2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-34720" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2021-09-09T05:15:11.463" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:36:11.803" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition. This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en las funciones de respuesta de los Acuerdos de Nivel de Servicio IP (IP SLA) y del Protocolo de Medici\u00f3n Activa de Dos V\u00edas (TWAMP) de Cisco IOS XR Software podr\u00eda permitir a un atacante remoto no autenticado causar el agotamiento de la memoria de paquetes del dispositivo o causar el bloqueo del proceso IP SLA, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad Se presenta porque los fallos en la creaci\u00f3n de sockets son manejados inapropiadamente durante los procesos IP SLA y TWAMP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de paquetes espec\u00edficos de IP SLA o TWAMP a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante agotar la memoria de paquetes, lo que afectar\u00eda a otros procesos, como los protocolos de enrutamiento, o bloquear\u00eda el proceso IP SLA"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
2023-11-07 21:03:21 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
2023-11-07 21:03:21 +00:00
"source" : "d1c1063e-7a18-46af-9102-31f8928bc633" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"cvssData" : {
2023-11-07 21:03:21 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 4.3
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
} ,
{
2023-11-07 21:03:21 +00:00
"source" : "d1c1063e-7a18-46af-9102-31f8928bc633" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-771"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9000v-v2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB91BE23-C710-473F-8E43-0E0DE760F8AD"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "324C97E6-1810-404F-9F45-6240F99FF039"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57EB55BB-41B7-40A1-B6F5-142FE8AB4C16"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "433F4A82-04A4-4EAA-8C19-F7581DCD8D29"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D5E60AB-94FF-448A-89D8-5D2197E21C74"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91474DBC-FB31-4DDF-96C5-311FA1D53A74"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA241214-2F05-4360-9B50-385355E29CF4"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A93212A4-50AB-42E7-89A4-5FBBAEA050C3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EDA53A61-98B3-458C-8893-61CD7D6B1E48"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F396564E-B477-4A27-A189-CEB737552E25"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5445CC54-ACFB-4070-AF26-F91FEAA85181"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ios_xrv:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F39CC9A-297B-428A-82B4-BA0B83AA85CD"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ios_xrv_9000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EEE98C3E-67E2-43A3-AEA9-1575F2B93A78"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_520:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5249FE7A-FAAE-42C4-9250-DF4B2009F420"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC7AE6C1-B7C6-4056-9719-B5CFF71970AD"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_540_fronthaul:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9C17E4B-1B14-42F2-BCE6-2D5020625382"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_560-4:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB01E968-E838-4D3C-B603-BF7E4E0F8A2C"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_560-7:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08864A59-0840-4407-8D30-9CE34BAF05E7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2A8C028-107B-4410-BCC6-5BCB8DB63603"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA13FE67-F4AE-46DF-921B-3FB91BDF742B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98622F14-CC47-45E0-85E4-A7243309487C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_4009:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F40E779D-5865-4E4B-AE2D-CF1860BA19E2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_4016:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DC6A867F-E809-4CB5-82DB-2670CB0A6359"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A972EFE-4F7E-4BFC-8631-66A2D16B74A3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B254955-C485-45D7-A19B-E78CE1D997AD"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F72AEF0-EE70-40F8-B52B-1390820B87BB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50C7B71A-2559-4E90-BAAA-C6FAAFE35FC3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "43D21B01-A754-474F-8E46-14D733AB307E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17D6424C-972F-459C-B8F7-04FFD9F541BC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "523058BF-DE14-4FAD-8A67-C8CA795032D9"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_6008:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "61AF653C-DCD4-4B20-A555-71120F9A5BB9"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_1001:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F6E0FBE-70B7-413C-8943-39BEFE050298"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_1002:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "37AE5FB0-D9A6-4EBE-9F7F-243299AE918B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:ncs_1004:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "60C9AAF8-4C5B-4EF5-B575-8235F3C54BCC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.2.3" ,
"matchCriteriaId" : "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.3.0" ,
"versionEndExcluding" : "6.3.2" ,
"matchCriteriaId" : "D19A362A-DF30-4B02-832E-FB5389C9400E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "7.2.2" ,
"matchCriteriaId" : "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E055F58F-F9FB-4B27-841E-61ECAB5F42B8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2B832863-E366-46ED-BC35-838762F0CE29"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6655851F-58D9-49D9-A56E-8440A7F7BB45"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F5E2AE67-DED3-4414-A194-386ADB2C8DC7"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3920133A-684D-4A9F-B65A-FF4EAE5052E5"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9ED06361-5A68-4656-AEA5-240C290594CD"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
}
]
}