2024-10-02 20:03:16 +00:00
{
"id" : "CVE-2024-20500" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2024-10-02 20:03:16 +00:00
"published" : "2024-10-02T19:15:14.350" ,
2024-10-08 20:03:18 +00:00
"lastModified" : "2024-10-08T18:27:19.347" ,
"vulnStatus" : "Analyzed" ,
2024-10-02 20:03:16 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition in the AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to insufficient resource management when establishing TLS/SSL sessions. An attacker could exploit this vulnerability by sending a series of crafted TLS/SSL messages to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.\r\nNote: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention."
2024-10-04 14:03:27 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en el servidor VPN de Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servicio AnyConnect de un dispositivo afectado. Esta vulnerabilidad se debe a una gesti\u00f3n insuficiente de los recursos al establecer sesiones TLS/SSL. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una serie de mensajes TLS/SSL manipulados al servidor VPN de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacer que el servidor VPN de Cisco AnyConnect deje de aceptar nuevas conexiones, lo que impedir\u00eda que se establecieran nuevas conexiones VPN SSL. Las sesiones VPN SSL existentes no se ven afectadas. Nota: Cuando el tr\u00e1fico del ataque se detiene, el servidor VPN de Cisco AnyConnect se recupera sin problemas sin necesidad de intervenci\u00f3n manual."
2024-10-02 20:03:16 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-10-08 18:03:23 +00:00
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-10-08 18:03:23 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" ,
"baseScore" : 5.8 ,
"baseSeverity" : "MEDIUM" ,
2024-10-08 18:03:23 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2024-12-08 03:06:42 +00:00
"scope" : "CHANGED" ,
2024-10-08 18:03:23 +00:00
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "LOW"
2024-10-08 18:03:23 +00:00
} ,
"exploitabilityScore" : 3.9 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 1.4
2024-10-08 18:03:23 +00:00
} ,
2024-10-02 20:03:16 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-10-02 20:03:16 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2024-10-02 20:03:16 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2024-12-08 03:06:42 +00:00
"scope" : "UNCHANGED" ,
2024-10-02 20:03:16 +00:00
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-10-02 20:03:16 +00:00
} ,
"exploitabilityScore" : 3.9 ,
2024-12-08 03:06:42 +00:00
"impactScore" : 3.6
2024-10-02 20:03:16 +00:00
}
]
} ,
"weaknesses" : [
2024-10-08 18:03:23 +00:00
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-10-08 18:03:23 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-400"
}
]
} ,
2024-10-02 20:03:16 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-10-02 20:03:16 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-400"
}
]
}
] ,
2024-10-08 18:03:23 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36770C3B-F962-48FB-9D9F-3EABB1F10EFD"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6646F004-E0E0-4316-A022-2793C28FBCCC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "96D29083-7535-4B23-9141-BF6CE2824184"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "1C8F2FA1-B439-4978-AD2B-34C98310D894"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "D620C14D-7724-4C38-83A6-E33328EDE7C3"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B35EB71-8584-4803-A438-AEC406FD8445"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "A61EA9B6-126D-4174-8BEF-7FD311724C03"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2ACA552D-78D3-4312-9537-28ADBB15E08A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "869396D2-5CB1-45FF-8CC8-C6BA17548076"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "0AF66E98-18FB-4862-96C6-090F9B563AAC"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "40A18D40-3168-4270-A019-0FFB3652BD64"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35740A98-6486-458C-99A9-8E23A781C917"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "410A121A-037A-4D44-A35F-7AE41F93E5AF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5A4239D-E115-4368-895A-002BBD94F243"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "995A6C94-CC7F-4CA4-8815-693E491652B4"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A892F3D-62F9-4B04-94E8-FD803159C47B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "900C8DC4-EF1C-4762-A517-F67665F3D724"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03F9C184-3811-4A26-846D-54ECE7CF939F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "0118FD5D-0D25-4984-A6EB-40EF70B85144"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18E682AA-05AD-483F-915F-A2B2C98233B7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "FE27942F-86F1-480C-AFA1-762A5A9E775F"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "6AB39E09-A441-4F95-9F38-44942BDE98AD"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "45953505-EF91-4825-95CD-51EE86D694A5"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2702FE73-E4AC-45C7-A212-44D783720798"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "E1A471D3-2D62-4458-ADDE-53D60E55966C"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.6.0" ,
"versionEndExcluding" : "18.211.2" ,
"matchCriteriaId" : "B3C6574B-E879-4813-9516-93B41EBDFBD3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3099A12-2D6F-4486-A690-1C809AF480B0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*" ,
2024-10-08 20:03:18 +00:00
"versionStartIncluding" : "16.2" ,
2024-10-08 18:03:23 +00:00
"versionEndExcluding" : "18.211.2" ,
2024-10-08 20:03:18 +00:00
"matchCriteriaId" : "D24D11CA-67C0-4376-91DE-F62118062FED"
2024-10-08 18:03:23 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.6.0" ,
"versionEndIncluding" : "18.211.2" ,
"matchCriteriaId" : "553AC2DF-6F85-40D3-B3B1-F979364BA4BD"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE749570-1EA6-4734-B96A-D02B3BA3A756"
}
]
}
]
}
] ,
2024-10-02 20:03:16 +00:00
"references" : [
{
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-10-08 18:03:23 +00:00
"tags" : [
"Vendor Advisory"
]
2024-10-02 20:03:16 +00:00
}
]
}