2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-20933" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2022-10-26T15:15:14.713" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T06:43:51.123" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en el servidor VPN Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z3 Teleworker Gateway podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a que no se comprueban suficientemente los par\u00e1metros proporcionados por el cliente mientras es establecida una sesi\u00f3n VPN SSL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una petici\u00f3n maliciosa y envi\u00e1ndola al dispositivo afectado. Un ataque con \u00e9xito podr\u00eda permitir al atacante causar a el servidor VPN Cisco AnyConnect bloquearse y reiniciarse, resultando en el fracaso de las conexiones VPN SSL establecidas y obligar\u00eda a usuarios remotos a iniciar una nueva conexi\u00f3n VPN y volver a autenticarse. Un ataque sostenido podr\u00eda impedir que sean establecidas nuevas conexiones VPN SSL. Nota: Cuando el tr\u00e1fico de ataque es detenido, el servidor VPN Cisco AnyConnect es recuperado con elegancia sin necesidad de intervenci\u00f3n manual. Cisco Meraki ha publicado actualizaciones de software que abordan esta vulnerabilidad"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
2023-11-07 21:03:21 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
2023-11-07 21:03:21 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
}
]
} ,
"weaknesses" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-234"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "NVD-CWE-Other"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "6D9F9343-745D-45B5-B657-6E5675E08E08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "E1E66F11-F41A-425D-8409-D8529D906E3D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE749570-1EA6-4734-B96A-D02B3BA3A756"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "F7F78CB5-F796-439F-A0A1-E06C857BBAA4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "72BE7D32-2477-45D1-A9C1-418B225574E9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "4C8F3A54-A2A2-4C34-B5A2-19FD31237C34"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "AA12B05C-A12F-4EA6-948F-DC1CC0257729"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3099A12-2D6F-4486-A690-1C809AF480B0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "C95582B9-7563-4F61-8548-D58237AA6FC6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "7160F269-F161-4A30-AD9D-DCECA464F7D6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "312A2614-4164-4B74-B966-8FC76BE323D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "B2E55C71-356C-47F1-9F90-6A673EFBC369"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2702FE73-E4AC-45C7-A212-44D783720798"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "B35AF5F8-8641-4DD0-8B1F-7DEFD188DFF2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "77E90F32-E8E3-4852-B579-49FBDAB5F207"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E85585DA-C918-445B-9B44-B2B1A982A1F7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "C62EF9EE-39A0-46BF-B82E-6D3CE20D69B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "3442C032-F879-4CB5-BE83-BD606C07151C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "F1605125-61CC-4FB9-8CD2-114DE332E637"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "E92B7E7D-A4E7-4F98-9A19-1215361FF3E2"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "BCD8CD23-06CA-4A82-BA3C-3EA8C0B61DA7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "74D48B18-7344-4AF0-A771-D3EF0B421B00"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18E682AA-05AD-483F-915F-A2B2C98233B7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "865B25D7-DFC9-44E2-98A0-2910B34F6140"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "D409165B-80FB-4B61-A02F-529B130EFCB9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03F9C184-3811-4A26-846D-54ECE7CF939F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "2B22E7DB-912F-46CB-BE15-FA9812D15D72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "1B537CF0-FA7F-489A-B771-C526046CE12A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A892F3D-62F9-4B04-94E8-FD803159C47B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "105DD5F7-B29A-46B6-84E6-9081C55F0AC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "E769CB5F-6B7B-48F1-ABFE-DF8412DA6777"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5A4239D-E115-4368-895A-002BBD94F243"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "92BD623D-25BE-4D21-9610-266B337F82C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "094DCADF-4665-426C-B20E-01B46672B2D3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "410A121A-037A-4D44-A35F-7AE41F93E5AF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "34615059-146D-43C4-9FC6-83FA8F11FDEB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "18342750-90EA-4362-869A-9B5FD6E53AA3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35740A98-6486-458C-99A9-8E23A781C917"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "D86B3633-1C72-4912-87F9-8C8811317AB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "B74149A1-5E2F-42C0-A670-C57C91721837"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "5534754A-9F71-4C87-B3AF-00EB6C0421AC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "CCE7FDA7-C02B-4ED3-B7C3-FAA2066B2CA5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "D6EA8014-F9D2-4F4F-A797-056EBCB5439C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "C87C8065-E397-4D62-ABF2-9EC1177BEBE3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "7C884A16-07E2-4536-A4AB-5218E6F6B61F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "235AAC4D-4F87-4CE1-B370-4536052513A6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2ACA552D-78D3-4312-9537-28ADBB15E08A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "B60B34BB-3375-4A6A-BC5F-27934812A6C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "AC690E48-F5D5-4CCD-9248-C5953028E81C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B35EB71-8584-4803-A438-AEC406FD8445"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "5D7526DC-5E2C-42A2-8B1B-BED60034CF0A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "785B2796-0E7D-4FDF-B142-7CE70CEB2269"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndExcluding" : "16.16.6" ,
"matchCriteriaId" : "210E5600-00AB-4923-817D-8B9B61BADB3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.10.1" ,
"matchCriteriaId" : "F7C68C05-248C-4B91-A727-F1ED23AC347C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6646F004-E0E0-4316-A022-2793C28FBCCC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04CF5026-CC39-48FF-A8F0-8E31A425343E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}