var-201905-0502
Vulnerability from variot

A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform. Cisco's Trust Anchor module (TAm) can be bypassed through manipulating the bitstream of the Field Programmable Gate Array (FPGA). Additionally, Cisco's IOS XE web UI improperly sanitizes user-input, and could allow an authenticated, remote attack to execute commands. An authenticated, remote attacker could execute commands as root on the vulnerable device. A local attacker can leverage this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. This issue is being tracked by Cisco Bug IDsCSCvn77141, CSCvn77142,CSCvn77143,CSCvn77147, CSCvn77150, CSCvn77151, CSCvn77152, CSCvn77153, CSCvn77154, CSCvn77155,CSCvn77156, CSCvn77158, CSCvn77159, CSCvn77160, CSCvn77162, CSCvn77166, CSCvn77167, CSCvn77168, CSCvn77169, CSCvn77170, CSCvn77171, CSCvn77172, CSCvn77175, CSCvn77180, CSCvn77181, CSCvn77182, CSCvn77183, CSCvn77184, CSCvn77185, CSCvn77191, CSCvn77201, CSCvn77202, CSCvn77205, CSCvn77207, CSCvn77209, CSCvn77212, CSCvn77219, CSCvn77220, CSCvn77245, CSCvn77246, CSCvn77248, CSCvn77249, CSCvn89137, CSCvn89138, CSCvn89140, CSCvn89143, CSCvn89144, CSCvn89145, CSCvn89146,CSCvn89150, and CSCvp42792. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0502",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ncs2k-mr-mxp-k9",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ic3000-k9",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.0.2",
         },
         {
            model: "ios",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "15.8",
         },
         {
            model: "ios",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "15.7",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.8\\(3\\)m3",
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "16.9.4",
         },
         {
            model: "ons 15454 mstp",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ios xe",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "16.7.0",
         },
         {
            model: "nx-os",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "9.3\\(2\\)",
         },
         {
            model: "ios xr",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0.1",
         },
         {
            model: "encs 5100",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "asr 1001",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "16.0.0",
         },
         {
            model: "ios xr",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1.1",
         },
         {
            model: "analog voice network interface modules",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "15454-m-wse-k9",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "industrial security appliances 3000",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.0.05",
         },
         {
            model: "catalyst 9800-80 wireless controller",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "encs 5400",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepower 4000",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.0.18",
         },
         {
            model: "ios",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "15.9",
         },
         {
            model: "integrated services router t1\\/e1 voice and wan network interface modules",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 9800-40 wireless controller",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xe",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "16.4.0",
         },
         {
            model: "integrated services router 4400",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.1",
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "16.12.1",
         },
         {
            model: "ios",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "15.7\\(3\\)m4b",
         },
         {
            model: "ios",
            scope: "lte",
            trust: 1,
            vendor: "cisco",
            version: "15.7\\(3\\)m5",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.6\\(3\\)m6b",
         },
         {
            model: "asa 5500",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.1.15",
         },
         {
            model: "supervisor a\\+",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "firepower 9000",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.0.18",
         },
         {
            model: "sm-x-1t3\\/e3",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "16.6.7",
         },
         {
            model: "firepower 2100",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "2.6.1.134",
         },
         {
            model: "integrated services router 4200",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.1",
         },
         {
            model: "supervisor b\\+",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.6\\(3\\)m7",
         },
         {
            model: "ios xe",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "16.10",
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "16.3.9",
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.5\\(1\\)sy4",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.9\\(3\\)m",
         },
         {
            model: "nx-os",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "8.4.1",
         },
         {
            model: "integrated services router 4300",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "1.1",
         },
         {
            model: "ios xe",
            scope: "gte",
            trust: 1,
            vendor: "cisco",
            version: "16.10.0",
         },
         {
            model: "ios",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "15.8\\(3\\)m2a",
         },
         {
            model: "ios xe",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "16.2.1",
         },
         {
            model: "asr 1000 series",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "15454 m wse k9",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "analog voice network interface modules",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "asa 5500",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepower 2100",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepower 4000",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepower 9000",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "integrated services router t1/e1 voice and wan network interface modules",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ons 15454 mstp",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "supervisor a+",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "supervisor b+",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "trust anchor module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "packet-over-t3/e3 service module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "95000",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "93000",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "92000",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "nexus 3264c-e switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus 3132c-z switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus 31108tc-v",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nexus 31108pc-v",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "network convergence system series routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55000",
         },
         {
            model: "network convergence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50020",
         },
         {
            model: "network convergence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50010",
         },
         {
            model: "network convergence system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10020",
         },
         {
            model: "ncs series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2000",
         },
         {
            model: "mds",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000",
         },
         {
            model: "ic3000 industrial compute gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "firepower series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "firepower series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: "firepower series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "21000",
         },
         {
            model: "connected grid routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cbr-8 converged broadband router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "catalyst wireless controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9800-800",
         },
         {
            model: "catalyst wireless controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9800-400",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "96000",
         },
         {
            model: "catalyst series switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "95000",
         },
         {
            model: "catalyst series switches",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "93000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "68000",
         },
         {
            model: "asr series aggregation services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9200",
         },
         {
            model: "asr series aggregation services routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90000",
         },
         {
            model: "asr route switch processor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90030",
         },
         {
            model: "asr route switch processor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "90020",
         },
         {
            model: "asr series routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10000",
         },
         {
            model: "asa series with firepower services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5500-x0",
         },
         {
            model: "asa series with firepower service",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5500-x5.3",
         },
         {
            model: "analog voice network interface module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "industrial integrated services routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8290",
         },
         {
            model: "industrial integrated services routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8090",
         },
         {
            model: "series enterprise network compute system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44610",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4451-x0",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44310",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43510",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43310",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43210",
         },
         {
            model: "integrated services router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "42210",
         },
         {
            model: "series integrated services routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40000",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "series industrial security appliances",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30000",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            db: "BID",
            id: "108350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.1.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "2.6.1.134",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.0.18",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.0.18",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.12.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.12.1",
                              versionStartIncluding: "16.10.0",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.9.4",
                              versionStartIncluding: "16.7.0",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.6.7",
                              versionStartIncluding: "16.4.0",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.3.9",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.9\\(3\\)m",
                              versionStartIncluding: "15.9",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.8\\(3\\)m3",
                              versionStartIncluding: "15.8",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "15.7\\(3\\)m5",
                              versionStartIncluding: "15.7",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.6\\(3\\)m7",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.0.05",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.8\\(3\\)m2a",
                              versionStartIncluding: "15.8",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndIncluding: "15.7\\(3\\)m4b",
                              versionStartIncluding: "15.7",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.6\\(3\\)m6b",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.2.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.5\\(1\\)sy4",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.12.1",
                              versionStartIncluding: "16.10",
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "16.9.4",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.0.2",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.4.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.3\\(2\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.4.1",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Richard Housley (Research Scientist),This vulnerability was publicly disclosed by Red Balloon Security on May 13,atin Kataria (Principal Research Scientist), and Dr. Ang Cui (Chief Scientist) of Red Balloon Security, 2019. The Cisco Product Security Incident Response Team (PSIRT) is aware of the existence of proof-of-concept code that demonstrates this vulnerability on the Cisco ASR 1001-X. There are no indications at this time that this proof-of-concept code is publicly available. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2019-1649",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2019-1649",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "VHN-148641",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ykramarz@cisco.com",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2019-1649",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-1649",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "ykramarz@cisco.com",
                  id: "CVE-2019-1649",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201905-340",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-148641",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2019-1649",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform. Cisco's Trust Anchor module (TAm) can be bypassed through manipulating the bitstream of the Field Programmable Gate Array (FPGA). Additionally, Cisco's IOS XE web UI improperly sanitizes user-input, and could allow an authenticated, remote attack to execute commands. An authenticated, remote attacker could execute commands as root on the vulnerable device. \nA local attacker can leverage this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. \nThis issue is being tracked by Cisco Bug IDsCSCvn77141, CSCvn77142,CSCvn77143,CSCvn77147, CSCvn77150, CSCvn77151, CSCvn77152, CSCvn77153, CSCvn77154, CSCvn77155,CSCvn77156, CSCvn77158, CSCvn77159, CSCvn77160, CSCvn77162, CSCvn77166, CSCvn77167, CSCvn77168, CSCvn77169, CSCvn77170, CSCvn77171, CSCvn77172, CSCvn77175, CSCvn77180, CSCvn77181, CSCvn77182, CSCvn77183, CSCvn77184, CSCvn77185, CSCvn77191, CSCvn77201, CSCvn77202, CSCvn77205, CSCvn77207, CSCvn77209, CSCvn77212, CSCvn77219, CSCvn77220, CSCvn77245, CSCvn77246, CSCvn77248, CSCvn77249, CSCvn89137, CSCvn89138, CSCvn89140, CSCvn89143, CSCvn89144, CSCvn89145, CSCvn89146,CSCvn89150, and CSCvp42792. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "BID",
            id: "108350",
         },
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            db: "VULMON",
            id: "CVE-2019-1649",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#400865",
            trust: 3.7,
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
            trust: 2.9,
         },
         {
            db: "BID",
            id: "108350",
            trust: 2.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-20-072-03",
            trust: 1.8,
         },
         {
            db: "JVN",
            id: "JVNVU97735735",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1680.6",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1680.16",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1680.5",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-148641",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2019-1649",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            db: "BID",
            id: "108350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
   },
   id: "VAR-201905-0502",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
      ],
      trust: 0.6652019952941175,
   },
   last_update_date: "2023-12-18T12:36:14.705000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sa-20190513-secureboot",
            trust: 0.8,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190513-secureboot",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2019/08/22/cisco_patch_bundle/",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2019/05/13/cisco_thrangrycat_vulnerability/",
         },
         {
            title: "Cisco: Cisco Secure Boot Hardware Tampering Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20190513-secureboot",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2019-1649 ",
         },
         {
            title: "sec-daily-2019",
            trust: 0.1,
            url: "https://github.com/alphaseclab/sec-daily-2019 ",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/cisco-patch-firmware/144936/",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/cisco-webex-remote-code-execution/144805/",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/cisco-bugs-unpatched-millions-devices/144692/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-667",
            trust: 1.1,
         },
         {
            problemtype: "CWE-284",
            trust: 0.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.5,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190513-secureboot",
         },
         {
            trust: 2.4,
            url: "http://www.securityfocus.com/bid/108350",
         },
         {
            trust: 1.8,
            url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
         },
         {
            trust: 1.7,
            url: "https://www.kb.cert.org/vuls/id/400865/",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-1649",
         },
         {
            trust: 1.3,
            url: "https://www.kb.cert.org/vuls/id/400865",
         },
         {
            trust: 0.9,
            url: "http://www.cisco.com/",
         },
         {
            trust: 0.8,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190513-webui",
         },
         {
            trust: 0.8,
            url: "https://thrangrycat.com/",
         },
         {
            trust: 0.8,
            url: "https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html",
         },
         {
            trust: 0.8,
            url: "https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1649",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97735735/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/cisco-overwrite-of-the-firmware-image-29281",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.1680.5/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/80766",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.1680.6/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/667.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2019-1649",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.theregister.co.uk/2019/05/13/cisco_thrangrycat_vulnerability/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            db: "BID",
            id: "108350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            db: "BID",
            id: "108350",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-05-14T00:00:00",
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            date: "2019-05-13T00:00:00",
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            date: "2019-05-13T00:00:00",
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            date: "2019-05-13T00:00:00",
            db: "BID",
            id: "108350",
         },
         {
            date: "2019-06-05T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            date: "2019-05-13T19:29:01.520000",
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            date: "2019-05-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-05-16T00:00:00",
            db: "CERT/CC",
            id: "VU#400865",
         },
         {
            date: "2022-12-13T00:00:00",
            db: "VULHUB",
            id: "VHN-148641",
         },
         {
            date: "2022-12-13T00:00:00",
            db: "VULMON",
            id: "CVE-2019-1649",
         },
         {
            date: "2019-05-13T00:00:00",
            db: "BID",
            id: "108350",
         },
         {
            date: "2019-06-05T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-004636",
         },
         {
            date: "2022-12-13T19:42:20.253000",
            db: "NVD",
            id: "CVE-2019-1649",
         },
         {
            date: "2020-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "BID",
            id: "108350",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Trust Anchor module (TAm) improperly checks code and Cisco IOS XE web UI does not sanitize user input",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#400865",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "access control error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201905-340",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.