mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
651 lines
30 KiB
JSON
651 lines
30 KiB
JSON
{
|
|
"id": "CVE-2017-6609",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2017-04-20T22:59:00.573",
|
|
"lastModified": "2019-10-03T00:03:26.223",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the IPsec code of Cisco ASA Software could allow an authenticated, remote attacker to cause a reload of the affected system. The vulnerability is due to improper parsing of malformed IPsec packets. An attacker could exploit this vulnerability by sending malformed IPsec packets to the affected system. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. An attacker needs to establish a valid IPsec tunnel before exploiting this vulnerability. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.8) 9.2(4.15) 9.4(4) 9.5(3.2) 9.6(2). Cisco Bug IDs: CSCun16158."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el c\u00f3digo IPsec de Cisco ASA Software podr\u00eda permitir a un atacante remoto autenticado provocar una recarga del sistema afectado. La vulnerabilidad se debe al an\u00e1lisis incorrecto de paquetes IPsec malformados. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes IPsec malformados al sistema afectado. Nota: S\u00f3lo se puede utilizar el tr\u00e1fico dirigido al sistema afectado para explotar esta vulnerabilidad. Esta vulnerabilidad afecta a los sistemas configurados s\u00f3lo en el modo enrutado de firewall y en modo de contexto \u00fanico o m\u00faltiple. Esta vulnerabilidad puede ser provocada por el tr\u00e1fico IPv4 e IPv6. Un atacante necesita establecer un t\u00fanel IPsec v\u00e1lido antes de explotar esta vulnerabilidad. Esta vulnerabilidad afecta al software Cisco ASA que se ejecuta en los siguientes productos: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Versiones fijadas: 9.1(7.8) 9.2(4.15) 9.4(4) 9.5(3.2) 9.6(2). Cisco Bug IDs: CSCun16158."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.7,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 4.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB357C18-AD20-40EA-9DFC-82357C3C0286"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4208C477-61D9-4675-A07B-D0F89EA008AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "260CB5D6-3250-406D-AED9-AB20CDC098FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F3A2CA43-A785-4FE7-B9A2-FEBB9243ABF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA489865-9ED9-44E6-BE96-E3BDC48BE3E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDB1BF56-6914-4AC7-A699-4CDB59AF7FBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96D3F911-598D-4BC8-B5A4-F650B5DDF41E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3AAAEC3-9BFB-4B1F-A142-83E6344761A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A240FF4C-5A13-4774-BFF8-34A790C36571"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D936BFD8-A706-410A-96F7-E8BE90B60C0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "817F732F-E979-4125-BF0B-A37E353D77E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F56D4EA1-7CB2-450B-9074-E611B7BE67E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3263E1AC-2182-4A9E-904A-66BFE4681063"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6637885D-2D5D-4F37-B6AA-9E2D5EFC96E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0413B00-8783-42C1-8EB5-EF4ACB304EA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76D30A4D-78E5-4786-827F-25FCB3DE754E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D1E00B6-95B9-46EC-8C57-86850CB2B1EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B084AAE5-94AA-421A-BF29-8C40F8F4A71D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5996EF50-8A2E-4643-AEBC-1584CED90376"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "021D0065-B22A-4E52-87C0-14F35C78E740"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\\(7\\)4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80B00B18-6EBC-47FF-9D0A-77AEA6FCAF76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\\(7\\)6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64D69EAF-F01F-4DA2-A928-B659FA5D1477"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\\(7\\)7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6821E2D-C4C7-4A04-8E0E-130BDEC116C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD618D16-8A04-4E5D-A6D1-C68BAA879FF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D63064CF-75CE-4A73-A063-8ECA11997190"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "962B9FFB-A17E-460D-A452-159B1B12AC64"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A2E2032-5D93-4525-B31D-22EAEFADC252"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E70C359-27DF-4D46-B11D-2F8E55CFEC19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "838C73E6-830D-42EB-9625-36F9074D729D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "19CB3EA6-997B-4711-8348-85DEDF3AA359"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85F3BDBE-141B-450B-A8CE-F48A8A928933"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6023268C-DE1B-47FD-8763-5FAEA9CEA732"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E284E59-E394-45C8-908A-834E242CA52C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02555997-119F-4E13-BCD9-F7E9D9A1B94D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B500AD9-4AF9-45B1-B28A-1D8EDAAB8FFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA177715-6FF4-460C-AC47-C3B4B4F97ABF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72C171A1-9CAA-4EB2-AB9F-302BA98153A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E24C703F-F315-476F-9893-F9508889158F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E9C61FB-AB5A-4A8E-A3C8-F4B619A8F64E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BFAFEF86-2954-4741-A7C3-4D7187A9946F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C86826F3-D681-48A3-B473-84A8290196FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98AEA7AA-8B5E-4B7C-83E5-20F5B40020C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C62B0DBB-423B-4E45-9CDF-CD930618CE41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "29547F23-5F8D-42E2-9A4E-44871AE7EDB3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEEE4854-4164-4E53-9002-BE10DE139EBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBFB974D-CFA2-4B96-BA46-A3B2DC4A498B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "879DFE9B-055A-476C-B57E-661138623D31"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8FBD4792-5DFC-42BD-AE3C-DD1C215F38BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DC917E0-2427-45A6-8137-6169E4842E67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BA0142F-35E3-49D8-9CE3-433AAD441A3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A072E1C-D171-4A59-9CA0-02DB07781EDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7D8EA557-7F30-44B8-AA62-729F22A938DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E5C1EA0-8799-4CBE-9877-F01DDE603A27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C9EB390-34F2-495F-82B3-9DF068729284"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7CB7EC9-ACF1-49D0-AC85-C4ACBCFB66C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B27CC0FD-3265-40E1-8B85-598E117F0115"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BD4BB3A-D076-45DE-8426-14DC59D5DAB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06A8137C-A04F-4500-99F8-702AD5C5AA3F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D78D915B-64D1-47CF-A44D-35D152DC70F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2.4.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33745222-31F5-4D43-9D65-AB57984D8D07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9389AF3-0C08-4704-B0D0-4D4B2704DA5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E171C7DE-7392-43A7-AD21-46F402D912C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B11F819C-E0CF-4BDC-AA51-EE3A6F4BE368"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA8295B1-11C3-42C8-87EF-AE20AA37E0B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85139F12-D65A-4A89-B91D-4E298D6FC092"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BD09DF0-2BED-482B-8EFB-2DB446F68F14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C976052-9834-4E2C-8301-980D541E53B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41CC3DB8-887F-4795-9A06-3C2B628C9733"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8EEBA3D1-773E-4E63-8308-F97C0A752AF5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "977F81F5-7FA5-46C1-B8C3-9D55D89BFC90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB2199CC-C1B3-4C96-9701-FFED12C24CBE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10D32811-792A-47C1-9A9C-CB2F45173794"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDC10A35-8656-4434-84A6-90D70EB57ED2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B05E946-7C29-482F-B2E5-465C35D90BBB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F7705FC-9497-42EF-A05C-BC6166811B5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B562196D-234D-41AD-B348-95A0C1A87DE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14946FEA-E506-4654-A19C-E2B7F7EDD7CE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C8FCF00-56B8-4406-B96E-504B26F179CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12ADAC29-C603-45C9-B4C2-7E203AE14BC2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2F2251E-A4F9-4B71-8892-B925D104957E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "65540F2C-24CA-4ADF-A58A-7975D3A1F6EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9C9A3A6-2D56-4453-9C63-AB516BB46F4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "844DDF73-A61D-4A94-B522-574DF3E8A66D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4057BB4-A921-4CF5-83C2-1AB6245F9989"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC326E1A-7FAE-4EA6-87A9-287DE2AD309E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82411AF6-1223-4AFB-AF6C-F2B98655DDA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2533F68-819F-4EA5-9C7C-E50B4828CA5D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B0235B7F-643D-4DDC-B08D-0BEB1613BF5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "557DF70B-8674-4F1F-9E18-69E1087EB565"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C5583AA-D458-49FC-B450-78CEB7F7FC35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBC0BA56-3358-4342-87F9-4285EE573DEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.3.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73F9EA44-B8D2-4585-8873-1CE96238446F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "685D588C-52B3-4819-90E8-246CF07C535F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA575418-F172-4951-AB5A-4943AA6D5C82"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B43AF7D-B3C2-4BA8-87D9-959388FA89BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68459668-3B69-4A14-AB07-035DDF061928"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B344A26F-2258-403E-B795-CD2844C7B548"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5494BECD-348F-4E2B-9E7C-5F271B8CD2DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB4F46D2-E47D-4279-9810-1E5D90227C19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.5.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "061DFC4D-0C57-441C-9F14-2B53217030BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1CE40CF1-9FFA-489C-9D1E-7478BD5EFA5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AF709DD-FD99-45A9-8EE0-9096226BBA77"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "933991C6-3846-4AF8-9332-7BD71CA6E4DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC4BC2FA-66FF-4AAB-B5A9-C15CB7B59DE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08DD1955-AF47-4340-A2D1-1F7EC0F3D8CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFEF5356-F963-4EA4-AA9A-051AC38FDEED"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/97936",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1038316",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-ipsec",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |