mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
659 lines
28 KiB
JSON
659 lines
28 KiB
JSON
{
|
|
"id": "CVE-2017-6740",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2017-07-17T21:29:00.370",
|
|
"lastModified": "2019-10-09T23:29:00.247",
|
|
"vulnStatus": "Modified",
|
|
"cisaExploitAdd": "2022-03-03",
|
|
"cisaActionDue": "2022-03-24",
|
|
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
|
"cisaVulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66601."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El protocolo SNMP (SimpleNetwork Management Protocol) de Cisco iOS 12.0 hasta la 12.4, 15.0 hasta la 15.6 e iOS XE 2.2 hasta la 3.17 contiene m\u00faltiples vulnerabilidades que pueden permitir una autenticaci\u00f3n a un atacante remoto para ejecutar c\u00f3digo remotamente en el sistema afectado o causar una recarga. Un atacante podr\u00eda explotar estas vulnerabilidades enviando un paquete SNMP manipulado al sistema afectado mediante IPv4 o IPv6. Solo el tr\u00e1fico directo al sistema afectado puede usarse para explotar estar vulnerabilidades. Esta vulnerabilidades son debidas a un buffer overflow en el subsistema SNMP del software afectado. Esta vulnerabilidad afecta a todas las versiones de SNMP: Versiones 1, 2c y 3. Para explotarlas en versiones 2c o anteriores, el atacante debe saber sobre la cadena comunitaria de solo lectura del SNMP del sistema afectado. Pra explotarlas en las versi\u00f3n 3, el atacante tiene que tener credenciales de usuario del sistema. Todos los dispositivos que tienen habilitado el SNMP y no tienen una exclusi\u00f3n explicita del MIB u OID afectado debe ser considerado vulnerable. Cisco Bug IDs: CSCve66601."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ADB275FD-926E-4875-AAA2-88F8DB3B8B98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4DCBC3BD-A704-4770-B2D3-C4F289A78DB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E82CD138-E6FB-427A-9184-6C9650B133F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FCD22C40-94AD-4264-9984-0E266893A44C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3EEC237-DD65-43F0-9DFE-0D32C929153E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBDDDA5C-5727-43CF-A841-1C84267D15CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80BCF196-5E5A-4F31-BCE7-AA0C748CA922"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B72467E-E410-4469-AACE-3E01CF0C4A8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7A4534E-6A1F-4690-9806-BF4528C65615"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE497DA8-240B-44DE-92F4-6CAC88A89B5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2EFCFBFD-E998-4581-B7C1-5A8BFA27DE82"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2346F7C-18D7-4E07-9A78-14A910BBA086"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "542A822E-ADB9-410A-B204-576972534C8D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C18B0A3D-4A12-4327-B6EA-8E73B8FCD245"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "337A0980-A5B4-4605-8572-8283FD1588C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00DEF5CE-8637-42DA-A371-AC9BF74D213F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "970939C5-1E6F-47B6-97E6-7B2C1E019985"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C41AB141-A566-4738-8E07-E6410590FB0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9689234D-7762-4BA4-827E-702407F5BDF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EED3263A-67C0-403C-B022-63360F2F27D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91D029F4-DFAE-41E7-B1A7-2AEBEF71FEFE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2303A74-E862-42DF-B3B0-16DF1CB97306"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7744338-A68E-4F38-8C89-E07DC4BDCFB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCAE1CF1-67D5-4739-AAC8-81868BF851BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32E01A6F-E21C-414E-BCA2-F7490DC78147"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99A3360A-0515-4374-90F7-FC48CE3A82E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DD04F53-794A-49B3-BCD0-889269181D05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)e6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C32D452-DEA1-45DD-BCBD-97CE2447A9D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(23\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CA977A65-0136-4268-8513-BB0D4880E17E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(23\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A43DD0D6-6890-472F-AA0B-75B218FCDC6D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(23\\)e2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35548BE0-8745-416D-A530-BAB85361FC1D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(23\\)e3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A33D633-8D55-4F1A-B5C3-5D8C96DB2C7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(23\\)e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB58F9A6-9298-4C47-A3C3-5C1DBF93E65A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B3692A0-9A71-4E31-9741-0D0ED42DB101"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "038514E5-49BA-4E0D-AEDB-6868117E0B25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E596B7DB-0771-40B6-899C-3839EFC38A24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0563D082-E449-40F0-93EE-437C1780CC75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1F84A59-5A29-4B7E-94AE-F1D90173D5AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59F473A2-A960-4311-9B40-E0DA8041F686"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2F466CB-E4B1-4310-8C01-6CE13C0908FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32D748A3-8A11-4222-9E73-027F46B9BC17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "642D64F0-F728-4761-AD7C-77A33D160AB2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(26\\)e9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3578E17-D5D4-463B-9B55-C34E92ADB61E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(27b\\)e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BE24B83-CC1E-4D31-BB38-6233BDFA08E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(27b\\)e1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B61EFDB-0AE4-4BA0-9937-695C93F55AFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(27b\\)e2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6EFE1FB-98AB-406D-9371-BEC336CA4914"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(27b\\)e3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A32AF5F5-D319-40C5-9AFB-BFFF6B8E305F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(27b\\)e4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E14C12A0-7796-4837-B888-A5507DBB82AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26835676-2738-47CB-A364-78D1964FEC4D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "209A1BE7-EEFC-476E-84E4-4EFD68DD7E81"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "12D449C0-9EEA-483D-8BA9-B2D738B79CAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43B4538E-10D3-4055-9970-5C15F78B4BD7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EA400F06-CFC7-4E1A-AD21-1D89FF3204CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2110B540-18FE-4CAC-8C2C-C17380348293"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)za7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E912B35A-02ED-45FF-9FD8-6BA9B763D4FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17a\\)sx1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3054AE0D-231A-456F-9026-3DC90D87353A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17a\\)sx2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "731F75E5-25A4-448D-86C6-59E9E4088555"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17a\\)sx4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBA0903B-F654-477B-9935-45990D8C37F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6571207-7C97-4DBC-A403-BDD9759907D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5EFE80F-8DDA-402D-95AB-431E406975D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C7A17F5-F4CF-408A-BA0A-4190E135F34A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "621E4249-1238-44F8-ABB4-52929BA3EB3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D72D028-3001-49C2-91DD-CC87EBBF2808"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C07AF5BD-84F0-4ADA-A547-79CC069BF720"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BAC243C-598E-4DA2-ABB7-D26C33DC37E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E30C6E0A-6D9F-43EF-A202-678BAC2C9950"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "95CE4197-A9D6-4DF5-A8F9-8E1520D80D70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B561F1C-B1C9-4043-9FA5-01EEE84A0580"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E2A7C58-5AF1-4486-B81D-A68DC3D738AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E27D814-59EB-4B2D-9905-8E7877B7844C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb11a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BB10E20-C6CE-4592-9782-731DDF413E33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D0E67EE-AF42-4B53-B70A-45562CE164D0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B086B50F-03C8-4C5C-8D4D-37EA33C6D7C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5783901-D472-4DA3-B836-45704F3A6A20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E39ABB80-0A2C-4B9F-BD62-59863BC2E451"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A77C844-EAF8-497E-820F-EF2A87451319"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C7979BB-03BD-495B-8C4A-EF916AC5B546"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0BCFBB45-4784-490A-BDD2-DA2D54C792B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E3AC772-803C-499C-85E7-7176688DCB4C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D10FA021-127C-4556-9BA6-30B0F39F7BCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BEBD5821-1F9B-4A0D-9E16-1F6E3EFC9660"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4378A5D-8480-4223-A4CE-F40884A084E3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D890842-FBBC-4D2F-8403-E8FF383A0289"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A523641-0044-4A2A-9097-D32504F2A019"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C4F06E4-CE51-414B-A39F-93895E1B072D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5852E825-A7DF-4873-82C6-C75DBF28F331"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEA14C4E-8927-4FA9-9937-26D80792F208"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D3BC6BF-1166-4E9A-AF2A-95D6E93A041B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07ED1FA2-E7A1-4712-ACE6-DCDFE74E8B58"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AECCFD2F-77C0-4158-8CB2-1DFF44B3B929"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D9E5F20-592E-41F4-9630-017C37CE5090"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73924E98-811D-47E2-B074-7ACD1DC64728"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F625F5E3-380A-4426-8FE1-22222EBAF11E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf10a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FF8537C-F600-4D31-A938-7C406B798E25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E06A7893-181D-4899-81B0-316697AFB296"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87E35BB9-5A49-4982-96E3-7E37F9A3772F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf12a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C8631D4-A0D7-471E-B457-7E658AB82073"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92DF114A-BD7A-4DDD-A44C-85B0D33860A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34E623AB-FA9A-4E9C-B6AA-D955F658D46A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E21EEDF0-D2B1-4FD4-BA88-6D6C657BAEE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf15a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E1F6069-6917-472A-9CD1-DA516CB95801"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8839276F-2A5C-4F84-BE81-33C3793C1314"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "543A66F5-E73B-41A5-9E1A-C4FC7B21B661"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf17a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17F37FEE-7663-4268-B387-4054C4D60A11"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf17b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0AFF8581-E1BD-4FB2-93AA-0FBAA50AE69D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/99345",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1038808",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |