var-201603-0329
Vulnerability from variot
Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579. Cisco NX-OS is a data center level operating system. An unauthenticated remote attacker exploiting this vulnerability could result in a denial of service on the affected device. The following products are affected: Cisco Nexus 1000V Series Switches, Nexus 3000 Series Switches, Nexus 4000 Series Switches, Nexus 5000 Series Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Unified Computing CSuting running NX-OS Software)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0329", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_1w", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_1m", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3s", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_5e", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_4a", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_4j", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_1d", }, { model: "keymouse", scope: "eq", trust: 1, vendor: "zzinc", version: "3.08", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_1s", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_5f", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_2c", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_5a", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_1i", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_1x", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_3c", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_3b", }, { model: "opensolaris", scope: "eq", trust: 1, vendor: "sun", version: "snv_124", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_5d", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3q", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_3d", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_5b", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_1b", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.5_base", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_3b", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_5c", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_2d", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_4g", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_4l", }, { model: "x14j", scope: "eq", trust: 1, vendor: "samsung", version: "t-ms14jakucb-1102.5", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3i", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_1e", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: "base", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_4i", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_2r", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_3c", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_3f", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_1d", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3m", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3l", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_4k", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3y", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_1t", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_4b", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_2m", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_1q", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_4f", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_3a", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_1e", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_2c", }, { model: "gs1900-10hp", scope: "lt", trust: 1, vendor: "zyxel", version: "2.50\\(aazi.0\\)c0", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_1c", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.6_base", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_2q", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_2a", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_2e", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_1j", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_3e", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "1.4_3u", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_2d", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.0_4d", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.2_1b", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_3a", }, { model: "jr6150", scope: "lt", trust: 1, vendor: "netgear", version: "2017-01-06", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_1f", }, { model: "unified computing system", scope: "eq", trust: 1, vendor: "cisco", version: "2.1_1a", }, { model: "nx-os", scope: "eq", trust: 0.8, vendor: "cisco", version: "4.0 to 6.1", }, { model: "unified computing system", scope: "eq", trust: 0.8, vendor: "cisco", version: "(ucs)", }, { model: "nexus series switches", scope: "eq", trust: 0.6, vendor: "cisco", version: "1000v", }, { model: "nexus series switche", scope: "eq", trust: 0.6, vendor: "cisco", version: "3000", }, { model: "nexus series switches", scope: "eq", trust: 0.6, vendor: "cisco", version: "7000", }, { model: "nexus series switches", scope: "eq", trust: 0.6, vendor: "cisco", version: "4000", }, { model: "nexus series switches", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "nexus series switches", scope: "eq", trust: 0.6, vendor: "cisco", version: "6000", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.0\\\\\\(3\\\\\\)u5\\\\\\(1c\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.0\\\\\\(3\\\\\\)u5\\\\\\(1h\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.0\\\\\\(3\\\\\\)u5\\\\\\(1a\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "6.0\\\\\\(1\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "4.1\\\\\\(2\\\\\\)e1\\\\\\(1d\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.0\\\\\\(3\\\\\\)u5\\\\\\(1b\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.2\\\\\\(5\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "4.1\\\\\\(2\\\\\\)e1\\\\\\(1b\\\\\\)", }, { model: "nx-os", scope: "eq", trust: 0.6, vendor: "cisco", version: "5.2\\\\\\(7\\\\\\)", }, ], sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "NVD", id: "CVE-2015-0718", }, { db: "CNNVD", id: "CNNVD-201603-009", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.5\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(3c\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(6\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(3\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.6\\\\\\(0.16\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(3b\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(3a\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1k\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1c\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1m\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n1\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n1\\\\\\(1c\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(3\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(1a\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1i\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1h\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u2\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u1\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.1\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.1\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(3a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(5\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2.\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1.\\\\\\(5\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1.\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(5a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(1b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(5\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\)n2\\\\\\(1c\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\)n2\\\\\\(1b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(3\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(3\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(0\\\\\\)n1\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(0\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1j\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1g\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1f\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u4\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(7\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(5\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(1\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(3d\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(7\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(6\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(1\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(1\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(1a\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(0\\\\\\)n1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1e\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1d\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1h\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1c\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2d\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2c\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1d\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(5\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(8\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(6\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(3\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os_1000v_switch:4.0\\\\\\(4\\\\\\)sv1\\\\\\(2\\\\\\):*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(5\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)n2\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(3\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.2\\\\\\(1\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(1a\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.0\\\\\\(1a\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1g\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1\\\\\\(2\\\\\\)e1\\\\\\(1f\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u1\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(2\\\\\\)u1\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1e\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.1\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(4\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:6.0\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.1\\\\\\(6\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2a\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1.\\\\\\(3\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:4.1.\\\\\\(2\\\\\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2015-0718", }, ], }, cve: "CVE-2015-0718", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.8, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2015-0718", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2016-01460", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-78664", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2015-0718", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2016-01460", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201603-009", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-78664", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "VULHUB", id: "VHN-78664", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "NVD", id: "CVE-2015-0718", }, { db: "CNNVD", id: "CNNVD-201603-009", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579. Cisco NX-OS is a data center level operating system. An unauthenticated remote attacker exploiting this vulnerability could result in a denial of service on the affected device. The following products are affected: Cisco Nexus 1000V Series Switches, Nexus 3000 Series Switches, Nexus 4000 Series Switches, Nexus 5000 Series Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Unified Computing CSuting running NX-OS Software)", sources: [ { db: "NVD", id: "CVE-2015-0718", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "CNVD", id: "CNVD-2016-01460", }, { db: "VULHUB", id: "VHN-78664", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2015-0718", trust: 3.1, }, { db: "SECTRACK", id: "1035159", trust: 1.1, }, { db: "SECTRACK", id: "1035160", trust: 1.1, }, { db: "JVNDB", id: "JVNDB-2015-006993", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201603-009", trust: 0.7, }, { db: "CNVD", id: "CNVD-2016-01460", trust: 0.6, }, { db: "BID", id: "83950", trust: 0.1, }, { db: "VULHUB", id: "VHN-78664", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "VULHUB", id: "VHN-78664", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "NVD", id: "CVE-2015-0718", }, { db: "CNNVD", id: "CNNVD-201603-009", }, ], }, id: "VAR-201603-0329", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "VULHUB", id: "VHN-78664", }, ], trust: 1.0952827433333332, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, ], }, last_update_date: "2023-12-18T12:20:36.363000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20160302-netstack", trust: 0.8, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160302-netstack", }, { title: "Patch for Cisco NX-OSSoftware Denial of Service Vulnerability (CNVD-2016-01460)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/72208", }, { title: "Cisco NX-OS Software TCP Fix for stack denial of service vulnerability", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60374", }, ], sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "CNNVD", id: "CNNVD-201603-009", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-399", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-78664", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "NVD", id: "CVE-2015-0718", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160302-netstack", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1035159", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1035160", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0718", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0718", }, ], sources: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "VULHUB", id: "VHN-78664", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "NVD", id: "CVE-2015-0718", }, { db: "CNNVD", id: "CNNVD-201603-009", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2016-01460", }, { db: "VULHUB", id: "VHN-78664", }, { db: "JVNDB", id: "JVNDB-2015-006993", }, { db: "NVD", id: "CVE-2015-0718", }, { db: "CNNVD", id: "CNNVD-201603-009", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2016-03-07T00:00:00", db: "CNVD", id: "CNVD-2016-01460", }, { date: "2016-03-03T00:00:00", db: "VULHUB", id: "VHN-78664", }, { date: "2016-03-18T00:00:00", db: "JVNDB", id: "JVNDB-2015-006993", }, { date: "2016-03-03T22:59:02.707000", db: "NVD", id: "CVE-2015-0718", }, { date: "2016-03-03T00:00:00", db: "CNNVD", id: "CNNVD-201603-009", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2016-03-08T00:00:00", db: "CNVD", id: "CNVD-2016-01460", }, { date: "2016-12-03T00:00:00", db: "VULHUB", id: "VHN-78664", }, { date: "2016-03-18T00:00:00", db: "JVNDB", id: "JVNDB-2015-006993", }, { date: "2016-12-03T03:02:55.883000", db: "NVD", id: "CVE-2015-0718", }, { date: "2016-03-03T00:00:00", db: "CNNVD", id: "CNNVD-201603-009", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201603-009", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Cisco Nexus Device and Unified Computing System Run on Cisco NX-OS Service disruption in (DoS) Vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2015-006993", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201603-009", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.