yo"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0db"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2svd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ez"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1db"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2b"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ewa"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4sw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2bw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xm"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0st"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ey"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1yi"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ya"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zp"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sxf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xq"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3ja"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3bw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4mr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yn"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sga"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xq"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4jma"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xm"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ixf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4ja"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yr"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4xc"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4jk"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2seb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2ye"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xp"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sxb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sz"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1ax"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1da"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xi"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xo"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yw"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sv"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3jx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.4jx"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0xs"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2da"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zg"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xi"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3yf"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2sea"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.1xu"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2xe"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3va"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.3xb"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.0sy"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2yj"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "12.2zd"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "11.0 through 12.4"
      },
      {
        "model": "ios 12.2 ey",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4sw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4mr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4md",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4jx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4jmb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4jma",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4jl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4jk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4jda",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4ja",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3za",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3ys",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yq",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3ym",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xq",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3va",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3tpc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3jx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3jl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3jk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3jec",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3jeb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3jea",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3ja",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3bw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ze",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2zb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2za",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yv",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yq",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yo",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ym",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ye",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xq",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xo",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2tpc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sxf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sxe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sxd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sxb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sxa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sve",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2svd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2svc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sva",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sv",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2su",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2srb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sra",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2so",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sga",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2seg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sef",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2see",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sed",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sec",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2seb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sea",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2se",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sbc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2sb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2mc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2mb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2jk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ja",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ixa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2fz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2fy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2fx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ez",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ey",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ex",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ewa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2ew",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2dd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2cz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2cy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2cx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2by",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2bc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2b",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ye",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1yb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ya",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xw",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xf",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1gb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ga",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ez",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ey",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ex",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ew",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ev",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1eu",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1eo",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1eb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ea",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1e",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1cx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1az",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ay",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1ax",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1aa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xt",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xs",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xr",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xq",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xn",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xm",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xk",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xj",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xi",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xh",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xg",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xe",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xd",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xb",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0xa",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0wc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0w",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0t",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sz",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sy",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sx",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sv",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0st",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sp",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sl",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0s",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0dc",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0db",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0da",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 jl1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.4(23)"
      },
      {
        "model": "ios 12.4 ja",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 mr",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.4(16)"
      },
      {
        "model": "ios 12.4 xr4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 xq2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 t",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 md",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 xw3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.4 sw3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.3 bc6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 sg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 se5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 se",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 ex",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 xn1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 sb",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 sga9",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 sb14",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.2 zc",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.1 ye6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 xi2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 w5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 s3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios 12.0 sy8",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "12.4(23)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "33260"
      },
      {
        "db": "BID",
        "id": "33625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2seg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2see:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sef:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Adrian Pastor m123303@richmond.ac.uk",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-3821",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-000006",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-33946",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-3821",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-000006",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200901-196",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-33946",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site scripting (XSS) vulnerabilities in the HTTP server in Cisco IOS 11.0 through 12.4 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to the ping program or (2) unspecified other aspects of the URI. The web-based interface implemented in Cisco IOS is vulnerable to cross-site scripting. Some versions of the Cisco IOS provide a web-based interface to configure the device. This web-based interface contains a cross-site scripting vulnerability. A wide range of versions are affected. If the web-based interface is disabled, it is not affected. Some versions of the Cisco IOS have the web-based interface enabled by default. For more information, refer to the information provided by Cisco. NOBUHIRO TSUJI of NTT DATA SECURITY CORPORATION reported this vulnerability to IPA. JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.An arbitrary script may be executed on the user\u0027s web browser. \nThese issues are tracked by Cisco bug IDs CSCsi13344 and CSCsr72301. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. The attacker may also perform cross-site request-forgery attacks on the same scripts and parameters.  Other attacks may also be possible. This type of attack may result in replacing the target\u0027s management interface, or redirecting confidential information to an unauthorized third party, for example, the data returned by the /level/15/exec/-/show/run/CR URL can be modified through the XMLHttpRequest object. For example, injecting an img tag pointing to /level/15/configure/-/enable/secret/newpass will change the enable password to newpass. \n\nSOLUTION:\nUpdate to a fixed version (please see the vendor\u0027s advisory for\ndetails). \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Adrian Pastor and Richard J. Brain of ProCheckUp. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20090114-http.shtml\n\nProCheckUp:\nhttp://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19\n\nJVN:\nhttp://jvn.jp/en/jp/JVN28344798/index.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. ProCheckup has posted a Security Advisory\ntitled \"XSS on Cisco IOS HTTP Server\" posted at \nhttp://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19\n\nCisco would like to thank Adrian Pastor and Richard J. A system that contains the IOS HTTP server or HTTP secure\nserver, but does not have it enabled, is not affected. \n\nTo determine if the HTTP server is running on your device, issue the\nshow ip http server status | include status and the show ip http\nserver secure status | include status commands at the prompt and look\nfor output similar to:\n\n    Router#show ip http server status | include status\n    HTTP server status: Enabled\n    HTTP secure server status: Enabled\n\nIf the device is not running the HTTP server, you should see output\nsimilar to:\n\n    Router#show ip http server status | include status\n    HTTP server status: Disabled\n    HTTP secure server status: Disabled\n\nThese vulnerabilities are documented in the following Cisco bug IDs:\n\n  * Cisco bug ID CSCsi13344 - XSS in IOS HTTP Server \n    Special Characters are not escaped in URL strings sent to the\n    HTTP server. \n  * Cisco bug ID CSCsr72301 - XSS in IOS HTTP Server (ping parameter)\n    Special Characters are not escaped in URL strings sent to the\n    HTTP server, via the ping parameter. The ping parameter is used\n    both by external applications such as Router and Security Device\n    Manager (SDM) as well as a direct HTTP session to Cisco IOS http\n    server. \n\nThese vulnerabilities are independent of each other. These vulnerabilities have been assigned Common\nVulnerabilities and Exposures (CVE) identifier CVE-2008-3821. \n\nWorkaround\n+---------\n\nIf the HTTP server is not used for any legitimate purposes on the\ndevice, it is a best practice to disable it by issuing the following\ncommands in configure mode:\n\n    no ip http server\n    no ip http secure-server\n\nIf the HTTP server is required, it is a recommended best practice to\ncontrol which hosts may access the HTTP server to only trusted\nsources. To control which hosts can access the HTTP server, you can\napply an access list to the HTTP server. To apply an access list to\nthe HTTP server, use the following command in global configuration\nmode:\n\n    ip http access-class {access-list-number | access-list-name}\n\nThe following example shows an access list that allows only trusted\nhosts to access the Cisco IOS HTTP server:\n\n    ip access-list standard 20\n    permit 192.168.1.0 0.0.0.255\n    remark \"Above is a trusted subnet\"\n    remark \"Add further trusted subnets or hosts below\"\n\n    ! (Note: all other access implicitly denied)\n    ! (Apply the access-list to the http server)\n\n    ip http access-class 20\n\nFor additional information on configuring the Cisco IOS HTTP server,\nconsult Using the Cisco Web Browser User Interface. \n\nFor additional information on cross-site scripting attacks and the\nmethods used to exploit these vulnerabilities, please refer to the\nCisco Applied Mitigation Bulletin \"Understanding Cross-Site Scripting\n(XSS) Threat Vectors\", which is available at the following link:\nhttp://www.cisco.com/warp/public/707/cisco-amb-20060922-understanding-xss.shtml\n\nFurther Problem Description\n+--------------------------\n\nThis vulnerability is about escaping characters in the URL that are\nsent to the HTTP server. The fix for this\nvulnerability is to escape special characters in the URL string \nechoed in the response generated by the web exec application. \n\nSoftware Version and Fixes\n+-------------------------\n\nWhen considering software upgrades, also consult \nhttp://www.cisco.com/go/psirt and any subsequent advisories to \ndetermine exposure and a complete upgrade solution. \n\nIn all cases, customers should exercise caution to be certain the\ndevices to be upgraded contain sufficient memory and that current\nhardware and software configurations will continue to be supported\nproperly by the new release. If the information is not clear, contact\nthe Cisco Technical Assistance Center (\"TAC\") or your contracted\nmaintenance provider for assistance. \n\nEach row of the Cisco IOS software table (below) describes a release\ntrain and the platforms or products for which it is intended. If a\ngiven release train is vulnerable, then the earliest possible\nreleases that contain the fix (the \"First Fixed Release\") and the\nanticipated date of availability for each are listed in the \"Rebuild\"\nand \"Maintenance\" columns. A device running a release in the given\ntrain that is earlier than the release in a specific column (less\nthan the First Fixed Release) is known to be vulnerable. The release\nshould be upgraded at least to the indicated release or a later\nversion (greater than or equal to the First Fixed Release label). \n\nFor more information on the terms \"Rebuild\" and \"Maintenance,\"\nconsult the following URL: \nhttp://www.cisco.com/warp/public/620/1.html\n\n+----------------------------------------+\n|   Major    | Availability of Repaired  |\n|  Release   |         Releases          |\n|------------+---------------------------|\n|  Affected  | First Fixed | Recommended |\n| 12.0-Based |   Release   |   Release   |\n|  Releases  |             |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0       | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0DA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0DB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0DC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | 12.0(33)S3; |             |\n| 12.0S      | Available   |             |\n|            | on          |             |\n|            | 03-APR-2009 |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.0SC     | first fixed |             |\n|            | in 12.0S    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.0SL     | first fixed |             |\n|            | in 12.0S    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0SP     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.0ST     | first fixed |             |\n|            | in 12.0S    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.0SX     | first fixed |             |\n|            | in 12.0S    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.0SY     | first fixed |             |\n|            | in 12.0S    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.0SZ     | first fixed |             |\n|            | in 12.0S    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0T      | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.0(3c)W5  |\n| 12.0W      | first fixed | (8)         |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0WC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.0WT     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XD     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XE     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.0XF     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XG     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XH     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Releases    |             |\n|            | prior to    |             |\n|            | 12.0(4)XI2  |             |\n|            | are         |             |\n|            | vulnerable, |             |\n| 12.0XI     | release     | 12.4(15)    |\n|            | 12.0(4)XI2  | T812.4(23)  |\n|            | and later   |             |\n|            | are not     |             |\n|            | vulnerable; |             |\n|            | first fixed |             |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XJ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XK     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XL     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XM     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XN     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XQ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XR     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XS     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XT     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.0XV     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|  Affected  | First Fixed | Recommended |\n| 12.1-Based |   Release   |   Release   |\n|  Releases  |             |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1       | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1AA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.1AX     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.1AY     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.1AZ     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1CX     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1DA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1DB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1DC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.1E      | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.1EA     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n| 12.1EB     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(33)    |\n| 12.1EC     | first fixed | SCA212.2    |\n|            | in 12.3BC   | (33)SCB12.3 |\n|            |             | (23)BC6     |\n|------------+-------------+-------------|\n| 12.1EO     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(31)    |\n| 12.1EU     | first fixed | SGA912.2    |\n|            | in 12.2SG   | (50)SG      |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(20)    |\n| 12.1EV     | first fixed | S1212.2(33) |\n|            | in 12.4     | SB312.4(15) |\n|            |             | T812.4(23)  |\n|------------+-------------+-------------|\n|            |             | 12.2(31)    |\n|            | Vulnerable; | SGA912.2    |\n| 12.1EW     | first fixed | (50)SG12.4  |\n|            | in 12.4     | (15)T812.4  |\n|            |             | (23)        |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1EX     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.1EY     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1EZ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1GA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1GB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1T      | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XD     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XE     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XF     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XG     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XH     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XI     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XJ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XL     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XM     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XP     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XQ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XR     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XS     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XT     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XU     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XV     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XW     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XX     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XY     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1XZ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1YA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1YB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1YC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1YD     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Releases    |             |\n|            | prior to    |             |\n|            | 12.1(5)YE6  |             |\n|            | are         |             |\n|            | vulnerable, |             |\n| 12.1YE     | release     | 12.4(15)    |\n|            | 12.1(5)YE6  | T812.4(23)  |\n|            | and later   |             |\n|            | are not     |             |\n|            | vulnerable; |             |\n|            | first fixed |             |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1YF     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.1YH     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.1YI     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.1YJ     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|  Affected  | First Fixed | Recommended |\n| 12.2-Based |   Release   |   Release   |\n|  Releases  |             |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2       | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2B      | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            |             | 12.2(33)    |\n|            | Vulnerable; | SCA212.2    |\n| 12.2BC     | first fixed | (33)SCB12.3 |\n|            | in 12.4     | (23)BC612.4 |\n|            |             | (15)T812.4  |\n|            |             | (23)        |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2BW     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(33)    |\n| 12.2BX     | first fixed | SB312.4(15) |\n|            | in 12.4     | T812.4(23)  |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2BY     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2BZ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            |             | 12.2(33)    |\n|            | Vulnerable; | SCA212.2    |\n| 12.2CX     | first fixed | (33)SCB12.3 |\n|            | in 12.4     | (23)BC612.4 |\n|            |             | (15)T812.4  |\n|            |             | (23)        |\n|------------+-------------+-------------|\n|            |             | 12.2(33)    |\n|            | Vulnerable; | SCA212.2    |\n| 12.2CY     | first fixed | (33)SCB12.3 |\n|            | in 12.4     | (23)BC612.4 |\n|            |             | (15)T812.4  |\n|            |             | (23)        |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(20)    |\n| 12.2CZ     | first fixed | S1212.2(33) |\n|            | in 12.2SB   | SB3         |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2DA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2DD     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2DX     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(31)    |\n| 12.2EW     | first fixed | SGA912.2    |\n|            | in 12.2SG   | (50)SG      |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(31)    |\n| 12.2EWA    | first fixed | SGA912.2    |\n|            | in 12.2SG   | (50)SG      |\n|------------+-------------+-------------|\n| 12.2EX     | 12.2(40)EX  | 12.2(44)EX1 |\n|------------+-------------+-------------|\n|            | 12.2(44)EY; | 12.2(46)EY; |\n| 12.2EY     | Available   | Available   |\n|            | on          | on          |\n|            | 30-JAN-2009 | 23-JAN-2009 |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2EZ     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2FX     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(44)    |\n| 12.2FY     | first fixed | EX112.2(44) |\n|            | in 12.2EX   | SE4         |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2FZ     | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n| 12.2IRA    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2IRB    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2IXA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2IXB    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2IXC    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2IXD    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2IXE    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2IXF    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2IXG    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2JA     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2JK     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2MB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2MC     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2S      | first fixed | 12.2(20)S12 |\n|            | in 12.2SB   |             |\n|------------+-------------+-------------|\n|            | 12.2(33)    |             |\n|            | SB12.2(31)  |             |\n| 12.2SB     | SB14;       | 12.2(33)SB3 |\n|            | Available   |             |\n|            | on          |             |\n|            | 16-JAN-2009 |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SBC    | first fixed | 12.2(33)SB3 |\n|            | in 12.2SB   |             |\n|------------+-------------+-------------|\n| 12.2SCA    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2SCB    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2SE     | 12.2(40)SE  | 12.2(44)SE4 |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SEA    | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SEB    | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SEC    | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SED    | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SEE    | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SEF    | first fixed | 12.2(44)SE4 |\n|            | in 12.2SE   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(44)    |\n| 12.2SEG    | first fixed | EX112.2(44) |\n|            | in 12.2EX   | SE4         |\n|------------+-------------+-------------|\n| 12.2SG     | 12.2(44)SG  | 12.2(50)SG  |\n|------------+-------------+-------------|\n| 12.2SGA    | 12.2(31)    | 12.2(31)    |\n|            | SGA9        | SGA9        |\n|------------+-------------+-------------|\n| 12.2SL     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2SM     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SO     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SQ     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2SR     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SRA    | migrate to  | 12.2(33)    |\n|            | any release | SRC3        |\n|            | in 12.2SRC  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SRB    | migrate to  | 12.2(33)    |\n|            | any release | SRC3        |\n|            | in 12.2SRC  |             |\n|------------+-------------+-------------|\n| 12.2SRC    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2SRD    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2STE    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2SU     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.2SV     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SVA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SVC    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SVD    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SVE    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2SW     | first fixed | 12.4(15)T8  |\n|            | in 12.4SW   |             |\n|------------+-------------+-------------|\n| 12.2SX     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SXA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SXB    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SXD    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SXE    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SXF    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2SXH    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2SXI    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(20)    |\n| 12.2SY     | first fixed | S1212.2(33) |\n|            | in 12.2SB   | SB3         |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.2(20)    |\n| 12.2SZ     | first fixed | S1212.2(33) |\n|            | in 12.2SB   | SB3         |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2T      | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.2TPC    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XB     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XC     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XD     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XE     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            |             | 12.2(33)    |\n|            | Vulnerable; | SCA212.2    |\n| 12.2XF     | first fixed | (33)SCB12.3 |\n|            | in 12.4     | (23)BC612.4 |\n|            |             | (15)T812.4  |\n|            |             | (23)        |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XG     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XH     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XI     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XJ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XK     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XL     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XM     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            |             | 12.2(20)    |\n|            |             | S1212.2(33) |\n|            |             | SB312.2(33) |\n| 12.2XN     | 12.2(33)XN1 | SRC312.2    |\n|            |             | (33)        |\n|            |             | XNA212.2    |\n|            |             | (33r)SRD2   |\n|------------+-------------+-------------|\n| 12.2XNA    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2XNB    | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | 12.2(46)XO; | 12.2(46)XO; |\n| 12.2XO     | Available   | Available   |\n|            | on          | on          |\n|            | 02-FEB-2009 | 02-FEB-2009 |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XQ     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XR     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XS     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XT     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XU     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XV     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2XW     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2YA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.2YB     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YC     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YD     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YE     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YF     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YG     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YH     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YJ     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YK     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YL     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2YM     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.2YN     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YO     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2YP     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.2YQ     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YR     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YS     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.2YT     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YU     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YV     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YW     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YX     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YY     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2YZ     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2ZA     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2ZB     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Releases    |             |\n|            | prior to    |             |\n|            | 12.2(13)ZC  |             |\n|            | are         |             |\n| 12.2ZC     | vulnerable, |             |\n|            | release     |             |\n|            | 12.2(13)ZC  |             |\n|            | and later   |             |\n|            | are not     |             |\n|            | vulnerable; |             |\n|------------+-------------+-------------|\n| 12.2ZD     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2ZE     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2ZF     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2ZG     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.2ZH     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.2ZJ     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2ZL     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2ZP     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2ZU     | migrate to  |             |\n|            | any release |             |\n|            | in 12.2SXH  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.2ZX     | first fixed | 12.2(33)SB3 |\n|            | in 12.2SB   |             |\n|------------+-------------+-------------|\n| 12.2ZY     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.2ZYA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|  Affected  | First Fixed | Recommended |\n| 12.3-Based |   Release   |   Release   |\n|  Releases  |             |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3       | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3B      | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.3BC     | 12.3(23)BC6 | 12.3(23)BC6 |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3BW     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.3EU     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.3JA     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.3JEA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.3JEB    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.3JEC    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3JK     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.3JL     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.3JX     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3T      | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.3TPC    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3VA     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XA     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.3XB     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XC     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XD     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XE     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n| 12.3XF     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XG     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3XI     | first fixed | 12.2(33)SB3 |\n|            | in 12.2SB   |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3XJ     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XK     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XL     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XQ     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XR     | first fixed | T812.4(23)  |\n|            | in 12.4     |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XS     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3XU     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3XW     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XX     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XY     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3XZ     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(15)    |\n| 12.3YA     | first fixed | T812.4(23)  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YD     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YF     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YG     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YH     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YI     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YJ     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YK     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YM     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YQ     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YS     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YT     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YU     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3YX     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.3YZ     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.3ZA     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|  Affected  | First Fixed | Recommended |\n| 12.4-Based |   Release   |   Release   |\n|  Releases  |             |             |\n|------------+-------------+-------------|\n| 12.4       | 12.4(16)    | 12.4(23)    |\n|------------+-------------+-------------|\n| 12.4JA     | 12.4(16b)JA | 12.4(16b)   |\n|            |             | JA1         |\n|------------+-------------+-------------|\n| 12.4JDA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.4JK     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.4JL     | 12.4(3)JL1  | 12.4(3)JL1  |\n|------------+-------------+-------------|\n| 12.4JMA    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.4JMB    | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            | Vulnerable; | 12.4(16b)   |\n| 12.4JX     | first fixed | JA1         |\n|            | in 12.4JA   |             |\n|------------+-------------+-------------|\n| 12.4MD     | 12.4(15)MD  | 12.4(15)MD2 |\n|------------+-------------+-------------|\n| 12.4MR     | 12.4(16)MR  |             |\n|------------+-------------+-------------|\n| 12.4SW     | 12.4(11)SW3 | 12.4(15)T8  |\n|------------+-------------+-------------|\n| 12.4T      | 12.4(15)T   | 12.4(15)T8  |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XA     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XB     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XC     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XD     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XE     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.4XF     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XG     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XJ     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XK     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.4XL     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.4XM     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.4XN     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.4XP     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n| 12.4XQ     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.4XR     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n|            | Vulnerable; |             |\n| 12.4XT     | first fixed | 12.4(15)T8  |\n|            | in 12.4T    |             |\n|------------+-------------+-------------|\n| 12.4XV     | Vulnerable; |             |\n|            | contact TAC |             |\n|------------+-------------+-------------|\n|            |             | 12.4(11)    |\n|            |             | XW10;       |\n| 12.4XW     | 12.4(11)XW3 | Available   |\n|            |             | on          |\n|            |             | 22-JAN-2009 |\n|------------+-------------+-------------|\n| 12.4XY     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.4XZ     | Not         |             |\n|            | Vulnerable  |             |\n|------------+-------------+-------------|\n| 12.4YA     | Not         |             |\n|            | Vulnerable  |             |\n+----------------------------------------+\n\nStatus of this Notice: FINAL\n============================\n\nTHIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY\nKIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\nDOCUMENT AT ANY TIME. \n\nA stand-alone copy or Paraphrase of the text of this document that\nomits the distribution URL in the following section is an\nuncontrolled copy, and may lack important information or contain\nfactual errors. \n\nRevision History\n================\n\n+---------------------------------------+\n| Revision |                 | Initial  |\n| 1.0      | 2009-January-14 | public   |\n|          |                 | release  |\n+---------------------------------------+\n\nCisco Security Procedures\n=========================\n\nComplete information on reporting security vulnerabilities in Cisco\nproducts, obtaining assistance with security incidents, and\nregistering to receive security information from Cisco, is available\non Cisco\u0027s worldwide website at \nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html\nThis includes instructions for press inquiries regarding Cisco \nsecurity notices. All Cisco security advisories are available at \nhttp://www.cisco.com/go/psirt\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.8 (Darwin)\n\niEYEARECAAYFAkluC58ACgkQ86n/Gc8U/uA6vACfY36eBjbCbnJsrnJlOCE0Mr6Y\nJqUAn1TVyUvBk8lGTm94F+tvmZy4n3Ke\n=cGUi\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "BID",
        "id": "33260"
      },
      {
        "db": "BID",
        "id": "33625"
      },
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "db": "PACKETSTORM",
        "id": "73997"
      },
      {
        "db": "PACKETSTORM",
        "id": "73909"
      }
    ],
    "trust": 2.43
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-33946",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-3821",
        "trust": 3.2
      },
      {
        "db": "JVN",
        "id": "JVN28344798",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "33260",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "33461",
        "trust": 1.9
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-0138",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "51393",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "51394",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "4916",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1021598",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20090114 PR08-19: XSS ON CISCO IOS HTTP SERVER",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20090114 CISCO IOS CROSS-SITE SCRIPTING VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#28344798",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "47947",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "33625",
        "trust": 0.4
      },
      {
        "db": "PACKETSTORM",
        "id": "73909",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-85999",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "32723",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-33946",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "73997",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "db": "BID",
        "id": "33260"
      },
      {
        "db": "BID",
        "id": "33625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "PACKETSTORM",
        "id": "73997"
      },
      {
        "db": "PACKETSTORM",
        "id": "73909"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "id": "VAR-200901-0448",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      }
    ],
    "trust": 1.0236111125
  },
  "last_update_date": "2023-12-18T12:39:21.850000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sr-20090114-http",
        "trust": 0.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-sr-20090114-http.shtml"
      },
      {
        "title": "CSCsi13344",
        "trust": 0.8,
        "url": "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails\u0026bugid=cscsi13344"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://jvn.jp/en/jp/jvn28344798/index.html"
      },
      {
        "trust": 2.3,
        "url": "http://www.cisco.com/en/us/products/products_security_response09186a0080a5c501.html"
      },
      {
        "trust": 1.9,
        "url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-19"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/33260"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/51393"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/51394"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1021598"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/33461"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/4916"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/500063/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2009/0138"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47947"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3821"
      },
      {
        "trust": 0.8,
        "url": "http://jvndb.jvn.jp/ja/contents/2009/jvndb-2009-000006.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3821"
      },
      {
        "trust": 0.6,
        "url": "http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/47947"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/500063/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2009/0138"
      },
      {
        "trust": 0.5,
        "url": "http://www.cisco.com/warp/public/707/cisco-sr-20090114-http.shtml"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/500065"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/500063"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/500674"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/182/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/50/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/33461/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/620/1.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/go/psirt"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3821"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-amb-20060922-understanding-xss.shtml"
      },
      {
        "trust": 0.1,
        "url": "http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "db": "BID",
        "id": "33260"
      },
      {
        "db": "BID",
        "id": "33625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "PACKETSTORM",
        "id": "73997"
      },
      {
        "db": "PACKETSTORM",
        "id": "73909"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "db": "BID",
        "id": "33260"
      },
      {
        "db": "BID",
        "id": "33625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "db": "PACKETSTORM",
        "id": "73997"
      },
      {
        "db": "PACKETSTORM",
        "id": "73909"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-01-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "date": "2009-01-14T00:00:00",
        "db": "BID",
        "id": "33260"
      },
      {
        "date": "2009-02-04T00:00:00",
        "db": "BID",
        "id": "33625"
      },
      {
        "date": "2009-01-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "date": "2009-01-15T17:56:47",
        "db": "PACKETSTORM",
        "id": "73997"
      },
      {
        "date": "2009-01-15T01:12:01",
        "db": "PACKETSTORM",
        "id": "73909"
      },
      {
        "date": "2009-01-16T21:30:03.280000",
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "date": "2009-01-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-33946"
      },
      {
        "date": "2009-06-19T23:40:00",
        "db": "BID",
        "id": "33260"
      },
      {
        "date": "2009-02-09T15:38:00",
        "db": "BID",
        "id": "33625"
      },
      {
        "date": "2009-01-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      },
      {
        "date": "2018-10-11T20:49:47.683000",
        "db": "NVD",
        "id": "CVE-2008-3821"
      },
      {
        "date": "2009-02-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "33260"
      },
      {
        "db": "BID",
        "id": "33625"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco IOS cross-site scripting vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000006"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "73997"
      },
      {
        "db": "PACKETSTORM",
        "id": "73909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200901-196"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…