mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
806 lines
31 KiB
JSON
806 lines
31 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2018-0331",
|
||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||
|
"published": "2018-06-21T11:29:00.773",
|
||
|
"lastModified": "2023-04-20T15:27:48.130",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A vulnerability in the Cisco Discovery Protocol (formerly known as CDP) subsystem of devices running, or based on, Cisco NX-OS Software contain a vulnerability that could allow an unauthenticated, adjacent attacker to create a denial of service (DoS) condition. The vulnerability is due to a failure to properly validate certain fields within a Cisco Discovery Protocol message prior to processing it. An attacker with the ability to submit a Cisco Discovery Protocol message designed to trigger the issue could cause a DoS condition on an affected device while the device restarts. This vulnerability affects Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvc89242, CSCve40943, CSCve40953, CSCve40965, CSCve40970, CSCve40978, CSCve40992, CSCve41000, CSCve41007."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Una vulnerabilidad en el subsistema Cisco Discovery Protocol (anteriormente conocido como CDP) de los dispositivos que ejecutan, o se basan en, Cisco NX-OS Software podr\u00eda permitir que un atacante adyacente sin autenticar cree una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se debe a un error a la hora de validar adecuadamente ciertos campos en un mensaje Cisco Discovery Protocol antes de procesarlo. Un atacante que pueda enviar un mensaje Cisco Discovery Protocol destinado a desencadenar este problema podr\u00eda provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado mientras el dispositivo se reinicia. La vulnerabilidad afecta a Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects y UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvc89242, CSCve40943, CSCve40953, CSCve40965, CSCve40970, CSCve40978, CSCve40992, CSCve41000 y CSCve41007."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
|
"attackVector": "ADJACENT_NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 6.5,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 2.8,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
|
||
|
"accessVector": "ADJACENT_NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 6.1
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 6.5,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-20"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-399"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.1",
|
||
|
"versionEndExcluding": "7.1\\(5\\)n1\\(1\\)",
|
||
|
"matchCriteriaId": "3B77DE7C-8F8A-4474-BA11-401B6A07C18E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.3",
|
||
|
"versionEndExcluding": "7.3\\(3\\)n1\\(1\\)",
|
||
|
"matchCriteriaId": "4F5FF890-017A-4F2B-9253-8149FA484066"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "991285C8-2BD5-4C84-8DA0-4C500B519267"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:7.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "02DD5791-E4D3-475C-84B0-E642ACFC5EB6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5EE85C54-276F-462E-808A-23D3E54D31BD"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.2",
|
||
|
"versionEndExcluding": "6.2\\(20\\)",
|
||
|
"matchCriteriaId": "627E5170-669E-41CB-BEA7-9DA6C6C4FF44"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.2",
|
||
|
"versionEndExcluding": "7.2\\(2\\)d1\\(3\\)",
|
||
|
"matchCriteriaId": "20B60929-1E25-49F2-9C11-7A613E6CE1E7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.3",
|
||
|
"versionEndExcluding": "7.3\\(2\\)d1\\(1\\)",
|
||
|
"matchCriteriaId": "9223B362-B27F-49FF-AFB2-8F39C43C4510"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.1",
|
||
|
"versionEndExcluding": "8.1\\(2\\)",
|
||
|
"matchCriteriaId": "C06BC203-6A1D-4427-B368-46CDE4110F2E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.2",
|
||
|
"versionEndExcluding": "8.2\\(1\\)",
|
||
|
"matchCriteriaId": "18F3A094-63D1-45B8-B0D2-D84BAD19BB8A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:8.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2B36B056-C068-4413-B648-1D1D6026B823"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "7.0\\(3\\)i3",
|
||
|
"matchCriteriaId": "93C9AFED-1347-4B0E-B031-AF5EA891B9BD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "7.0\\(3\\)i4",
|
||
|
"versionEndExcluding": "7.0\\(3\\)i7\\(1\\)",
|
||
|
"matchCriteriaId": "15C899EF-A64F-4FD8-851C-1D4E2929BAF4"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0FD46BDD-4755-46DD-9F83-B2B589B09417"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_n9k-x9636c-r:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0603E231-14E0-4224-898F-ED61641F7403"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_n9k-x9636q-r:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FE3EB1F2-F964-4D4E-BDE7-8E6805105152"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "7.0\\(3\\)i7\\(1\\)",
|
||
|
"matchCriteriaId": "5219768E-0988-4F66-8D53-23EAD5819F35"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_172tq-xl:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "38AC6D08-C547-44A3-AC77-A63DB58E4889"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "09AC2BAD-F536-48D0-A2F0-D4E290519EB6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C97C29EE-9426-4BBE-8D84-AB5FF748703D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_c36180yc-r:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0C9D4C48-4D01-4761-B2D8-F16E90F78560"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.0",
|
||
|
"versionEndExcluding": "7.3\\(3\\)n1\\(1\\)",
|
||
|
"matchCriteriaId": "D75479AD-9847-497C-9438-AA82D91B6F71"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "51EAD169-9036-496E-B740-45D79546F6D6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0E01F0DE-EA8A-451F-BADF-1A7A48B0C633"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "5.2",
|
||
|
"versionEndExcluding": "8.1\\(1a\\)",
|
||
|
"matchCriteriaId": "DEE82469-C112-4BF3-848B-ACDA7000B235"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "2.2\\(8g\\)",
|
||
|
"matchCriteriaId": "1EB1DA63-8A73-4BBC-AD53-469B0559A112"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.5",
|
||
|
"versionEndExcluding": "3.1\\(2f\\)",
|
||
|
"matchCriteriaId": "CFF9D209-A6D9-4502-A1EC-E9FE1457A547"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:ucs_6120xp:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FC6E3DFD-A811-4FD3-B888-ABCDEFCD3A4B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:ucs_6140xp:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C0246716-64E9-4CCA-9546-A3A40D375E95"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "49112D3F-DFAD-4E71-992B-9E0640FA388C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "38A1D8F2-A4A6-4BAC-8326-9F9DE9572FA2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B82093C6-B36D-4E4E-AD7F-8C107646B8D9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E406DDCE-6753-43E9-B6F0-7A038DE84E41"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "1.1",
|
||
|
"versionEndExcluding": "2.0.1.153",
|
||
|
"matchCriteriaId": "2A5AB957-E691-4088-AB25-33AB9C88F73F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.1.1",
|
||
|
"versionEndExcluding": "2.1.1.86",
|
||
|
"matchCriteriaId": "9F0AC7D7-0569-497E-B38E-2758410A750D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.2.1",
|
||
|
"versionEndExcluding": "2.2.1.70",
|
||
|
"matchCriteriaId": "5712D110-FF7D-4A6A-A592-0245709BC6B3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.2.2",
|
||
|
"versionEndExcluding": "2.2.2.14",
|
||
|
"matchCriteriaId": "6B56E81C-0822-4B76-8F24-9A85A5DD84A6"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.1.1",
|
||
|
"versionEndExcluding": "2.1.1.86",
|
||
|
"matchCriteriaId": "9F0AC7D7-0569-497E-B38E-2758410A750D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.2.1",
|
||
|
"versionEndExcluding": "2.2.1.70",
|
||
|
"matchCriteriaId": "5712D110-FF7D-4A6A-A592-0245709BC6B3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "1.1",
|
||
|
"versionEndExcluding": "2.0.1.152",
|
||
|
"matchCriteriaId": "86A5F522-BA5D-4CF2-B166-9D84ECF33F4E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.2.2",
|
||
|
"versionEndExcluding": "2.2.2.14",
|
||
|
"matchCriteriaId": "6B56E81C-0822-4B76-8F24-9A85A5DD84A6"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0574E77C-18C6-4621-B73A-DCDD6D1B5E37"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id/1041169",
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"VDB Entry"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-cdp",
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|