mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
904 lines
29 KiB
JSON
904 lines
29 KiB
JSON
{
|
|
"id": "CVE-2022-20933",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2022-10-26T15:15:14.713",
|
|
"lastModified": "2023-11-07T03:43:21.230",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of client-supplied parameters while establishing an SSL VPN session. An attacker could exploit this vulnerability by crafting a malicious request and sending it to the affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to crash and restart, resulting in the failure of the established SSL VPN connections and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established. Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. Cisco Meraki has released software updates that address this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el servidor VPN Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z3 Teleworker Gateway podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a que no se comprueban suficientemente los par\u00e1metros proporcionados por el cliente mientras es establecida una sesi\u00f3n VPN SSL. Un atacante podr\u00eda explotar esta vulnerabilidad al dise\u00f1ar una petici\u00f3n maliciosa y envi\u00e1ndola al dispositivo afectado. Un ataque con \u00e9xito podr\u00eda permitir al atacante causar a el servidor VPN Cisco AnyConnect bloquearse y reiniciarse, resultando en el fracaso de las conexiones VPN SSL establecidas y obligar\u00eda a usuarios remotos a iniciar una nueva conexi\u00f3n VPN y volver a autenticarse. Un ataque sostenido podr\u00eda impedir que sean establecidas nuevas conexiones VPN SSL. Nota: Cuando el tr\u00e1fico de ataque es detenido, el servidor VPN Cisco AnyConnect es recuperado con elegancia sin necesidad de intervenci\u00f3n manual. Cisco Meraki ha publicado actualizaciones de software que abordan esta vulnerabilidad"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.6,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.0
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.6,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-234"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "6D9F9343-745D-45B5-B657-6E5675E08E08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "E1E66F11-F41A-425D-8409-D8529D906E3D"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "F7F78CB5-F796-439F-A0A1-E06C857BBAA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "72BE7D32-2477-45D1-A9C1-418B225574E9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "4C8F3A54-A2A2-4C34-B5A2-19FD31237C34"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "AA12B05C-A12F-4EA6-948F-DC1CC0257729"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "C95582B9-7563-4F61-8548-D58237AA6FC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "7160F269-F161-4A30-AD9D-DCECA464F7D6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "312A2614-4164-4B74-B966-8FC76BE323D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "B2E55C71-356C-47F1-9F90-6A673EFBC369"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "B35AF5F8-8641-4DD0-8B1F-7DEFD188DFF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "77E90F32-E8E3-4852-B579-49FBDAB5F207"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "C62EF9EE-39A0-46BF-B82E-6D3CE20D69B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "3442C032-F879-4CB5-BE83-BD606C07151C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "F1605125-61CC-4FB9-8CD2-114DE332E637"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "E92B7E7D-A4E7-4F98-9A19-1215361FF3E2"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "BCD8CD23-06CA-4A82-BA3C-3EA8C0B61DA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "74D48B18-7344-4AF0-A771-D3EF0B421B00"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "865B25D7-DFC9-44E2-98A0-2910B34F6140"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "D409165B-80FB-4B61-A02F-529B130EFCB9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "2B22E7DB-912F-46CB-BE15-FA9812D15D72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "1B537CF0-FA7F-489A-B771-C526046CE12A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "105DD5F7-B29A-46B6-84E6-9081C55F0AC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "E769CB5F-6B7B-48F1-ABFE-DF8412DA6777"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "92BD623D-25BE-4D21-9610-266B337F82C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "094DCADF-4665-426C-B20E-01B46672B2D3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "34615059-146D-43C4-9FC6-83FA8F11FDEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "18342750-90EA-4362-869A-9B5FD6E53AA3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "D86B3633-1C72-4912-87F9-8C8811317AB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "B74149A1-5E2F-42C0-A670-C57C91721837"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "5534754A-9F71-4C87-B3AF-00EB6C0421AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "CCE7FDA7-C02B-4ED3-B7C3-FAA2066B2CA5"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "D6EA8014-F9D2-4F4F-A797-056EBCB5439C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "C87C8065-E397-4D62-ABF2-9EC1177BEBE3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "7C884A16-07E2-4536-A4AB-5218E6F6B61F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "235AAC4D-4F87-4CE1-B370-4536052513A6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "B60B34BB-3375-4A6A-BC5F-27934812A6C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "AC690E48-F5D5-4CCD-9248-C5953028E81C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "5D7526DC-5E2C-42A2-8B1B-BED60034CF0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "785B2796-0E7D-4FDF-B142-7CE70CEB2269"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.2.0",
|
|
"versionEndExcluding": "16.16.6",
|
|
"matchCriteriaId": "210E5600-00AB-4923-817D-8B9B61BADB3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "17.0.0",
|
|
"versionEndExcluding": "17.10.1",
|
|
"matchCriteriaId": "F7C68C05-248C-4B91-A727-F1ED23AC347C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vnESbgBf",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |