2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2011-0394" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2011-02-25T12:00:19.213" ,
2023-08-11 20:00:41 +00:00
"lastModified" : "2023-08-11T19:03:30.373" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952."
} ,
{
"lang" : "es" ,
"value" : "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.11), v7.1 y v7.2 anterior a v7.2(5.1), v8.0 anterior a v8.0 (5.19), v8.1 anterior a v8.1 (2.47), v8.2 anterior a v8.2 (2.19), y v8.3 anterior a v8.3 (1.8); dispositivos Cisco PIX Security Appliances Serie 500; y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anterior a v3.1 (20), v3.2 anterior a v3.2 (20), v4.0 anterior a v4.0 (15), y v4.1 anterior a v4.1(5) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje Skinny Client Control Protocol (SCCP) manipulado, tambi\u00e9n conocido como error ID CSCtg69457 y CSCtl84952."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.8
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.3\\(1\\)" ,
"matchCriteriaId" : "F102F5EF-0B67-4FD7-898E-D5EDD8B822D5"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "15ECB359-7290-4732-96F2-AFCEE21C7899"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DA2F01C-ECF1-477B-A413-75D0EB817079"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC150564-7413-401A-9DD8-8AD773F1D8F9"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0714F9E-75AD-4405-BBC3-E0D817C05EF6"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D9649696-DE81-48C7-A276-17E1ECADAD5B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7632C245-04C6-4E78-87B7-55CCCA6FD6C8"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E84099EB-2535-4A9F-8355-FF937CFBD122"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C599F894-DAD2-4231-8BB8-1427E7C02D60"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49696766-ECCE-4903-AA54-271EFEA58B8D"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C1F60C12-71C9-47C6-B43F-A0374419D736"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C853CD9-F451-406E-A515-3BDC34E55639"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD7C28DC-B15F-486B-96F1-D08529B7374A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B03A1408-A55A-4482-B239-B13094B13BFC"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*" ,
"matchCriteriaId" : "62DC7025-F067-45CB-BEA6-ED16A5BD2896"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1557499-D1A1-4A26-80DA-A3D66AA53580"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2649C78C-D742-4E6F-950F-54BF7CF797C3"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "469CFE0C-6319-46F3-8D31-4850F5E6A830"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4333600F-0277-4D6C-922E-53FA01CF3C2E"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35AFDFE9-CCC9-453B-A081-939D1D554379"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C82C545-6796-4B67-A97D-0435D41C63C5"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AA336EBF-FA9A-4B80-A486-446A1C4B72F5"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8B53107-BCD0-4D3E-B090-91D6BD6139C8"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C926091-D9A6-4264-8E9A-52AFCBC09D34"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE82E4AC-BE77-4A45-839F-45163D64A4C0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B521F270-2D51-48BE-BC29-0EDED33FA30B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C73F417-0CF4-4E78-9B33-939F0E41994E"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "67BABA2F-EE28-4914-8130-6768EC599B65"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C912270C-6ABB-4149-8E67-96028B45C312"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB2631B6-F238-4FE3-AA34-703FFB6D6803"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D55D3385-FEE7-44AA-A65A-50924FDC1BFC"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC223DE2-90CA-43CD-8EBF-C9C351D10187"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E853B8BF-07F5-46DF-8DEA-302F68B8B086"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "95627941-30D8-452F-B6C8-76D2BEE93514"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "364CA0EA-F85E-4C4B-96D8-A7256F413844"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "67AB954E-D1F4-4B29-B782-2E9917D82DE0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DA3389C-86FE-45F7-97D7-E3386403944F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "656D49C2-4F2E-4369-8933-FF74A3CD51EF"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C68E73D6-A207-4276-A972-52B859CD958A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E406214-2776-42C2-B777-92E6420FBFBF"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "73BA05D1-78A7-4F90-9448-3F2011EE3EF3"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33F24697-0124-4326-8499-29931D57D246"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7236893-3EE9-4DBE-8A75-5294FD82E922"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97E5BC7E-399F-4FD2-8024-2F4F621BC577"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8F2C8AFA-A4B6-44A2-B00C-1950997493C0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "465313C5-BFB9-458A-8150-8F7BA1F8C386"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C808D46-C846-4C53-A713-150C3FED3FAB"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9CB79D96-75EA-4B4F-99A7-9AB4158B7301"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2706D3BA-37A2-4D71-94DD-5386F5C94374"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74868197-D48D-43DE-A65B-A56369DA6502"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F72BB334-B050-4B52-868A-49250EF1E845"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3181F43-6CB7-47C1-A68A-432995454F14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "39983B88-A340-4712-9E5C-C3D492DDF09C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E29A007-4664-4822-AC78-7C0153417D9F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33A3DD4F-CD94-4BD7-9365-4ED26872697E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE5DA712-F36D-4755-9158-57A5B0F95BE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AA71976-7561-4B9D-BFB3-87A06711EB46"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5732020-BB4A-4F87-B63A-31BD439FE3AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "493B34EA-B262-4123-958C-C2B563A66A7F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6716B573-328C-455E-AB36-315DD6588AA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CB3A6B4-C567-4E96-A735-74F50C7A6906"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "259252A1-C0B1-4679-B04E-29DDDB4ACAD1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B944351-D4ED-42A1-969E-B7DC864B0CBB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "822A8177-A69D-495E-9437-E5567A27F60D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1226F8D6-7402-457B-8AEC-7164D735ECF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04F7CD17-7EAC-4B77-8F59-8EB5362091DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97CC4932-94B6-447E-8294-D6732B46CB41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8F281A7-0C77-46A2-8838-D3E9207FB85D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C3DCF01-326D-44A1-ADAB-CF52F7629082"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E03AD49-1267-4866-A059-DE97EA79D769"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "889F34A9-81CD-4381-9708-A2481C95FE21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26E8B157-67EF-4DFB-BFBB-7794A048E43C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4"
}
]
}
]
}
] ,
"references" : [
2023-08-11 20:00:41 +00:00
{
"url" : "http://secunia.com/advisories/43453" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://secunia.com/advisories/43488" ,
"source" : "ykramarz@cisco.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/46518" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.securitytracker.com/id?1025108" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.securitytracker.com/id?1025109" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0493" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0494" ,
"source" : "ykramarz@cisco.com"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" ,
"source" : "ykramarz@cisco.com"
}
]
}