Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-1649 (GCVE-0-2019-1649)
Vulnerability from cvelistv5 – Published: 2019-05-13 19:10 – Updated: 2024-11-20 17:23| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Routers |
Affected:
unspecified , < 16.12.1
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:20:28.350Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"name": "VU#400865",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"name": "108350",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/108350"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1649",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-20T16:55:08.575056Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-20T17:23:01.830Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Routers",
"vendor": "Cisco",
"versions": [
{
"lessThan": "16.12.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-05-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform."
}
],
"exploits": [
{
"lang": "en",
"value": "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-26T02:22:29.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"name": "VU#400865",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"name": "108350",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/108350"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
}
],
"source": {
"advisory": "cisco-sa-20190513-secureboot",
"defect": [
[
"CSCvn77141",
"CSCvn77142",
"CSCvn77143",
"CSCvn77147",
"CSCvn77150",
"CSCvn77151",
"CSCvn77152",
"CSCvn77153",
"CSCvn77154",
"CSCvn77155",
"CSCvn77156",
"CSCvn77158",
"CSCvn77159",
"CSCvn77160",
"CSCvn77162",
"CSCvn77166",
"CSCvn77167",
"CSCvn77168",
"CSCvn77169",
"CSCvn77170",
"CSCvn77171",
"CSCvn77172",
"CSCvn77175",
"CSCvn77178",
"CSCvn77180",
"CSCvn77181",
"CSCvn77182",
"CSCvn77183",
"CSCvn77184",
"CSCvn77185",
"CSCvn77191",
"CSCvn77201",
"CSCvn77202",
"CSCvn77205",
"CSCvn77207",
"CSCvn77209",
"CSCvn77212",
"CSCvn77219",
"CSCvn77220",
"CSCvn77222",
"CSCvn77245",
"CSCvn77246",
"CSCvn77248",
"CSCvn77249",
"CSCvn89137",
"CSCvn89138",
"CSCvn89140",
"CSCvn89143",
"CSCvn89144",
"CSCvn89145",
"CSCvn89146",
"CSCvn89150",
"CSCvp42792"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Secure Boot Hardware Tampering Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-05-13T17:30:00-0700",
"ID": "CVE-2019-1649",
"STATE": "PUBLIC",
"TITLE": "Cisco Secure Boot Hardware Tampering Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Routers",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_value": "16.12.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform."
}
]
},
"exploit": [
{
"lang": "en",
"value": "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019."
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"name": "VU#400865",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"name": "108350",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108350"
},
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
}
]
},
"source": {
"advisory": "cisco-sa-20190513-secureboot",
"defect": [
[
"CSCvn77141",
"CSCvn77142",
"CSCvn77143",
"CSCvn77147",
"CSCvn77150",
"CSCvn77151",
"CSCvn77152",
"CSCvn77153",
"CSCvn77154",
"CSCvn77155",
"CSCvn77156",
"CSCvn77158",
"CSCvn77159",
"CSCvn77160",
"CSCvn77162",
"CSCvn77166",
"CSCvn77167",
"CSCvn77168",
"CSCvn77169",
"CSCvn77170",
"CSCvn77171",
"CSCvn77172",
"CSCvn77175",
"CSCvn77178",
"CSCvn77180",
"CSCvn77181",
"CSCvn77182",
"CSCvn77183",
"CSCvn77184",
"CSCvn77185",
"CSCvn77191",
"CSCvn77201",
"CSCvn77202",
"CSCvn77205",
"CSCvn77207",
"CSCvn77209",
"CSCvn77212",
"CSCvn77219",
"CSCvn77220",
"CSCvn77222",
"CSCvn77245",
"CSCvn77246",
"CSCvn77248",
"CSCvn77249",
"CSCvn89137",
"CSCvn89138",
"CSCvn89140",
"CSCvn89143",
"CSCvn89144",
"CSCvn89145",
"CSCvn89146",
"CSCvn89150",
"CSCvp42792"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1649",
"datePublished": "2019-05-13T19:10:14.147Z",
"dateReserved": "2018-12-06T00:00:00.000Z",
"dateUpdated": "2024-11-20T17:23:01.830Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-1649",
"date": "2026-04-21",
"epss": "0.00383",
"percentile": "0.59631"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-1649\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2019-05-13T19:29:01.520\",\"lastModified\":\"2024-11-21T04:37:00.627\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la l\u00f3gica que maneja el control de acceso de uno de los componentes de hardware en la implementaci\u00f3n Secure Boot de propiedad de Cisco, podr\u00eda permitir que un atacante local autenticado escriba una imagen de firmware modificada en el componente. Esta vulnerabilidad afecta a varios productos de Cisco que admiten la funcionalidad de Secure Boot basada en hardware. La vulnerabilidad se genera por una comprobaci\u00f3n incorrecta en el \u00e1rea de c\u00f3digo que administra las actualizaciones en las instalaciones de Field Programmable Gate Array (FPGA) parte de la implementaci\u00f3n del hardware Secure Boot. Un atacante con privilegios elevados y acceso al sistema operativo subyacente que se ejecuta en el dispositivo afectado podr\u00eda explotar esta vulnerabilidad al escribir una imagen de firmware modificada en el FPGA. Una explotaci\u00f3n exitosa podr\u00eda hacer que el dispositivo se vuelva inutilizable (y requiera un reemplazo de hardware) o permitir la manipulaci\u00f3n del proceso de comprobaci\u00f3n de Secure Boot, que en algunas circunstancias puede permitir al atacante instalar y arrancar una imagen de software malicioso. Un atacante deber\u00e1 cumplir todas las condiciones siguientes para intentar explotar esta vulnerabilidad: Tener acceso administrativo privilegiado al dispositivo. Poder acceder al sistema operativo subyacente que se ejecuta en el dispositivo; Esto se puede lograr mediante el uso de un mecanismo documentado de soporte o mediante la explotaci\u00f3n de otra vulnerabilidad que proporcionar\u00eda a un atacante con dicho acceso. Desarrollar o tener acceso a un exploit espec\u00edfico de la plataforma. Un atacante que busque explotar esta vulnerabilidad en m\u00faltiples plataformas afectadas necesitar\u00e1 investigar cada una de esas plataformas y despu\u00e9s desarrollar una vulnerabilidad espec\u00edfica de la plataforma. Si bien el proceso de investigaci\u00f3n se podr\u00eda realizar en diferentes plataformas, es poco probable que una vulnerabilidad desarrollada para una plataforma de hardware determinada opere en una plataforma de hardware diferente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.15\",\"matchCriteriaId\":\"524E28A1-ABD9-416B-804C-EFFD7F822DE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"763B801D-CA1E-4C56-8B06-3373EA307C7E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30AC6907-3091-409F-967D-64A82A0C5A8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92AE506A-E710-465B-B795-470FDE0E0ECA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.1.134\",\"matchCriteriaId\":\"32B7016C-C909-4F30-A80E-E30E9C2FB607\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D96810-5F79-4A83-B8CA-D015790FCF72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FE2945-4975-4003-AE48-7E134E167A7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976901BF-C52C-4F81-956A-711AF8A60140\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.18\",\"matchCriteriaId\":\"0B8DB36E-D0AC-4FFC-8FDB-C5520689013A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0CBC7F5-7767-43B6-9384-BE143FCDBD7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38AE6DC0-2B03-4D36-9856-42530312CC46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB2822B-B752-4CD9-A178-934957E306B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65378F3A-777C-4AE2-87FB-1E7402F9EA1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.18\",\"matchCriteriaId\":\"E924AE61-94D5-4A68-A586-CA7119487F67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07DAFDDA-718B-4B69-A524-B0CEB80FE960\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"4F8A7F11-B920-4C5B-B3CA-D29740FFE891\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEBE1DDE-6C69-45EC-A666-D9596E8721DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*\",\"matchCriteriaId\":\"00BCB49E-E2D2-4374-8D48-A287FC538F4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2bri-nt\\\\/te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637D7CA3-89CD-418A-BF87-0935A7805173\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CBE2B16-B9AD-4ED2-AE18-7087C478FEEC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D94B415B-08E2-4845-BD11-7EBCD08215E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2fxs\\\\/4fxo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"784ECC2E-F4AC-4430-9F33-9B1DBD89692F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2fxs\\\\/4fxop:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A34FAE4-7B2A-47BF-AB0A-5FAF8E8920CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FADBF85-52F4-468C-A44C-5107484757EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-4bri-nt\\\\/te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E418C4-F91B-4E0D-B1DC-2B099D991F80\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-4e\\\\/m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E22A4B07-04DF-4AF2-B2A9-E4430C4F3A64\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFDCD640-E1BB-48F8-BEB4-85AAF7099FA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"893147FC-1AD0-441C-B031-6C432ED2FFD8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE30FCF9-DFF6-419C-8DCA-0B695E3FADE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:integrated_services_router_t1\\\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*\",\"matchCriteriaId\":\"239EC4DE-5E2C-44D7-9C32-BFCD854670AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2956624-92FC-43D7-A038-15071A90E0B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-1mft-t1\\\\/e1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988125C4-DB88-438F-8F6D-0992424081A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD9B34B9-78EC-49AE-B342-F2BAD63CD50C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2mft-t1\\\\/e1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D258F96-93A5-455E-9542-2C95B3D31455\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-4mft-t1\\\\/e1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B443FC34-767F-45B4-8516-A1A8B6C8D917\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C3403A-3943-4A69-A536-3FA6DEDFF21B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-8mft-t1\\\\/e1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7259F6BC-BA31-47E4-BFA6-647068A946CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:supervisor_a\\\\+_firmware:*:*:*:*:*:*:nexus_9500:*\",\"matchCriteriaId\":\"3F825D9C-25C6-4F76-A7EE-F61A548A0CE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-sup-a\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360B9A25-5272-487A-AF1A-CE2FDFD6F23C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:supervisor_b\\\\+_firmware:*:*:*:*:*:*:nexus_9500:*\",\"matchCriteriaId\":\"77C59A0F-F256-42C3-A3E1-71F02614F55A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-sup-b\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADE8708-95D4-4D30-85ED-BE870410F3B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"7F99FC1A-2738-468B-BD01-4F715A1B7809\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90242967-37AB-4124-87DE-D826A3895BE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.12.1\",\"matchCriteriaId\":\"EB99D062-EE0C-4695-AA4D-2DCE3E2B15AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CCBE67-E509-43EC-9AFB-8A9B6A115126\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.3.9\",\"matchCriteriaId\":\"39C9F8C2-9E34-4027-9112-42AEC0B84F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.4.0\",\"versionEndExcluding\":\"16.6.7\",\"matchCriteriaId\":\"76843179-3569-4556-9F4C-6543B8A8E1DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.7.0\",\"versionEndExcluding\":\"16.9.4\",\"matchCriteriaId\":\"1B526102-9DDC-4E23-B582-DEF7EA35E42C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.10.0\",\"versionEndExcluding\":\"16.12.1\",\"matchCriteriaId\":\"F50DDAE4-2C87-4B8B-9BCB-2FD32A6976D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56A1D02-3061-40C5-AD87-0BEA869838F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F98C767-8E9F-4B01-A09E-359A496B2B3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCAA286-6B36-4EB7-9AE5-CA082D125E78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B1C2CF-0EF1-428F-8FB8-D45E4C6CB340\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450EA21E-68E0-4617-85A9-9C39B96E12ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B65497-2EAC-4B9E-9D05-58A0B6D1F399\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\\\\(3\\\\)m7\",\"matchCriteriaId\":\"35726753-BAA4-479F-AF9C-F4D012881F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.7\",\"versionEndIncluding\":\"15.7\\\\(3\\\\)m5\",\"matchCriteriaId\":\"7A3FBAE1-F786-4799-AF70-6E7B5DC19BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.8\",\"versionEndExcluding\":\"15.8\\\\(3\\\\)m3\",\"matchCriteriaId\":\"72240B45-0D8E-4EA6-8208-068BF6EF8B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.9\",\"versionEndExcluding\":\"15.9\\\\(3\\\\)m\",\"matchCriteriaId\":\"B7F56D01-F647-452D-A564-4198A893BC70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6835F8AD-B55D-4B57-B3B5-0095E309B2B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.05\",\"matchCriteriaId\":\"83AA5C75-B959-4167-906C-BE9C84C7E676\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FBBA8E7-14B2-4869-8ED4-72F120E547FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1\",\"matchCriteriaId\":\"CB084F19-E475-41FA-A72F-23D4D6913523\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8AED7C-DDA3-4C29-BB95-6518C02C551A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1\",\"matchCriteriaId\":\"C49E8AE0-745B-459C-AAD9-D41690D48DDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9421DBEF-AE42-4234-B49F-FCC34B804D7F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5419CB9F-241F-4431-914F-2659BE27BEA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1\",\"matchCriteriaId\":\"BC5D8FF8-60F8-4F89-A488-F815D0FB00E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5720462A-BE6B-4E84-A1A1-01E80BBA86AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697BEF89-6D9B-4870-BE85-9090152F3E6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"818CEFA6-208C-43C3-8E43-474A93ADCF21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\\\\(3\\\\)m6b\",\"matchCriteriaId\":\"13C3D17D-DD95-49CA-918A-A0F5289B0C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.7\",\"versionEndIncluding\":\"15.7\\\\(3\\\\)m4b\",\"matchCriteriaId\":\"DA254534-247F-47BA-B146-0E3B7E9F9269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.8\",\"versionEndExcluding\":\"15.8\\\\(3\\\\)m2a\",\"matchCriteriaId\":\"E0F05F3A-A38F-4922-AE54-BE1BC64C4B7C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C996F3B-0333-4B9A-B3E7-F50E64B0AAB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D05CC9-8D04-4DE0-A854-375192B4D46C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C3BBBB-4349-4D2B-9944-84BE03407650\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5C1005-0C12-4EDA-BC4A-B52201C4F516\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76B7C13F-46C5-460A-A6C9-3837A28A0CE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1000-2t\\\\+20x1ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB060D83-2924-4D1D-9FEE-F8087FA8976D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF4D0E5-FF09-4919-B603-B42DB535386C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22C36989-4353-4B81-8B0F-FC6322C1C179\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A267A86B-144D-46C3-9F63-95606106A5B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7594E307-AC80-41EC-AE94-07E664A7D701\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C913FF-63D5-43FB-8B39-598EF436BA5A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD2794BD-C8CE-46EF-9857-1723FCF04E46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.2.1\",\"matchCriteriaId\":\"C807F789-3038-42C3-B5EB-6CD628EBF718\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED2353D-A508-4764-975F-57F9DACD91FA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBA765C-B6F0-4D4D-8933-06E655084AF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6F34E1-7DE4-459B-AF41-D973201ADC49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a900-rsp3c-400\\\\/w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DAC3AF-FEFC-4B14-A7BE-7008E65FD012\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B83BED-5A49-4CF0-9827-AA291D01F60E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C1E8937-51D9-43E6-876E-5D39AD3D32C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA7AE63-99B9-4F28-8670-639A9B31E494\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E858B4AB-49B1-4F1C-8722-6E6911194924\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577D1BF2-5180-4301-941C-3C0ADDD23AA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE70CCD-6062-45D8-8566-7C9E237E030F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA3A897-ED4E-417F-BA6C-C1A825A210F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"375F9E12-A61B-4FD3-AE07-D4E686EB112A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D724F932-4548-429D-8CAA-E82C3435A194\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16088337-C057-4271-B5C7-74FE1573B0F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69B8AFD-17F5-4809-BDB9-3337BA52BC58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A628A7B-FE58-4881-B705-C3BCBED6F201\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9C769E-ED9C-4F06-928D-CC7FFBA54EC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B19A31-99E3-4141-9FE8-7A5FD16FAE5C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB1DFCD7-F14A-4530-8E36-55FE0EE1E7C7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C89BB9-D62D-4E36-8BFD-D583F383120D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88262B7E-8C2F-49FE-9F58-8A1C78285A93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6109DBC-5489-4FF9-B940-E174126488AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA59279-3504-417D-9E86-E5886EE198BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C44B33A5-DB73-4A3B-AA5B-97B8493AD28B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB82552-DD9D-45C9-8296-B4C8D510FFA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82AF763B-9299-4EDC-B42D-B83736839CA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EA89F6-14B5-4EC7-BAEB-E783FF1982AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5BF29D2-7C65-4724-B6AE-249BB22725CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55DC09B-CF82-4461-8886-BE90451BFF9E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F393681D-7EC1-46D5-BAFB-786528E259B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE8CE5B-09CF-4138-9495-7223FFA64443\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15AEC57E-7851-4C8D-AB02-A932C3929F26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14DB778-9B07-4AFF-8BF3-4631B23501BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326F9936-57E7-4E8F-9C51-093788454A3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D54F012-3136-4CA8-B119-FD7446EC96C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.5\\\\(1\\\\)sy4\",\"matchCriteriaId\":\"0514874D-C8F0-496E-9B04-FA699B339EEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F508C81E-D31B-44BA-82C8-FEDA00324B8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05A9E0CA-BB70-4F74-BAD6-BE80669D1699\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CAE1989-0E75-414E-BCB3-E0057F1492E7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A1BA05-615E-4304-992D-6EEA176D852F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D883A807-6909-4087-892B-1E505521EA7A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2D76C8-552A-44C2-9C30-0CF31F6BC719\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"649A1287-A03D-48B8-ADFA-26F175366C91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8776111D-894D-4EEB-8ADD-A9AC26AE30D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"975D2EC3-3499-48FD-87F2-4BAD1CDB0E4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.9.4\",\"matchCriteriaId\":\"27ACCA11-D39B-468E-9C3C-BBF110ED3581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.10\",\"versionEndExcluding\":\"16.12.1\",\"matchCriteriaId\":\"5BB36C23-9303-4E3D-8C4A-B2E2150CF3FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B37D793-0EE3-49CA-98B2-3E1F3D561A9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F5F6FA-9499-4232-A80A-494CE287A87A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58918BAA-7070-4901-B1C8-344E8A4DBEE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C809A939-105E-471E-A150-859015641989\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C657B7-172E-4E85-8027-4B5563F2CE14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B42926F-0841-4D40-BABE-852893C6020F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381144D6-7CDE-46E6-ADE7-76372740F283\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"902D1451-9E2E-4BC3-8B61-D87C142F4485\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E283C34-43AE-49A5-A72B-32DEA185ABD3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59CD23DF-9B9D-459F-A3BF-F2D53FBDAF71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB3AF13-5324-42CD-8EDB-6F730BF46214\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2\",\"matchCriteriaId\":\"13174CD9-8564-4041-93EC-8E8D7F4F3443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B443B2C3-E3C1-4ADF-BF9B-164D00318B08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.4.1\",\"matchCriteriaId\":\"0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE54217-EF6D-4191-9267-113041B14A08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"6DE58C19-66CD-45DD-BF5C-C333A30AA096\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFF3999-1FF6-42C0-BE62-3FA227297264\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966F7DF8-1F20-4A74-B633-8B5AEE63C193\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46EA0E17-C399-4DA0-A550-F5469CC82F3F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C4BF85-7077-463B-8E52-F67949849123\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9102353-A21A-41C2-AA0B-9B00F66B693E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1536A363-E423-42DD-928B-FC6E91264371\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB4F5CA4-BBD2-4DC9-8F99-9CC1B2A90BF2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2442B13-F163-4219-AED9-7FA4CCD1A8D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7617BA24-6474-49CF-B78D-0056D3F8385B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344675F6-9045-492D-9577-E0CE333AD6E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7F2221-B5BE-408C-BA84-9776469EE2D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8D61548-61B4-4B53-8574-9DB92B00A627\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF08FAF-67DD-4361-947A-40D5938DB8BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE2AD36-5D52-4489-AAC1-A7AC1B3D2581\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95FEA95-703B-44E0-A7CA-9E38B2EB1980\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D37BF94-9D5F-4A88-8115-3A88FF144845\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33F0D81-1314-440B-9FC2-56D76CA4CD79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E50806D-115D-4903-A5B2-62654FFDD9F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15AE071E-0CEF-4305-A92D-9F4C324BD4ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E007368-04AF-49C7-892F-ED2BB1E4EA61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBEF775-EC98-4391-BAD2-61870A7DEE88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.3\\\\(2\\\\)\",\"matchCriteriaId\":\"68A586A3-0291-4BA3-9211-6EE0BBB7F39C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AEB8547-3FA8-42F5-8106-57B0F994BEC5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D2069C-23A2-4113-B674-024D36E40BDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572F9105-9B6C-4460-8B49-14812AC3DC28\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE8EFEE8-FC8D-480C-917E-24C3B8D56E29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6487A95B-0D04-4ABA-B491-8A935694AFD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2E84307-41BC-4F85-BC9A-FF02178765F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A31452-5B60-4273-BA38-8FA684DED953\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3FCA39-927B-4C89-A58B-E6859ED8176A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7B464B3-DE25-4980-ABC3-10D7C79C12E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214472EB-424C-48B7-8EF3-7B679A5042BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.4.1\",\"matchCriteriaId\":\"0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E3CF0C-5AD0-4A30-9335-4945CBC04A60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6AC35C-29B2-42C7-862D-D9AC3461D8D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F33AB95C-62FC-48EC-84AB-5EFA5C061F3B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D409BDF3-9F35-4D94-9DF0-7B58A519A005\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:sm-x-1t3\\\\/e3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98B12A01-8EF8-4DDE-9A40-51A9BC7D42AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sm-x-1t3\\\\/e3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"696AFE49-10E1-4C56-93D3-F4118B3E01AB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6741CC-EEA4-4DC8-A21B-DB84B861316B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678F3A32-372A-441E-8115-95181FBAF628\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF426F3E-4474-43C7-84F5-EF61957E5004\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01AE8153-6C23-46AB-BEAA-A6F27FDFEED7\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/108350\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/400865\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-072-03\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/108350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/400865\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-072-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot\", \"name\": \"20190513 Cisco Secure Boot Hardware Tampering Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/400865\", \"name\": \"VU#400865\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/108350\", \"name\": \"108350\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-20-072-03\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:20:28.350Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-1649\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-20T16:55:08.575056Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-20T16:55:59.877Z\"}}], \"cna\": {\"title\": \"Cisco Secure Boot Hardware Tampering Vulnerability\", \"source\": {\"defect\": [[\"CSCvn77141\", \"CSCvn77142\", \"CSCvn77143\", \"CSCvn77147\", \"CSCvn77150\", \"CSCvn77151\", \"CSCvn77152\", \"CSCvn77153\", \"CSCvn77154\", \"CSCvn77155\", \"CSCvn77156\", \"CSCvn77158\", \"CSCvn77159\", \"CSCvn77160\", \"CSCvn77162\", \"CSCvn77166\", \"CSCvn77167\", \"CSCvn77168\", \"CSCvn77169\", \"CSCvn77170\", \"CSCvn77171\", \"CSCvn77172\", \"CSCvn77175\", \"CSCvn77178\", \"CSCvn77180\", \"CSCvn77181\", \"CSCvn77182\", \"CSCvn77183\", \"CSCvn77184\", \"CSCvn77185\", \"CSCvn77191\", \"CSCvn77201\", \"CSCvn77202\", \"CSCvn77205\", \"CSCvn77207\", \"CSCvn77209\", \"CSCvn77212\", \"CSCvn77219\", \"CSCvn77220\", \"CSCvn77222\", \"CSCvn77245\", \"CSCvn77246\", \"CSCvn77248\", \"CSCvn77249\", \"CSCvn89137\", \"CSCvn89138\", \"CSCvn89140\", \"CSCvn89143\", \"CSCvn89144\", \"CSCvn89145\", \"CSCvn89146\", \"CSCvn89150\", \"CSCvp42792\"]], \"advisory\": \"cisco-sa-20190513-secureboot\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Routers\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16.12.1\", \"versionType\": \"custom\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.\"}], \"datePublic\": \"2019-05-13T00:00:00.000Z\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot\", \"name\": \"20190513 Cisco Secure Boot Hardware Tampering Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/400865\", \"name\": \"VU#400865\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"]}, {\"url\": \"http://www.securityfocus.com/bid/108350\", \"name\": \"108350\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-20-072-03\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-03-26T02:22:29.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"6.7\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}}, \"source\": {\"defect\": [[\"CSCvn77141\", \"CSCvn77142\", \"CSCvn77143\", \"CSCvn77147\", \"CSCvn77150\", \"CSCvn77151\", \"CSCvn77152\", \"CSCvn77153\", \"CSCvn77154\", \"CSCvn77155\", \"CSCvn77156\", \"CSCvn77158\", \"CSCvn77159\", \"CSCvn77160\", \"CSCvn77162\", \"CSCvn77166\", \"CSCvn77167\", \"CSCvn77168\", \"CSCvn77169\", \"CSCvn77170\", \"CSCvn77171\", \"CSCvn77172\", \"CSCvn77175\", \"CSCvn77178\", \"CSCvn77180\", \"CSCvn77181\", \"CSCvn77182\", \"CSCvn77183\", \"CSCvn77184\", \"CSCvn77185\", \"CSCvn77191\", \"CSCvn77201\", \"CSCvn77202\", \"CSCvn77205\", \"CSCvn77207\", \"CSCvn77209\", \"CSCvn77212\", \"CSCvn77219\", \"CSCvn77220\", \"CSCvn77222\", \"CSCvn77245\", \"CSCvn77246\", \"CSCvn77248\", \"CSCvn77249\", \"CSCvn89137\", \"CSCvn89138\", \"CSCvn89140\", \"CSCvn89143\", \"CSCvn89144\", \"CSCvn89145\", \"CSCvn89146\", \"CSCvn89150\", \"CSCvp42792\"]], \"advisory\": \"cisco-sa-20190513-secureboot\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"affected\": \"\u003c\", \"version_value\": \"16.12.1\", \"version_affected\": \"\u003c\"}]}, \"product_name\": \"Cisco Routers\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot\", \"name\": \"20190513 Cisco Secure Boot Hardware Tampering Vulnerability\", \"refsource\": \"CISCO\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/400865\", \"name\": \"VU#400865\", \"refsource\": \"CERT-VN\"}, {\"url\": \"http://www.securityfocus.com/bid/108350\", \"name\": \"108350\", \"refsource\": \"BID\"}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-20-072-03\", \"name\": \"https://www.us-cert.gov/ics/advisories/icsa-20-072-03\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-284\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-1649\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Secure Boot Hardware Tampering Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2019-05-13T17:30:00-0700\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2019-1649\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-20T17:23:01.830Z\", \"dateReserved\": \"2018-12-06T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2019-05-13T19:10:14.147Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2019-AVI-205
Vulnerability from certfr_avis - Published: 2019-05-14 - Updated: 2019-05-14
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Se référer au bulletin de sécurité de l'éditeur pour vérifier les équipements de sécurité, de routage et de commutation dont le microgiciel est affecté par la vulnérabilité CVE-2019-1649. Celle-ci permet à un attaquant authentifié, ayant un accès local, de modifier ce microgiciel (cf. section Documentation). | ||
| Cisco | IOS XE | Cisco IOS XE avec le serveur HTTP activé. Se référer au bulletin de sécurité de l'éditeur pour vérifier les versions vulnérables (cf. section Documentation). |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour v\u00e9rifier les \u00e9quipements de s\u00e9curit\u00e9, de routage et de commutation dont le microgiciel est affect\u00e9 par la vuln\u00e9rabilit\u00e9 CVE-2019-1649. Celle-ci permet \u00e0 un attaquant authentifi\u00e9, ayant un acc\u00e8s local, de modifier ce microgiciel (cf. section Documentation).",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE avec le serveur HTTP activ\u00e9. Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour v\u00e9rifier les versions vuln\u00e9rables (cf. section Documentation).",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1649",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1649"
},
{
"name": "CVE-2019-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1862"
}
],
"initial_release_date": "2019-05-14T00:00:00",
"last_revision_date": "2019-05-14T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-205",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190513-secureboot du 13 mai 2019",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190513-webui du 13 mai 2019",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-webui"
}
]
}
BDU:2019-02224
Vulnerability from fstec - Published: 13.05.2019{
"CVSS 2.0": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 7.0.1 (Cisco IOS XR), \u0434\u043e 7.1.1 (Cisco IOS XR), \u0434\u043e 9.3(2) (NX-OS), \u0434\u043e 8.4.1 (NX-OS), - (NIM-1CE1T1-PRI), - (NIM-1MFT-T1/E1), - (NIM-2BRI-NT/TE), - (NIM-2CE1T1-PRI), - (NIM-2FXO), - (NIM-2FXS), - (NIM-2FXS/4FXO), - (NIM-2FXS/4FXOP), - (NIM-2FXSP), - (NIM-2MFT-T1/E1), - (NIM-4BRI-NT/TE), - (NIM-4E/M), - (NIM-4FXO), - (NIM-4FXS), - (NIM-4FXSP), - (NIM-4MFT-T1/E1), - (NIM-8CE1T1-PRI), - (NIM-8MFT-T1/E1), \u0434\u043e 1.1.15 (ASA 5506H-X), \u0434\u043e 1.1.15 (ASA 5506W-X), \u0434\u043e 1.1.15 (ASA 5506-X), \u0434\u043e 1.1.15 (ASA 5508-X), \u0434\u043e 1.1.15 (ASA 5516-X), \u0434\u043e 1.0.18 (Firepower 4000), \u0434\u043e 2.6.1.134 (Firepower 2100), \u0434\u043e 1.0.18 (Firepower 9000), \u0434\u043e 11.1 (15454-M-WSE-K9), \u0434\u043e 11.1 (NCS2K-MR-MXP-LIC), \u0434\u043e 16.12.1 (Cisco IOS XE), \u0434\u043e 15.5(1)SY4 (Cisco IOS XE), \u0434\u043e 16.3.9 (Cisco IOS XE), \u0434\u043e 16.6.7 (Cisco IOS XE), \u0434\u043e 16.9.4 (Cisco IOS XE), \u0434\u043e 16.2.1 (Cisco IOS XE), \u0434\u043e 15.9(3)M (Cisco IOS), \u0434\u043e 15.8(3)M3 (Cisco IOS), \u0434\u043e 15.7(3)M5 (Cisco IOS), \u0434\u043e 15.6(3)M7 (Cisco IOS), \u0434\u043e 15.6(3)m6b (Cisco IOS), \u0434\u043e 15.7(3)m4b (Cisco IOS), \u0434\u043e 15.8(3)m2a (Cisco IOS), \u0434\u043e 1.0.05 (Cisco 3000), \u0434\u043e 1.1 (Cisco 4221), \u0434\u043e 1.1 (Cisco 4321), \u0434\u043e 1.1 (Cisco 4331), \u0434\u043e 1.1 (Cisco 4351), \u0434\u043e 1.1 (Cisco 4431), \u0434\u043e 1.1 (Cisco 4451-X), \u0434\u043e 1.1 (Cisco 4461), - (Cisco 5000), - (ASR 1001-HX), - (ASR 1002-HX), - (ASR1000-2T+20X1GE), - (ASR1000-6TGE), - (ASR1000-ESP100), - (ASR1000-ESP200), - (ASR1000-MIP100), - (ASR1000-RP3), - (ASR 1001-X), - (Catalyst 9300), - (C9500-12Q), - (C9500-16X), - (C9500-24Q), - (C9500-24Y4C), - (C9500-32C), - (C9500-32QC), - (C9500-40X), - (C9500-48Y4C), - (Catalyst 9800-40), - (Catalyst 9800-80), \u0434\u043e 1.0.2 (Cisco IC3000), \u0434\u043e 11.1 (NCS2K-MR-MXP-K9)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.05.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.06.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-02224",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-1649",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS XR, NX-OS, NIM-1CE1T1-PRI, NIM-1MFT-T1/E1, NIM-2BRI-NT/TE, NIM-2CE1T1-PRI, NIM-2FXO, NIM-2FXS, NIM-2FXS/4FXO, NIM-2FXS/4FXOP, NIM-2FXSP, NIM-2MFT-T1/E1, NIM-4BRI-NT/TE, NIM-4E/M, NIM-4FXO, NIM-4FXS, NIM-4FXSP, NIM-4MFT-T1/E1, NIM-8CE1T1-PRI, NIM-8MFT-T1/E1, ASA 5506H-X, ASA 5506W-X, ASA 5506-X, ASA 5508-X, ASA 5516-X, Firepower 4000, Firepower 2100, Firepower 9000, 15454-M-WSE-K9, NCS2K-MR-MXP-LIC, Cisco IOS XE, Cisco IOS, Cisco 3000, Cisco 4221, Cisco 4321, Cisco 4331, Cisco 4351, Cisco 4431, Cisco 4451-X, Cisco 4461, Cisco 5000, ASR 1001-HX, ASR 1002-HX, ASR1000-2T+20X1GE, ASR1000-6TGE, ASR1000-ESP100, ASR1000-ESP200, ASR1000-MIP100, ASR1000-RP3, ASR 1001-X, Catalyst 9300, C9500-12Q, C9500-16X, C9500-24Q, C9500-24Y4C, C9500-32C, C9500-32QC, C9500-40X, C9500-48Y4C, Catalyst 9800-40, Catalyst 9800-80, Cisco IC3000, NCS2K-MR-MXP-K9",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. - - ASR 903 - 400G, Cisco Systems Inc. - - ASR 907 - 400G, Cisco Systems Inc. - - ASR-920-10SZ-PD, Cisco Systems Inc. - - ASR-920-12CZ-A, Cisco Systems Inc. - - ASR-920-12CZ-D, Cisco Systems Inc. - - ASR-920-12SZ-A, Cisco Systems Inc. - - ASR-920-12SZ-D, Cisco Systems Inc. - - ASR-920-12SZ-IM, Cisco Systems Inc. - - ASR-920-12SZ-IM-CC, Cisco Systems Inc. - - ASR-920-20SZ-M, Cisco Systems Inc. - - ASR-920-24SZ-IM, Cisco Systems Inc. - - ASR-920-24SZ-M, Cisco Systems Inc. - - ASR-920-24TZ-M, Cisco Systems Inc. - - ASR-920-4SZ-A, Cisco Systems Inc. - - ASR-920-4SZ-D, Cisco Systems Inc. - - CBR-8, Cisco Systems Inc. - - CBR-CCAP-LC-40G-R, Cisco Systems Inc. - - NIM-1GE-CU-SFP, Cisco Systems Inc. - - NIM-2GE-CU-SFP, Cisco Systems Inc. - - SM-X-PVDM-1000, Cisco Systems Inc. - - SM-X-PVDM-2000, Cisco Systems Inc. - - SM-X-PVDM-3000, Cisco Systems Inc. - - SM-X-PVDM-500, Cisco Systems Inc. - - A900-RSP2A-128, Cisco Systems Inc. - - A900-RSP2A-64, Cisco Systems Inc. - - A900-RSP3C-200, Cisco Systems Inc. - - C6800-16P10G-XL, Cisco Systems Inc. - - C6800-32P10G-XL, Cisco Systems Inc. - - C6800-8P10G-XL, Cisco Systems Inc. - - C6800-8P40G-XL, Cisco Systems Inc. - - C6800-SUP6T, Cisco Systems Inc. - - C6800-SUP6T-XL, Cisco Systems Inc. - - C6816-X-LE, Cisco Systems Inc. - - C6824-X-LE-40G, Cisco Systems Inc. - - C6832-X-LE, Cisco Systems Inc. - - C6840-X-LE-40G, Cisco Systems Inc. - - Cisco Catalyst 9600, Cisco Systems Inc. - - Cisco 1120, Cisco Systems Inc. - - Cisco 1240, Cisco Systems Inc. - - Cisco 809, Cisco Systems Inc. - - Cisco 829, Cisco Systems Inc. - - A99-16X100GE-X-SE, Cisco Systems Inc. - - A99-32X100GE-CM, Cisco Systems Inc. - - A99-32X100GE-TR, Cisco Systems Inc. - - A99-RP3-SE, Cisco Systems Inc. - - A99-RP3-TR, Cisco Systems Inc. - - NC55-24H12F-SE, Cisco Systems Inc. - - NC55-36X100G-A-SE, Cisco Systems Inc. - - NC55-36X100G-S, Cisco Systems Inc. - - NC55-5504-FC, Cisco Systems Inc. - - NC55-5516-FC, Cisco Systems Inc. - - NC55-6X200-DWDM-S, Cisco Systems Inc. - - NC55A2-MOD-SE-H-S, Cisco Systems Inc. - - NC55-MOD-A-S, Cisco Systems Inc. - - NCS-5501, Cisco Systems Inc. - - NCS-5501-SE, Cisco Systems Inc. - - NCS-5502, Cisco Systems Inc. - - NCS-5502-SE, Cisco Systems Inc. - - NCS-55A1-24H, Cisco Systems Inc. - - NCS-55A1-36H-S, Cisco Systems Inc. - - NCS-55A1-36H-SE-S, Cisco Systems Inc. - - NCS-55A2-MOD-HD-S, Cisco Systems Inc. - - NCS-55A2-MOD-HX-S, Cisco Systems Inc. - - NCS-55A2-MOD-S, Cisco Systems Inc. - - NCS-55A2-MOD-SE-S, Cisco Systems Inc. - - Network Convergence System 1001, Cisco Systems Inc. - - Network Convergence System 1002, Cisco Systems Inc. - - Network Convergence System 5001, Cisco Systems Inc. - - Network Convergence System 5002, Cisco Systems Inc. - - N540-24Z8Q2C-M, Cisco Systems Inc. - - N540-24Z8Q2C-SYS, Cisco Systems Inc. - - N540-ACC-SYS, Cisco Systems Inc. - - N540X-ACC-SYS, Cisco Systems Inc. - - N3K-C31108PC-V, Cisco Systems Inc. - - N3K-C31108TC-V, Cisco Systems Inc. - - N3K-C3132C-Z, Cisco Systems Inc. - - N3K-C3264C-E, Cisco Systems Inc. - - N9K-C92160YC-X, Cisco Systems Inc. - - N9K-C92300YC, Cisco Systems Inc. - - N9K-C92304QC, Cisco Systems Inc. - - N9K-C9232C, Cisco Systems Inc. - - N9K-C9236C, Cisco Systems Inc. - - N9K-C9272Q, Cisco Systems Inc. - - N9K-C93108TC-EX, Cisco Systems Inc. - - N9K-C93108TC-FX, Cisco Systems Inc. - - N9K-C93180LC-EX, Cisco Systems Inc. - - N9K-C93180YC-EX, Cisco Systems Inc. - - N9K-C93180YC-FX, Cisco Systems Inc. - - N9K-C93240YC-FX2, Cisco Systems Inc. - - N9K-C9332C, Cisco Systems Inc. - - N9K-C9348GC-FXP, Cisco Systems Inc. - - N9K-C9364C, Cisco Systems Inc. - - N9K-SUP-A+, Cisco Systems Inc. - - N9K-SUP-A, Cisco Systems Inc. - - N9K-SUP-B, Cisco Systems Inc. - - N9K-SUP-B+, Cisco Systems Inc. - - DS-X9334-K9, Cisco Systems Inc. - - DS-X9648-1536K9, Cisco Systems Inc. - - N77-M312CQ-26L, Cisco Systems Inc. - - N77-M348XP-23L, Cisco Systems Inc. - - N77-SUP3E, Cisco Systems Inc. - - N7K-M324FQ-25L, Cisco Systems Inc. - - N7K-M348XP-25L, Cisco Systems Inc. - - A9K-16X100GE-CM, Cisco Systems Inc. - - A9K-16X100GE-TR, Cisco Systems Inc. - - A9K-RSP5-SE, Cisco Systems Inc. - - A9K-RSP5-TR",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 Secure Boot \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f c\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Cisco, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u0434\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 Secure Boot \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f c\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Cisco \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u0434\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041f\u043e\u0434\u043c\u0435\u043d\u0430 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,7)"
}
CISCO-SA-20190513-SECUREBOOT
Vulnerability from csaf_cisco - Published: 2019-05-13 17:30 - Updated: 2019-11-20 17:23{
"document": {
"acknowledgments": [
{
"summary": "Cisco would like to thank Mr. Jatin Kataria (Principal Research Scientist), Mr. Richard Housley (Research Scientist), and Dr. Ang Cui (Chief Scientist) of Red Balloon Security for reporting this vulnerability to Cisco and working toward a coordinated disclosure."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality.\r\n\r\nThe vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image.\r\n\r\nCisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot\"]",
"title": "Summary"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory.\r\n\r\nThe table includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information and fixed releases.\r\n\r\nIf a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Fixed Release Availability Network and Content Security Devices Cisco ASA 5506-X CSCvn77246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246\"] Firmware Release 1.1.15 (image name: asa5500-firmware-1115.SPA) (Available) Cisco ASA 5506H-X CSCvn77246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246\"] Firmware Release 1.1.15 (image name: asa5500-firmware-1115.SPA) (Available) Cisco ASA 5506W-X CSCvn77246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246\"] Firmware Release 1.1.15 (image name: asa5500-firmware-1115.SPA) (Available) Cisco ASA 5508-X CSCvn77246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246\"] Firmware Release 1.1.15 (image name: asa5500-firmware-1115.SPA) (Available) Cisco ASA 5516-X CSCvn77246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246\"] Firmware Release 1.1.15 (image name: asa5500-firmware-1115.SPA) (Available) Cisco Firepower 2100 Series CSCvn77248 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77248\"] Cisco Firepower Threat Defense (FTD) Software 6.2.2.5 Hotfix (Available)\r\nCisco Firepower Threat Defense (FTD) Software 6.2.3.12 Hotfix (Available)\r\nCisco Firepower Threat Defense (FTD) Software 6.3.0.3 Hotfix (Available)\r\nCisco Firepower Threat Defense (FTD) Software 6.2.3.13 (Available)\r\nCisco Firepower Threat Defense (FTD) Software 6.4.0.1 (Available)\r\nCisco Adaptive Security Appliance (ASA) Software 9.8.4.3 (Available)\r\nCisco Adaptive Security Appliance (ASA) Software 9.9.2.50 (Available)\r\nCisco Adaptive Security Appliance (ASA) Software 9.9.2.52 (Available)\r\nCisco Adaptive Security Appliance (ASA) Software 9.10.1.22 (Available)\r\nCisco Adaptive Security Appliance (ASA) Software 9.12.2 (Available) Cisco Firepower 4000 Series CSCvn77249 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77249\"] Firmware bundle package v1.0.18 with ROMMON rev 1.0.15 and FPGA rev 2.0: (Image Names: fxos-k9-fpr4k-firmware.1.0.18.SPA and fxos-k9-fpr9k-firmware.1.0.18.SPA) (Available) Cisco Firepower 9000 Series CSCvn77249 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77249\"] Firmware bundle package v1.0.18 with ROMMON rev 1.0.15 and FPGA rev 2.0: (Image Names: fxos-k9-fpr4k-firmware.1.0.18.SPA and fxos-k9-fpr9k-firmware.1.0.18.SPA) (Available) Routing and Switching - Enterprise and Service Provider 10/40/100G MR Muxponder - Licensable for Encryption (NCS2K-MR-MXP-LIC) CSCvn77191 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77191\"] 11.1 (Jul 2019) 10Gbps Optical Encryption Line Card for the Cisco NCS 2000 Series and Cisco ONS 15454 MSTP (15454-M-WSE-K9) CSCvn77191 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77191\"] 11.1 (Jul 2019) ASR 903 Router \u0026 Switching Processor and Controller - 400G (A900-RSP3C-400-S) CSCvn77169 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77169\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) ASR 907 Router \u0026 Switching Processor and Controller - 400G (A900-RSP3C-400-W) CSCvn77169 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77169\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) CBR-8 Converged Broadband Router CSCvn77185 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77185\"] Cisco IOS XE Software Release 16.12.1w (Sep 2019) Catalyst 6800 16-port 10GE with integrated DFC4 (C6800-16P10G) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Catalyst 6800 32-port 10GE with dual integrated dual DFC4 (C6800-32P10G) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Catalyst 6800 8-port 10GE with integrated DFC4 (C6800-8P10G) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Catalyst 6800 8-port 40GE with dual integrated dual DFC4-E (C6800-8P40G) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco 1-Port Gigabit Ethernet WAN Network Interface Module (NIM-1GE-CU-SFP) CSCvn77218 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77218\"] Cisco IOS XE Software Release 16.9.5 (Jan 20)\r\nCisco IOS XE Software Release 16.12.2 (Nov 2019)\r\nCisco IOS XE Software Release 17.1.1 (Nov 2019)\r\n Cisco 1120 Connected Grid Router CSCvn89140 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89140\"] Cisco IOS Software Release 15.9(3)M (Aug 2019)\r\nCisco IOS Software Release 15.8(3)M3 (Aug 2019)\r\nCisco IOS Software Release 15.7(3)M5 (Sep 2019)\r\nCisco IOS Software Release 15.6(3)M7 (Sep 2019)\r\n Cisco 1240 Connected Grid Router CSCvn89137 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89137\"] Cisco IOS Software Release 15.9(3)M (Aug 2019)\r\nCisco IOS Software Release 15.8(3)M3 (Aug 2019)\r\nCisco IOS Software Release 15.7(3)M5 (Sep 2019)\r\nCisco IOS Software Release 15.6(3)M7 (Sep 2019) Cisco 2-Port Gigabit Ethernet WAN Network Interface Module (NIM-2GE-CU-SFP) CSCvn77218 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77218\"] Cisco IOS XE Software Release 16.9.5 (Jan 20)\r\nCisco IOS XE Software Release 16.12.2 (Nov 2019)\r\nCisco IOS XE Software Release 17.1.1 (Nov 2019)\r\n Cisco 3000 Series Industrial Security Appliances CSCvn89146 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89146\"] Firmware release 1.0.05 (image name: isa3000-firmware-1005.SPA) (Available)\r\n Cisco 4000 Series Integrated Services Router Packet 1024-Channel High-Density Voice DSP Module (SM-X-PVDM-1000) CSCvn77212 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212\"] Cisco IOS XE Software Release 16.12.2 (Nov 2019)\r\nCisco IOS XE Software Release 17.1.1 (Nov 2019)\r\nCisco IOS XE Software Release 16.9.5 (Jan 20) Cisco 4000 Series Integrated Services Router Packet 2048-Channel High-Density Voice DSP Module (SM-X-PVDM-2000) CSCvn77212 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212\"] Cisco IOS XE Software Release 16.12.2 (Nov 2019)\r\nCisco IOS XE Software Release 17.1.1 (Nov 2019)\r\nCisco IOS XE Software Release 16.9.5 (Jan 20) Cisco 4000 Series Integrated Services Router Packet 3080-Channel High-Density Voice DSP Module (SM-X-PVDM-3000) CSCvn77212 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212\"] Cisco IOS XE Software Release 16.12.2 (Nov 2019)\r\nCisco IOS XE Software Release 17.1.1 (Nov 2019)\r\nCisco IOS XE Software Release 16.9.5 (Jan 20) Cisco 4000 Series Integrated Services Router Packet 768-Channel High-Density Voice DSP Module (SM-X-PVDM-500) CSCvn77212 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212\"] Cisco IOS XE Software Release 16.12.2 (Nov 2019)\r\nCisco IOS XE Software Release 17.1.1 (Nov 2019)\r\nCisco IOS XE Software Release 16.9.5 (Jan 20) Cisco 4221 Integrated Services Router CSCvn77153 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77153\"] Utility File Name: isr4200_cpld_update_v1.1_SPA.bin (Available) Cisco 4321 Integrated Services Router CSCvn77156 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77156\"] Utility File Name: isr4300_cpld_update_v1.1_SPA.bin (Available) Cisco 4331 Integrated Services Router CSCvn77156 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77156\"] Utility File Name: isr4300_cpld_update_v1.1_SPA.bin (Available) Cisco 4351 Integrated Services Router CSCvn77156 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77156\"] Utility File Name: isr4300_cpld_update_v1.1_SPA.bin (Available) Cisco 4431 Integrated Services Router CSCvn77155 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77155\"] Utility File Name: isr4400_cpld_update_v1.1_SPA.bin (Available) Cisco 4451-X Integrated Services Router CSCvn77155 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77155\"] Utility File Name: isr4400_cpld_update_v1.1_SPA.bin (Available) Cisco 4461 Integrated Services Router CSCvn77154 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77154\"] Utility File Name: isr4400v2_cpld_update_v1.1_SPA.bin (Available) Cisco 5000 Series Enterprise Network Compute System CSCvn77150 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77150\"] Release no. TBD (Aug 2019) Cisco 809 Industrial Integrated Services Routers CSCvn89138 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89138\"] Cisco IOS Software Release 15.8(3)M2a (Available)\r\nCisco IOS Software Release 15.7(3)M4b (Available)\r\nCisco IOS Software Release 15.6(3)M6b (Available)\r\n Cisco 829 Industrial Integrated Services Routers CSCvn89143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89143\"] Cisco IOS Software Release 15.8(3)M2a (Available)\r\nCisco IOS Software Release 15.7(3)M4b (Available)\r\nCisco IOS Software Release 15.6(3)M6b (Available) Cisco ASR 1000 Embedded Services Processor, 200G (ASR1000-ESP200) CSCvn77159 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77159\"] Release no. TBD (Dec 2019) Cisco ASR 1000 Fixed Ethernet Line Card (6x10GE) (ASR1000-6TGE) CSCvn89144 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89144\"] Release no. TBD (Dec 2019) Cisco ASR 1000 Fixed Ethernet Line Card, 2x10GE + 20x1GE (ASR1000-2T+20X1GE) CSCvn89144 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89144\"] Release no. TBD (Dec 2019) Cisco ASR 1000 Series 100-Gbps Embedded Services Processor (ASR1000-ESP100) CSCvn77160 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77160\"] Release no. TBD (Dec 2019) Cisco ASR 1000 Series Modular Interface Processor (ASR1000-MIP100) CSCvn77158 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77158\"] Release no. TBD (Dec 2019) Cisco ASR 1000 Series Route Processor 3 (Cisco ASR1000-RP3) CSCvn77167 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77167\"] Release no. TBD (Dec 2019) Cisco ASR 1001-HX Router CSCvn77162 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77162\"] ASR1K-fpga_prog.16.0.0.xe.bin (Available) Cisco ASR 1001-X CSCvn89145 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89145\"] ASR1K-fpga_prog.16.0.0.xe.bin (Available) Cisco ASR 1002-HX Router CSCvn77166 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77166\"] ASR1K-fpga_prog.16.0.0.xe.bin (Available) Cisco ASR 900 Series Route Switch Processor 2 - 128G, Base Scale (A900-RSP2A-128) CSCvn77168 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77168\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 900 Series Route Switch Processor 2 - 64G, Base Scale (A900-RSP2A-64) CSCvn77168 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77168\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 900 Series Route Switch Processor 3 - 200G, Large Scale (A900-RSP3C-200) CSCvn77169 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77169\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 9000 Series 16-Port 100 Gigabit Ethernet Line Card (A99-16X100GE-X-SE) CSCvn77180 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77180\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR 9000 Series 16-Port 100 Gigabit Ethernet Line Card (A9K-16X100GE-TR, A9K-16X100GE-CM) CSCvn77180 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77180\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR 9000 Series 32-Port 100 Gigabit Ethernet Line Card (A99-32X100GE-TR, A99-32X100GE-CM) CSCvn77180 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77180\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR 9000 Series Route Switch Processor 5 for Packet Transport (A9K-RSP5-TR) CSCvn77175 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR 9000 Series Route Switch Processor 5 for Service Edge (A9K-RSP5-SE) CSCvn77175 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 10GE and 2-10GE - Passively Cooled DC model (ASR-920-10SZ-PD), Cisco ASR920 Series - 20GE SFP, 4Cu and 4-10GE: Modular PSU (ASR-920-20SZ-M) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 12 x 1/10GE SFP, AC Model (ASR-920-12SZ-A) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 12 x 1/10GE SFP, DC Model (ASR-920-12SZ-D) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 12GE and 2-10GE - AC model (ASR-920-12CZ-A) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 12GE and 2-10GE - DC model (ASR-920-12CZ-D) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 24GE Copper and 4-10GE \u2013 Modular PSU (ASR-920-24TZ-M) CSCvn77172 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77172\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 24GE Fiber and 4-10GE \u2013 Modular PSU (ASR-920-24SZ-M) CSCvn77172 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77172\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 2GE and 4-10GE - AC model (ASR-920-4SZ-A) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers 2GE and 4-10GE - DC model (ASR-920-4SZ-D) CSCvn77171 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 920 Series Aggregation Services Routers Conformal Coated - 12GE and 4-10GE, 1 IM Slot (ASR-920-12SZ-IM-CC) CSCvn77170 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77170\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR 9900 Route Processor 3 for Packet Transport (A99-RP3-TR) CSCvn77175 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR 9900 Route Processor 3 for Service Edge (A99-RP3-SE) CSCvn77175 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco ASR920 Series - 12GE and 4-10GE, 1 IM slot (ASR-920-12SZ-IM) CSCvn77170 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77170\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco ASR920 Series \u2013 24GE and 4-10GE \u2013 Modular PSU and IM (ASR-920-24SZ-IM) CSCvn77172 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77172\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco Catalyst 6800 16-port 10GE with Integrated DFC4-XL (C6800-16P10G-XL) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6800 32-port 10GE with Dual Integrated Dual DFC4-XL (C6800-32P10G-XL) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6800 8-port 10GE with Integrated DFC4-XL (C6800-8P10G-XL) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6800 8-port 40GE with Dual Integrated Dual DFC4-EXL (C6800-8P40G-XL) CSCvn77182 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6800 Series Supervisor Engine 6T (C6800-SUP6T) CSCvn77181 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77181\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6800 Series Supervisor Engine 6T XL (C6800-SUP6T-XL) CSCvn77181 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77181\"] Cisco IOS XE Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6816-X-Chassis (Standard Tables) (C6816-X-LE) CSCvn77183 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183\"] Cisco IOS Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6824-X-Chassis and 2 x 40G (Standard Tables) (C6824-X-LE-40G) CSCvn77183 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183\"] Cisco IOS Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6832-X-Chassis (Standard Tables) (C6832-X-LE) CSCvn77183 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183\"] Cisco IOS Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 6840-X-Chassis and 2 x 40G (Standard Tables) (C6840-X-LE-40G) CSCvn77183 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183\"] Cisco IOS Software Release 15.5(1)SY4 (Sep 2019) Cisco Catalyst 9300 Series Switches CSCvn77209 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77209\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series High-Performance Switch with 24x 1/10/25G Gigabit Ethernet + 4x 40/100G Uplink (C9500-24Y4C) CSCvn89150 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series High-Performance Switch with 32x 100 Gigabit Ethernet (C9500-32C) CSCvn89150 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series High-Performance Switch with 32x 40 Gigabit Ethernet (C9500-32QC) CSCvn89150 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series High-Performance Switch with 48x 1/10/25G Gigabit Ethernet + 4x 40/100G Uplink (C9500-48Y4C) CSCvn89150 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series Switch with 12x 40G Gigabit Ethernet (C9500-12Q) CSCvn77220 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series Switch with 16x 1/10G Gigabit Ethernet (C9500-16X) CSCvn77220 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series Switch with 24x 40G Gigabit Ethernet (C9500-24Q) CSCvn77220 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9500 Series Switch with 40x 1/10G Gigabit Ethernet (C9500-40X) CSCvn77220 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220\"] Utility name: cat9k_iosxe.16.00.00fpgautility.SPA.bin (Available) Cisco Catalyst 9600 Supervisor Engine-1 CSCvn95346 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn95346\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) Cisco Catalyst 9800-40 Wireless Controller CSCvn77165 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77165\"] C9800-40_fpga_prog.16.0.0.xe.bin (Available) Cisco Catalyst 9800-80 Wireless Controller CSCvn77163 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77163\"] C9800-80_fpga_prog.16.0.0.xe.bin (Available) Cisco IC3000 Industrial Compute Gateway CSCvp42792 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp42792\"] Firmware Release 1.0.2 (image name IC3000-K9-1.0.3.SPA) (Aug 2019) Cisco MDS 9000 Family 24/10 SAN Extension Module (DS-X9334-K9) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco NCS 200 Series 10/40/100G MR Muxponder (NCS2K-MR-MXP-K9) CSCvn77191 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77191\"] 11.1 (Jul 2019) Cisco NCS 5500 12X10, 2X40 2XMPA Line Card Base (NC55-MOD-A-S) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 5500 Series 24 Ports of 100GE and 12 Ports of 40GE High-Scale Line Card (NC55-24H12F-SE) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 5500 Series 36 ports of 100GE High-Scale Line Card (NC55-36X100G-A-SE) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 5504 Fabric Card (NC55-5504-FC) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 5516 Fabric Card (NC55-5516-FC) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 55A2 Fixed 24X10G + 16X25G MPA Chassis (NCS-55A2-MOD-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 55A2 Fixed 24X10G + 16X25G MPA Chassis, Temperature Hardened (NCS-55A2-MOD-HD-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 55A2 Fixed 24X10G + 16X25G MPA Chassis, Temperature Hardened with Conformal Coating (NCS-55A2-MOD-HX-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 55A2 Fixed 24X10G + 16X25G MPA Scale Chassis (NCS-55A2-MOD-SE-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS 55A2 Fixed 24X10G + 16X25G MPA Scale Chassis, Temperature Hardened with Conformal Coating (NC55A2-MOD-SE-H-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS5501 - 40x10G and 4x100G Scale Chassis (NCS-5501-SE) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS5501 Fixed 48x10G and 6x100G Chassis (NCS-5501) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS5502 - 48x100G Scale Chassis (NCS-5502-SE) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS5502 Fixed 48x100G Chassis (NCS-5502) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS55A1 Fixed 24x100G Chassis (NCS-55A1-24H) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS55A1 Fixed 36x100G Base Chassis (NCS-55A1-36H-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco NCS55A1 Fixed 36x100G Scale Chassis (NCS-55A1-36H-SE-S) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Network Convergence System 1001 CSCvp88427 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp88427\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco Network Convergence System 1002 CSCvn77219 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77219\"] Cisco IOS XR Software Release 7.0.1 (Jul 2019) Cisco Network Convergence System 5001 CSCvn77207 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77207\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Network Convergence System 5002 CSCvn77205 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77205\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Network Convergence System 540 (N540-ACC-SYS, N540-24Z8Q2C-M, N540-24Z8Q2C-SYS) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Network Convergence System 540 Conformal Coated (N540X-ACC-SYS) CSCvn77201 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Network Convergence System 5500 Series: 1.2-Tbps IPoDWDM Modular Line Card (NC55-6X200-DWDM-S) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Network Convergence System 5500 Series: 36X100G MACsec Modular Line Cards (NC55-36X100G-S) CSCvn77202 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202\"] Cisco IOS XR Software Release 7.1.1 (Nov 2019) Cisco Nexus 31108PC-V, 48 SFP+ and 6 QSFP28 ports (N3K-C31108PC-V) CSCvn77245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245\"] Cisco NX-OS Software Release 9.3(1) (Aug 2019) Cisco Nexus 31108TC-V, 48 10Gbase-T RJ-45 and 6 QSFP28 ports (N3K-C31108TC-V) CSCvn77245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245\"] Cisco NX-OS Software Release 9.3(1) (Aug 2019) Cisco Nexus 3132C-Z Switches (N3K-C3132C-Z) CSCvn77245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245\"] Cisco NX-OS Software Release 9.3(1) (Aug 2019) Cisco Nexus 3264C-E Switches (N3K-C3264C-E) CSCvn77245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245\"] Cisco NX-OS Software Release 9.3(1) (Aug 2019) Cisco Nexus 7000 M3-Series 48-Port 1/10G Ethernet Module (N7K-M348XP-25L) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco Nexus 7700 F4-Series 30-Port 100G Ethernet Module (N77-F430CQ-36) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco Nexus 7700 M3-Series 12-Port 100G Ethernet Module (N77-M312CQ-26L) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco Nexus 7700 M3-Series 24-Port 40G Ethernet Module (N7K-M324FQ-25L) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco Nexus 7700 M3-Series 48-Port 1/10G Ethernet Module (N77-M348XP-23L) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco Nexus 7700 Supervisor 3 (N77-SUP3E) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Cisco Nexus 9200 with 36p 40G 100G QSFP28 (N9K-C9236C) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9200 with 48p 1/10G/25G SFP+ and 6p 40G QSFP or 4p 100G QSFP28 (N9K-C92160YC-X) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9200 with 48p 10/25 Gbps and 18p 100G QSFP28 (N9K-C92300YC) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9200 with 56p 40G QSFP+ and 8p 100G QSFP28 (N9K-C92304QC) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9200 with 72p 40G QSFP+ (N9K-C9272Q) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9300 with 48p 1/10G/25G SFP and 6p 40G/100G QSFP28, MACsec, and Unified Ports Capable (N9K-C93180YC-FX) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9300 with 48p 100M/1G BASE-T, 4p 10/25G SFP28 and 2p 40G/100G QSFP28 (N9K-C9348GC-FXP) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9300 with 48p 10G BASE-T and 6p 40G/100G QSFP28, MACsec Capable (N9K-C93108TC-FX) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9332C Spine Switch with 32p 40/100G QSFP28, 2p 1/10G SFP (N9K-C9332C) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9364C Spine Switch with 64p 40/100G QSFP28, 2p 1/10G SFP (N9K-C9364C) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9500 4-Core/4-Thread Supervisor (N9K-SUP-A) CSCvn77142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019) Cisco Nexus 9500 6-Core/12-Thread Supervisor (N9K-SUP-B) CSCvn77142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019) Cisco Nexus 9K Fixed with 32p 40G/100G QSFP28 (N9K-C9232C) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9K Fixed with 36p 40G/100G QSFP28 (N9K-C9336C-FX2) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9K Fixed with 48p 1/10G/25G SFP and 12p 40G/100G QSFP28 (N9K-C93240YC-FX2) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9K Fixed with 48p 1/10G/25G SFP and 6p 40G/100G QSFP28 (N9K-C93180YC-EX) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9K Fixed with 48p 10G BASE-T and 6p 40G/100G QSFP28 (N9K-C93108TC-EX) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Nexus 9K Fixed with up to 32p 40/50G QSFP+ or up to 18p 100G QSFP28 (N9K-C93180LC-EX) CSCvn77143 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019)\r\n Cisco Packet-over-T3/E3 Service Module (SM-X-1T3/E3) CSCvn77147 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77147\"] Release no. TBD (Oct 2019) Cisco cBR-8 Integrated CCAP 40G Remote PHY Line Card (CBR-CCAP-LC-40G-R) CSCvn77184 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77184\"] Cisco IOS XE Software Release 16.12.1 (Jul 2019) MDS 9700 48-Port 32-Gbps Fibre Channel Switching Module (DS-X9648-1536K9) CSCvn77141 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141\"] N7K-M348XP-25L, N7K-M324FQ-25L, N77-M348XP-23L, N77-M312CQ-26L, N77-F430CQ-36, and N77-M324FQ: Cisco NX-OS Software Release 8.4.2 (Sep 2019)\r\nDS-X9648-1536K9 and DS-X9334-K9: Cisco NX-OS Software Release 8.4.1a (Sep 2019) Supervisor A+ for Nexus 9500 (N9K-SUP-A+) CSCvn77142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019) Supervisor B+ for Nexus 9500 (N9K-SUP-B+) CSCvn77142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142\"] NX-OS: Cisco NX-OS Software Release 9.3(1) (Aug 2019)\r\nACI: Switch Software Release 4.2(1) (Aug 2019) Voice and Unified Communications Devices Analog Voice Network Interface Modules for Cisco 4000 Series ISRs (NIM-2FXO, NIM-4FXO, NIM-2FXS, NIM-4FXS, NIM-2FXS/4FXO, NIM-2FXSP, NIM-4FXSP, NIM-2FXS/4FXOP, NIM-4E/M, NIM-2BRI-NT/TE, NIM-4BRI-NT/TE) CSCvn77151 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77151\"] Release no. TBD (Sep 2019) Cisco 4000 Series Integrated Services Router T1/E1 Voice and WAN Network Interface Modules (NIM-1MFT-T1/E1, NIM-2MFT-T1/E1, NIM-4MFT-T1/E1, NIM-8MFT-T1/E1, NIM-1CE1T1-PRI, NIM-2CE1T1-PRI, NIM-8CE1T1-PRI) CSCvn77152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77152\"] Release no. TBD (Sep 2019)",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Cisco has investigated all Cisco products that support hardware-based Secure Boot functionality to verify that they are enforcing the appropriate access control checks.\r\n\r\nOnly products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nNo other Cisco products that support hardware-based Secure Boot functionality are vulnerable.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability:\r\n\r\nHave privileged administrative access to the device.\r\nBe able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access.\r\nDevelop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.\r\n\r\nCisco is in the process of developing and releasing software fixes for all affected platforms. In most cases, the fix will require an on-premise reprogramming of a low-level hardware component that is required for normal device operation. A failure during this reprogramming process may cause the device to become unusable and require a hardware replacement. Customers are advised to consult the Release Note Enclosure for the Cisco bug relevant to their platform for the following information:\r\n\r\nCauses that could lead to a failure of the reprogramming process and cause the device to become unusable\r\nA platform-specific set of steps that are required to reprogram a device\r\nThe procedure required to determine whether a given device is running an affected firmware version (that therefore must be fixed) or whether the device is already running a fixed firmware version\r\n\r\nThe product release notes that are published with each platform-specific fixed software release will include more detailed information about items 2 and 3 in the preceding list. The product release notes should be considered the most up-to-date source of information about these items.\r\n\r\n For details about Secure Boot and related Trustworthy Technologies, please refer to the Trustworthy Technologies Datasheet [\"https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf\"]. A list of all Cisco products supporting secure boot technology can be found at the following link: https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-secure-boot-product-list.pdf [\"https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-secure-boot-product-list.pdf\"]",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.\r\n\r\nCisco Guide to Harden Cisco IOS Devices [\"https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html\"] provides information about how to harden the device and secure management access. Implementing the recommendations in this document would reduce the attack surface for this vulnerability.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases, consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nCisco will release free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is aware of the existence of proof-of-concept code that demonstrates this vulnerability on the Cisco ASR 1001-X. There are no indications at this time that this proof-of-concept code is publicly available.\r\n\r\nCisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "Cisco would like to thank Mr. Jatin Kataria (Principal Research Scientist), Mr. Richard Housley (Research Scientist), and Dr. Ang Cui (Chief Scientist) of Red Balloon Security for reporting this vulnerability to Cisco and working toward a coordinated disclosure.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco Secure Boot Hardware Tampering Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"category": "external",
"summary": "Cisco Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCvn77246",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246"
},
{
"category": "external",
"summary": "CSCvn77246",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246"
},
{
"category": "external",
"summary": "CSCvn77246",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246"
},
{
"category": "external",
"summary": "CSCvn77246",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246"
},
{
"category": "external",
"summary": "CSCvn77246",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77246"
},
{
"category": "external",
"summary": "CSCvn77248",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77248"
},
{
"category": "external",
"summary": "CSCvn77249",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77249"
},
{
"category": "external",
"summary": "CSCvn77249",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77249"
},
{
"category": "external",
"summary": "CSCvn77191",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77191"
},
{
"category": "external",
"summary": "CSCvn77191",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77191"
},
{
"category": "external",
"summary": "CSCvn77169",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77169"
},
{
"category": "external",
"summary": "CSCvn77169",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77169"
},
{
"category": "external",
"summary": "CSCvn77185",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77185"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77218",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77218"
},
{
"category": "external",
"summary": "CSCvn89140",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89140"
},
{
"category": "external",
"summary": "CSCvn89137",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89137"
},
{
"category": "external",
"summary": "CSCvn77218",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77218"
},
{
"category": "external",
"summary": "CSCvn89146",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89146"
},
{
"category": "external",
"summary": "CSCvn77212",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212"
},
{
"category": "external",
"summary": "CSCvn77212",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212"
},
{
"category": "external",
"summary": "CSCvn77212",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212"
},
{
"category": "external",
"summary": "CSCvn77212",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77212"
},
{
"category": "external",
"summary": "CSCvn77153",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77153"
},
{
"category": "external",
"summary": "CSCvn77156",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77156"
},
{
"category": "external",
"summary": "CSCvn77156",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77156"
},
{
"category": "external",
"summary": "CSCvn77156",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77156"
},
{
"category": "external",
"summary": "CSCvn77155",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77155"
},
{
"category": "external",
"summary": "CSCvn77155",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77155"
},
{
"category": "external",
"summary": "CSCvn77154",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77154"
},
{
"category": "external",
"summary": "CSCvn77150",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77150"
},
{
"category": "external",
"summary": "CSCvn89138",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89138"
},
{
"category": "external",
"summary": "CSCvn89143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89143"
},
{
"category": "external",
"summary": "CSCvn77159",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77159"
},
{
"category": "external",
"summary": "CSCvn89144",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89144"
},
{
"category": "external",
"summary": "CSCvn89144",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89144"
},
{
"category": "external",
"summary": "CSCvn77160",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77160"
},
{
"category": "external",
"summary": "CSCvn77158",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77158"
},
{
"category": "external",
"summary": "CSCvn77167",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77167"
},
{
"category": "external",
"summary": "CSCvn77162",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77162"
},
{
"category": "external",
"summary": "CSCvn89145",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89145"
},
{
"category": "external",
"summary": "CSCvn77166",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77166"
},
{
"category": "external",
"summary": "CSCvn77168",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77168"
},
{
"category": "external",
"summary": "CSCvn77168",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77168"
},
{
"category": "external",
"summary": "CSCvn77169",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77169"
},
{
"category": "external",
"summary": "CSCvn77180",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77180"
},
{
"category": "external",
"summary": "CSCvn77180",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77180"
},
{
"category": "external",
"summary": "CSCvn77180",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77180"
},
{
"category": "external",
"summary": "CSCvn77175",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175"
},
{
"category": "external",
"summary": "CSCvn77175",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77172",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77172"
},
{
"category": "external",
"summary": "CSCvn77172",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77172"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77171",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77171"
},
{
"category": "external",
"summary": "CSCvn77170",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77170"
},
{
"category": "external",
"summary": "CSCvn77175",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175"
},
{
"category": "external",
"summary": "CSCvn77175",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77175"
},
{
"category": "external",
"summary": "CSCvn77170",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77170"
},
{
"category": "external",
"summary": "CSCvn77172",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77172"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77182",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77182"
},
{
"category": "external",
"summary": "CSCvn77181",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77181"
},
{
"category": "external",
"summary": "CSCvn77181",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77181"
},
{
"category": "external",
"summary": "CSCvn77183",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183"
},
{
"category": "external",
"summary": "CSCvn77183",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183"
},
{
"category": "external",
"summary": "CSCvn77183",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183"
},
{
"category": "external",
"summary": "CSCvn77183",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77183"
},
{
"category": "external",
"summary": "CSCvn77209",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77209"
},
{
"category": "external",
"summary": "CSCvn89150",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150"
},
{
"category": "external",
"summary": "CSCvn89150",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150"
},
{
"category": "external",
"summary": "CSCvn89150",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150"
},
{
"category": "external",
"summary": "CSCvn89150",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn89150"
},
{
"category": "external",
"summary": "CSCvn77220",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220"
},
{
"category": "external",
"summary": "CSCvn77220",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220"
},
{
"category": "external",
"summary": "CSCvn77220",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220"
},
{
"category": "external",
"summary": "CSCvn77220",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77220"
},
{
"category": "external",
"summary": "CSCvn95346",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn95346"
},
{
"category": "external",
"summary": "CSCvn77165",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77165"
},
{
"category": "external",
"summary": "CSCvn77163",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77163"
},
{
"category": "external",
"summary": "CSCvp42792",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp42792"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77191",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77191"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvp88427",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp88427"
},
{
"category": "external",
"summary": "CSCvn77219",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77219"
},
{
"category": "external",
"summary": "CSCvn77207",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77207"
},
{
"category": "external",
"summary": "CSCvn77205",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77205"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77201",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77201"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77202",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77202"
},
{
"category": "external",
"summary": "CSCvn77245",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245"
},
{
"category": "external",
"summary": "CSCvn77245",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245"
},
{
"category": "external",
"summary": "CSCvn77245",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245"
},
{
"category": "external",
"summary": "CSCvn77245",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77245"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142"
},
{
"category": "external",
"summary": "CSCvn77142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77143",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77143"
},
{
"category": "external",
"summary": "CSCvn77147",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77147"
},
{
"category": "external",
"summary": "CSCvn77184",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77184"
},
{
"category": "external",
"summary": "CSCvn77141",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77141"
},
{
"category": "external",
"summary": "CSCvn77142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142"
},
{
"category": "external",
"summary": "CSCvn77142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77142"
},
{
"category": "external",
"summary": "CSCvn77151",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77151"
},
{
"category": "external",
"summary": "CSCvn77152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn77152"
},
{
"category": "external",
"summary": "Trustworthy Technologies Datasheet",
"url": "https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-secure-boot-product-list.pdf",
"url": "https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-secure-boot-product-list.pdf"
},
{
"category": "external",
"summary": "Cisco Guide to Harden Cisco IOS Devices",
"url": "https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html"
},
{
"category": "external",
"summary": "software updates",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Cisco Secure Boot Hardware Tampering Vulnerability",
"tracking": {
"current_release_date": "2019-11-20T17:23:18+00:00",
"generator": {
"date": "2022-09-03T03:01:56+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-20190513-secureboot",
"initial_release_date": "2019-05-13T17:30:00+00:00",
"revision_history": [
{
"date": "2019-05-13T17:09:22+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2019-05-13T20:48:38+00:00",
"number": "1.1.0",
"summary": "Updated list of vulnerable products. Added link to Datasheet for Cisco Trustworthy Technologies."
},
{
"date": "2019-05-14T20:41:42+00:00",
"number": "1.2.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-05-15T21:46:30+00:00",
"number": "1.3.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-05-16T20:00:50+00:00",
"number": "1.4.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-05-20T20:01:09+00:00",
"number": "1.5.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-05-22T20:14:00+00:00",
"number": "1.6.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-05-23T20:01:59+00:00",
"number": "1.7.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products. Added link to list of Cisco products supporting secure boot."
},
{
"date": "2019-05-30T19:55:14+00:00",
"number": "1.8.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-06-10T21:16:08+00:00",
"number": "1.9.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products. Changed document status to Final. Removed statements indicating the advisory will be updated (Summary and Vulnerable Products)."
},
{
"date": "2019-06-17T17:46:40+00:00",
"number": "1.10.0",
"summary": "Updated list of vulnerable products. Updated fix availability date for some products."
},
{
"date": "2019-06-28T16:18:25+00:00",
"number": "1.11.0",
"summary": "Updated fix availability date for some products."
},
{
"date": "2019-07-17T19:56:25+00:00",
"number": "1.12.0",
"summary": "Updated fix availability date for some products."
},
{
"date": "2019-08-02T13:57:45+00:00",
"number": "1.13.0",
"summary": "Updated fix availability date for some products."
},
{
"date": "2019-08-21T19:32:38+00:00",
"number": "1.14.0",
"summary": "Updated list of vulnerable products."
},
{
"date": "2019-09-03T17:17:32+00:00",
"number": "1.15.0",
"summary": "Updated list of vulnerable products."
},
{
"date": "2019-09-06T20:26:29+00:00",
"number": "1.16.0",
"summary": "Updated fixed version for some products."
},
{
"date": "2019-11-20T17:23:18+00:00",
"number": "1.17.0",
"summary": "Updated fix availability date for some products."
}
],
"status": "final",
"version": "1.17.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Cisco ASR 9000 Series Aggregation Services Routers",
"product": {
"name": "Cisco ASR 9000 Series Aggregation Services Routers ",
"product_id": "CSAFPID-202356"
}
},
{
"category": "product_family",
"name": "Cisco ASA with FirePOWER Services",
"product": {
"name": "Cisco ASA with FirePOWER Services ",
"product_id": "CSAFPID-206520"
}
},
{
"category": "product_family",
"name": "Cisco ASR 1000 Series Aggregation Services Routers",
"product": {
"name": "Cisco ASR 1000 Series Aggregation Services Routers ",
"product_id": "CSAFPID-209961"
}
},
{
"category": "product_family",
"name": "Cisco ASR 900 Series Aggregation Services Routers",
"product": {
"name": "Cisco ASR 900 Series Aggregation Services Routers ",
"product_id": "CSAFPID-211571"
}
},
{
"category": "product_family",
"name": "Cisco Nexus 3000 Series Switch",
"product": {
"name": "Cisco Nexus 3000 Series Switch ",
"product_id": "CSAFPID-213561"
}
},
{
"category": "product_family",
"name": "Cisco cBR-8 Converged Broadband Routers",
"product": {
"name": "Cisco cBR-8 Converged Broadband Routers ",
"product_id": "CSAFPID-225134"
}
},
{
"category": "product_family",
"name": "Cisco Network Convergence System 5500 Series",
"product": {
"name": "Cisco Network Convergence System 5500 Series ",
"product_id": "CSAFPID-227648"
}
},
{
"category": "product_family",
"name": "Cisco 5000 Series Enterprise Network Compute System",
"product": {
"name": "Cisco 5000 Series Enterprise Network Compute System ",
"product_id": "CSAFPID-239218"
}
},
{
"category": "product_family",
"name": "Cisco NX-OS System Software in ACI Mode",
"product": {
"name": "Cisco NX-OS System Software in ACI Mode ",
"product_id": "CSAFPID-241202"
}
},
{
"category": "product_family",
"name": "Cisco Catalyst 6800 Series Switches",
"product": {
"name": "Cisco Catalyst 6800 Series Switches ",
"product_id": "CSAFPID-243268"
}
},
{
"category": "product_family",
"name": "Cisco Network Convergence System 1000 Series",
"product": {
"name": "Cisco Network Convergence System 1000 Series ",
"product_id": "CSAFPID-255125"
}
},
{
"category": "product_family",
"name": "Cisco Catalyst 9500 Series Switches",
"product": {
"name": "Cisco Catalyst 9500 Series Switches ",
"product_id": "CSAFPID-261466"
}
},
{
"category": "product_family",
"name": "Cisco Firepower 2100 Series",
"product": {
"name": "Cisco Firepower 2100 Series ",
"product_id": "CSAFPID-261518"
}
},
{
"category": "product_family",
"name": "Cisco 4000 Series Integrated Services Routers",
"product": {
"name": "Cisco 4000 Series Integrated Services Routers ",
"product_id": "CSAFPID-261519"
}
},
{
"category": "product_family",
"name": "Cisco 3000 Series Industrial Security Appliances (ISA)",
"product": {
"name": "Cisco 3000 Series Industrial Security Appliances (ISA) ",
"product_id": "CSAFPID-261520"
}
},
{
"category": "product_family",
"name": "Cisco 1000 Series Connected Grid Routers",
"product": {
"name": "Cisco 1000 Series Connected Grid Routers ",
"product_id": "CSAFPID-261521"
}
},
{
"category": "product_family",
"name": "Cisco 800 Series Industrial Integrated Services Routers",
"product": {
"name": "Cisco 800 Series Industrial Integrated Services Routers ",
"product_id": "CSAFPID-261522"
}
},
{
"category": "product_family",
"name": "Cisco Nexus 7000 Series Switches",
"product": {
"name": "Cisco Nexus 7000 Series Switches ",
"product_id": "CSAFPID-261523"
}
},
{
"category": "product_family",
"name": "Cisco MDS 9700 Series Multilayer Directors",
"product": {
"name": "Cisco MDS 9700 Series Multilayer Directors ",
"product_id": "CSAFPID-261525"
}
},
{
"category": "product_family",
"name": "Cisco Firepower 4100 Series",
"product": {
"name": "Cisco Firepower 4100 Series ",
"product_id": "CSAFPID-261526"
}
},
{
"category": "product_family",
"name": "Cisco Firepower 9000 Series",
"product": {
"name": "Cisco Firepower 9000 Series ",
"product_id": "CSAFPID-261527"
}
},
{
"category": "product_family",
"name": "Cisco IC3000 Industrial Compute Gateway",
"product": {
"name": "Cisco IC3000 Industrial Compute Gateway ",
"product_id": "CSAFPID-261528"
}
},
{
"category": "product_family",
"name": "Cisco ASR 920 Series Aggregation Services Router",
"product": {
"name": "Cisco ASR 920 Series Aggregation Services Router ",
"product_id": "CSAFPID-261529"
}
},
{
"category": "product_family",
"name": "Cisco Nexus 9000 Series Switches",
"product": {
"name": "Cisco Nexus 9000 Series Switches ",
"product_id": "CSAFPID-261530"
}
},
{
"category": "product_family",
"name": "Cisco ONS 15454 Series Multiservice Transport Platforms",
"product": {
"name": "Cisco ONS 15454 Series Multiservice Transport Platforms ",
"product_id": "CSAFPID-261531"
}
},
{
"category": "product_family",
"name": "Cisco Network Convergence System 2000 Series",
"product": {
"name": "Cisco Network Convergence System 2000 Series ",
"product_id": "CSAFPID-261532"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-1649",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77150"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77246"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77162"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89145"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77166"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77159"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89144"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77160"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77158"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77167"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77168"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77169"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77175"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89150"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77180"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77182"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77181"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77183"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77202"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77201"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77207"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77205"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77245"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77143"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77209"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77220"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77185"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77184"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77219"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77248"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77147"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77154"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77155"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77156"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77153"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77152"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77212"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77151"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89146"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89137"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89140"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89138"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn89143"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77141"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77249"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvp42792"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77170"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77171"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77172"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77142"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvn77191"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-239218",
"CSAFPID-206520",
"CSAFPID-209961",
"CSAFPID-211571",
"CSAFPID-202356",
"CSAFPID-243268",
"CSAFPID-227648",
"CSAFPID-213561",
"CSAFPID-241202",
"CSAFPID-261466",
"CSAFPID-225134",
"CSAFPID-255125",
"CSAFPID-261518",
"CSAFPID-261519",
"CSAFPID-261520",
"CSAFPID-261521",
"CSAFPID-261522",
"CSAFPID-261523",
"CSAFPID-261525",
"CSAFPID-261526",
"CSAFPID-261527",
"CSAFPID-261528",
"CSAFPID-261529",
"CSAFPID-261530",
"CSAFPID-261531",
"CSAFPID-261532"
]
},
"release_date": "2019-05-13T17:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-239218",
"CSAFPID-261531",
"CSAFPID-213561",
"CSAFPID-261518",
"CSAFPID-261530",
"CSAFPID-211571",
"CSAFPID-241202",
"CSAFPID-261522",
"CSAFPID-261525",
"CSAFPID-206520",
"CSAFPID-243268",
"CSAFPID-255125",
"CSAFPID-261519",
"CSAFPID-261526",
"CSAFPID-261528",
"CSAFPID-202356",
"CSAFPID-225134",
"CSAFPID-261520",
"CSAFPID-261527",
"CSAFPID-261529",
"CSAFPID-227648",
"CSAFPID-261521",
"CSAFPID-261523",
"CSAFPID-261466",
"CSAFPID-261532",
"CSAFPID-209961"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-239218"
]
}
],
"title": "Cisco Secure Boot Hardware Tampering Vulnerability"
}
]
}
GHSA-8P3X-34C5-5PMX
Vulnerability from github – Published: 2022-05-24 16:45 – Updated: 2022-12-13 21:30A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
{
"affected": [],
"aliases": [
"CVE-2019-1649"
],
"database_specific": {
"cwe_ids": [
"CWE-667"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-05-13T19:29:00Z",
"severity": "HIGH"
},
"details": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.",
"id": "GHSA-8p3x-34c5-5pmx",
"modified": "2022-12-13T21:30:28Z",
"published": "2022-05-24T16:45:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1649"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"type": "WEB",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/108350"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
VAR-201905-0502
Vulnerability from variot - Updated: 2024-11-23 22:41A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform. Cisco's Trust Anchor module (TAm) can be bypassed through manipulating the bitstream of the Field Programmable Gate Array (FPGA). Additionally, Cisco's IOS XE web UI improperly sanitizes user-input, and could allow an authenticated, remote attack to execute commands. An authenticated, remote attacker could execute commands as root on the vulnerable device. A local attacker can leverage this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. This issue is being tracked by Cisco Bug IDsCSCvn77141, CSCvn77142,CSCvn77143,CSCvn77147, CSCvn77150, CSCvn77151, CSCvn77152, CSCvn77153, CSCvn77154, CSCvn77155,CSCvn77156, CSCvn77158, CSCvn77159, CSCvn77160, CSCvn77162, CSCvn77166, CSCvn77167, CSCvn77168, CSCvn77169, CSCvn77170, CSCvn77171, CSCvn77172, CSCvn77175, CSCvn77180, CSCvn77181, CSCvn77182, CSCvn77183, CSCvn77184, CSCvn77185, CSCvn77191, CSCvn77201, CSCvn77202, CSCvn77205, CSCvn77207, CSCvn77209, CSCvn77212, CSCvn77219, CSCvn77220, CSCvn77245, CSCvn77246, CSCvn77248, CSCvn77249, CSCvn89137, CSCvn89138, CSCvn89140, CSCvn89143, CSCvn89144, CSCvn89145, CSCvn89146,CSCvn89150, and CSCvp42792. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201905-0502",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios xe",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "16.7.0"
},
{
"model": "asr 1001",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.0.0"
},
{
"model": "supervisor b\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "15454-m-wse-k9",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "11.1"
},
{
"model": "ios",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9"
},
{
"model": "integrated services router t1\\/e1 voice and wan network interface modules",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7"
},
{
"model": "encs 5400",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "ios xe",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "16.2.1"
},
{
"model": "ios xe",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1"
},
{
"model": "catalyst 9800-80 wireless controller",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "ios xe",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "16.4.0"
},
{
"model": "ios",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m4b"
},
{
"model": "ios",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m6b"
},
{
"model": "supervisor a\\+",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios xe",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "15.5\\(1\\)sy4"
},
{
"model": "analog voice network interface modules",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "integrated services router 4300",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.1"
},
{
"model": "ios",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m2a"
},
{
"model": "ios xr",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.1.1"
},
{
"model": "asr 1000 series",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "integrated services router 4400",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.1"
},
{
"model": "nx-os",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "9.3\\(2\\)"
},
{
"model": "ios xr",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.0.1"
},
{
"model": "ios xe",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.9"
},
{
"model": "ios xe",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.4"
},
{
"model": "ios",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "15.7\\(3\\)m5"
},
{
"model": "firepower 9000",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.0.18"
},
{
"model": "sm-x-1t3\\/e3",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "ios xe",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.7"
},
{
"model": "ios xe",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10"
},
{
"model": "encs 5100",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "firepower 2100",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.6.1.134"
},
{
"model": "ncs2k-mr-mxp-k9",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "11.1"
},
{
"model": "ios",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8\\(3\\)m3"
},
{
"model": "industrial security appliances 3000",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.0.05"
},
{
"model": "ons 15454 mstp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "11.1"
},
{
"model": "ic3000-k9",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.0.2"
},
{
"model": "ios",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "15.6\\(3\\)m7"
},
{
"model": "catalyst 9800-40 wireless controller",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "ios",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "15.9\\(3\\)m"
},
{
"model": "asa 5500",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.1.15"
},
{
"model": "firepower 4000",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.0.18"
},
{
"model": "integrated services router 4200",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.1"
},
{
"model": "ios xe",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.0"
},
{
"model": "nx-os",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "8.4.1"
},
{
"model": "ios",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "15.8"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "15454 m wse k9",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "analog voice network interface modules",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "asa 5500",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "firepower 2100",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "firepower 4000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "firepower 9000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "integrated services router t1/e1 voice and wan network interface modules",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "ons 15454 mstp",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "supervisor a+",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "supervisor b+",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "trust anchor module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "packet-over-t3/e3 service module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "95000"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "93000"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "92000"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "90000"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70000"
},
{
"model": "nexus 3264c-e switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "nexus 3132c-z switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "nexus 31108tc-v",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "nexus 31108pc-v",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "network convergence system series routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "55000"
},
{
"model": "network convergence system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "50020"
},
{
"model": "network convergence system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "50010"
},
{
"model": "network convergence system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "10020"
},
{
"model": "ncs series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2000"
},
{
"model": "mds",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9000"
},
{
"model": "ic3000 industrial compute gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "firepower series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "90000"
},
{
"model": "firepower series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "40000"
},
{
"model": "firepower series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "21000"
},
{
"model": "connected grid routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "cbr-8 converged broadband router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "catalyst wireless controller",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9800-800"
},
{
"model": "catalyst wireless controller",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9800-400"
},
{
"model": "catalyst",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "96000"
},
{
"model": "catalyst series switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "95000"
},
{
"model": "catalyst series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "93000"
},
{
"model": "catalyst",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "68000"
},
{
"model": "asr series aggregation services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9200"
},
{
"model": "asr series aggregation services routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "90000"
},
{
"model": "asr route switch processor",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "90030"
},
{
"model": "asr route switch processor",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "90020"
},
{
"model": "asr series routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "10000"
},
{
"model": "asa series with firepower services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5500-x0"
},
{
"model": "asa series with firepower service",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5500-x5.3"
},
{
"model": "analog voice network interface module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "industrial integrated services routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "8290"
},
{
"model": "industrial integrated services routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "8090"
},
{
"model": "series enterprise network compute system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "50000"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "44610"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4451-x0"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "44310"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "43510"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "43310"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "43210"
},
{
"model": "integrated services router",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "42210"
},
{
"model": "series integrated services routers",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "40000"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4000"
},
{
"model": "series industrial security appliances",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30000"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#400865"
},
{
"db": "BID",
"id": "108350"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:15454-m-wse-k9_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:analog_voice_network_interface_modules_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:asa_5500_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:firepower_2100_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:firepower_4000_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:firepower_9000_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:integrated_services_router_t1%2fe1_voice_and_wan_network_interface_modules",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ons_15454_mstp_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:supervisor_a%2b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:supervisor_b%2b_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Richard Housley (Research Scientist),This vulnerability was publicly disclosed by Red Balloon Security on May 13,atin Kataria (Principal Research Scientist), and Dr. Ang Cui (Chief Scientist) of Red Balloon Security, 2019. The Cisco Product Security Incident Response Team (PSIRT) is aware of the existence of proof-of-concept code that demonstrates this vulnerability on the Cisco ASR 1001-X. There are no indications at this time that this proof-of-concept code is publicly available. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
}
],
"trust": 0.6
},
"cve": "CVE-2019-1649",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-1649",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-148641",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ykramarz@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2019-1649",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2019-1649",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-1649",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2019-1649",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-1649",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201905-340",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-148641",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-1649",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-148641"
},
{
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform. Cisco\u0027s Trust Anchor module (TAm) can be bypassed through manipulating the bitstream of the Field Programmable Gate Array (FPGA). Additionally, Cisco\u0027s IOS XE web UI improperly sanitizes user-input, and could allow an authenticated, remote attack to execute commands. An authenticated, remote attacker could execute commands as root on the vulnerable device. \nA local attacker can leverage this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. \nThis issue is being tracked by Cisco Bug IDsCSCvn77141, CSCvn77142,CSCvn77143,CSCvn77147, CSCvn77150, CSCvn77151, CSCvn77152, CSCvn77153, CSCvn77154, CSCvn77155,CSCvn77156, CSCvn77158, CSCvn77159, CSCvn77160, CSCvn77162, CSCvn77166, CSCvn77167, CSCvn77168, CSCvn77169, CSCvn77170, CSCvn77171, CSCvn77172, CSCvn77175, CSCvn77180, CSCvn77181, CSCvn77182, CSCvn77183, CSCvn77184, CSCvn77185, CSCvn77191, CSCvn77201, CSCvn77202, CSCvn77205, CSCvn77207, CSCvn77209, CSCvn77212, CSCvn77219, CSCvn77220, CSCvn77245, CSCvn77246, CSCvn77248, CSCvn77249, CSCvn89137, CSCvn89138, CSCvn89140, CSCvn89143, CSCvn89144, CSCvn89145, CSCvn89146,CSCvn89150, and CSCvp42792. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-1649"
},
{
"db": "CERT/CC",
"id": "VU#400865"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "BID",
"id": "108350"
},
{
"db": "VULHUB",
"id": "VHN-148641"
},
{
"db": "VULMON",
"id": "CVE-2019-1649"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#400865",
"trust": 3.7
},
{
"db": "NVD",
"id": "CVE-2019-1649",
"trust": 2.9
},
{
"db": "BID",
"id": "108350",
"trust": 2.1
},
{
"db": "ICS CERT",
"id": "ICSA-20-072-03",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU97735735",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201905-340",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.1680.6",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.1680.16",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.1680.5",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-148641",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-1649",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#400865"
},
{
"db": "VULHUB",
"id": "VHN-148641"
},
{
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"db": "BID",
"id": "108350"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"id": "VAR-201905-0502",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-148641"
}
],
"trust": 0.6676529776470588
},
"last_update_date": "2024-11-23T22:41:30.267000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20190513-secureboot",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"title": "The Register",
"trust": 0.2,
"url": "https://www.theregister.co.uk/2019/08/22/cisco_patch_bundle/"
},
{
"title": "The Register",
"trust": 0.2,
"url": "https://www.theregister.co.uk/2019/05/13/cisco_thrangrycat_vulnerability/"
},
{
"title": "Cisco: Cisco Secure Boot Hardware Tampering Vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20190513-secureboot"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/Live-Hack-CVE/CVE-2019-1649 "
},
{
"title": "sec-daily-2019",
"trust": 0.1,
"url": "https://github.com/alphaSeclab/sec-daily-2019 "
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/cisco-patch-firmware/144936/"
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/cisco-webex-remote-code-execution/144805/"
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/cisco-bugs-unpatched-millions-devices/144692/"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.9
},
{
"problemtype": "CWE-667",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-148641"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190513-secureboot"
},
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/108350"
},
{
"trust": 1.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
},
{
"trust": 1.7,
"url": "https://www.kb.cert.org/vuls/id/400865/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-1649"
},
{
"trust": 1.3,
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"trust": 0.9,
"url": "http://www.cisco.com/"
},
{
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190513-webui"
},
{
"trust": 0.8,
"url": "https://thrangrycat.com/"
},
{
"trust": 0.8,
"url": "https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html"
},
{
"trust": 0.8,
"url": "https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1649"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu97735735/"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/cisco-overwrite-of-the-firmware-image-29281"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.1680.5/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/80766"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.1680.6/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/667.html"
},
{
"trust": 0.1,
"url": "https://github.com/live-hack-cve/cve-2019-1649"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.theregister.co.uk/2019/05/13/cisco_thrangrycat_vulnerability/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#400865"
},
{
"db": "VULHUB",
"id": "VHN-148641"
},
{
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"db": "BID",
"id": "108350"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#400865"
},
{
"db": "VULHUB",
"id": "VHN-148641"
},
{
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"db": "BID",
"id": "108350"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
},
{
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-05-14T00:00:00",
"db": "CERT/CC",
"id": "VU#400865"
},
{
"date": "2019-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-148641"
},
{
"date": "2019-05-13T00:00:00",
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"date": "2019-05-13T00:00:00",
"db": "BID",
"id": "108350"
},
{
"date": "2019-06-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"date": "2019-05-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-340"
},
{
"date": "2019-05-13T19:29:01.520000",
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-05-16T00:00:00",
"db": "CERT/CC",
"id": "VU#400865"
},
{
"date": "2022-12-13T00:00:00",
"db": "VULHUB",
"id": "VHN-148641"
},
{
"date": "2022-12-13T00:00:00",
"db": "VULMON",
"id": "CVE-2019-1649"
},
{
"date": "2019-05-13T00:00:00",
"db": "BID",
"id": "108350"
},
{
"date": "2019-06-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-004636"
},
{
"date": "2020-10-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-340"
},
{
"date": "2024-11-21T04:37:00.627000",
"db": "NVD",
"id": "CVE-2019-1649"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "108350"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Trust Anchor module (TAm) improperly checks code and Cisco IOS XE web UI does not sanitize user input",
"sources": [
{
"db": "CERT/CC",
"id": "VU#400865"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-340"
}
],
"trust": 0.6
}
}
ICSA-20-072-03
Vulnerability from csaf_cisa - Published: 2020-03-12 00:00 - Updated: 2020-03-12 00:00| URL | Category | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"document": {
"acknowledgments": [
{
"organization": "Cisco Systems, Inc",
"summary": "reporting this vulnerability to Rockwell Automation"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of this vulnerability could allow an attacker to write a modified image to the component.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-20-072-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-072-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-072-03 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-072-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-072-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Rockwell Automation Allen-Bradley Stratix 5950",
"tracking": {
"current_release_date": "2020-03-12T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-072-03",
"initial_release_date": "2020-03-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2020-03-12T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-20-072-03 Rockwell Automation Allen-Bradley Stratix 5950"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1783-SAD4T0SBK9",
"product": {
"name": "Allen-Bradley Stratix 5950: 1783-SAD4T0SBK9",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Allen-Bradley Stratix 5950"
},
{
"branches": [
{
"category": "product_version",
"name": "1783-SAD2T2SPK9",
"product": {
"name": "Allen-Bradley Stratix 5950: 1783-SAD2T2SPK9",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Allen-Bradley Stratix 5950"
},
{
"branches": [
{
"category": "product_version",
"name": "1783-SAD2T2SBK9",
"product": {
"name": "Allen-Bradley Stratix 5950: 1783-SAD2T2SBK9",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Allen-Bradley Stratix 5950"
},
{
"branches": [
{
"category": "product_version",
"name": "1783-SAD4T0SPK9",
"product": {
"name": "Allen-Bradley Stratix 5950: 1783-SAD4T0SPK9",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Allen-Bradley Stratix 5950"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-1649",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write their own modified firmware image to the affected component.CVE-2019-1649 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1649"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users update to firmware version FRN v6.4.0, which addresses the reported vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026mode=3\u0026refSoft=1\u0026versions=55706"
},
{
"category": "mitigation",
"details": "Utilize proper network infrastructure controls, such as firewalls, to help ensure that requests from unauthorized sources are blocked and the controls are isolated from the business network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Consult the product documentation for specific features, such as access control lists and deep packet inspection, that may be used to block unauthorized changes, etc.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Block all traffic to EtherNet/IP or other CIP protocol-based devices from outside the manufacturing zone by blocking or restricting access to TCP and UDP Port 2222 and Port 44818, using proper network infrastructure controls such as firewalls, UTM devices, or other security appliances. For more information on TCP/UDP ports used by Rockwell Automation products, see Knowledgebase Article ID 898270.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/898270"
},
{
"category": "mitigation",
"details": "Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
}
]
}
FKIE_CVE-2019-1649
Vulnerability from fkie_nvd - Published: 2019-05-13 19:29 - Updated: 2024-11-21 04:37| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/108350 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | Vendor Advisory | |
| psirt@cisco.com | https://www.kb.cert.org/vuls/id/400865 | Third Party Advisory, US Government Resource | |
| psirt@cisco.com | https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108350 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/400865 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asa_5500_firmware | * | |
| cisco | asa_5506-x | - | |
| cisco | asa_5506h-x | - | |
| cisco | asa_5506w-x | - | |
| cisco | asa_5508-x | - | |
| cisco | asa_5516-x | - | |
| cisco | firepower_2100_firmware | * | |
| cisco | firepower_2110 | - | |
| cisco | firepower_2120 | - | |
| cisco | firepower_2130 | - | |
| cisco | firepower_2140 | - | |
| cisco | firepower_4000_firmware | * | |
| cisco | firepower_4110 | - | |
| cisco | firepower_4120 | - | |
| cisco | firepower_4140 | - | |
| cisco | firepower_4150 | - | |
| cisco | firepower_9000_firmware | * | |
| cisco | firepower_9300 | - | |
| cisco | ons_15454_mstp_firmware | * | |
| cisco | ons_15454_mstp | - | |
| cisco | analog_voice_network_interface_modules_firmware | * | |
| cisco | nim-2bri-nt\/te | - | |
| cisco | nim-2fox | - | |
| cisco | nim-2fxs | - | |
| cisco | nim-2fxs\/4fxo | - | |
| cisco | nim-2fxs\/4fxop | - | |
| cisco | nim-2fxsp | - | |
| cisco | nim-4bri-nt\/te | - | |
| cisco | nim-4e\/m | - | |
| cisco | nim-4fxo | - | |
| cisco | nim-4fxs | - | |
| cisco | nim-4fxsp | - | |
| cisco | integrated_services_router_t1\/e1_voice_and_wan_network_interface_modules_firmware | * | |
| cisco | nim-1ce1t1-pri | - | |
| cisco | nim-1mft-t1\/e1 | - | |
| cisco | nim-2ce1t1-pri | - | |
| cisco | nim-2mft-t1\/e1 | - | |
| cisco | nim-4mft-t1\/e1 | - | |
| cisco | nim-8ce1t1-pri | - | |
| cisco | nim-8mft-t1\/e1 | - | |
| cisco | supervisor_a\+_firmware | * | |
| cisco | n9k-sup-a\+ | - | |
| cisco | supervisor_b\+_firmware | * | |
| cisco | n9k-sup-b\+ | - | |
| cisco | 15454-m-wse-k9_firmware | * | |
| cisco | 15454-m-wse-k9 | - | |
| cisco | ios_xe | * | |
| cisco | cbr-8_converged_broadband_router | - | |
| cisco | ios_xe | * | |
| cisco | ios_xe | * | |
| cisco | ios_xe | * | |
| cisco | ios_xe | * | |
| cisco | nim-1ge-cu-sfp | - | |
| cisco | nim-2ge-cu-sfp | - | |
| cisco | sm-x-pvdm-1000 | - | |
| cisco | sm-x-pvdm-2000 | - | |
| cisco | sm-x-pvdm-3000 | - | |
| cisco | sm-x-pvdm-500 | - | |
| cisco | ios | * | |
| cisco | ios | * | |
| cisco | ios | * | |
| cisco | ios | * | |
| cisco | 1120_connected_grid_router | - | |
| cisco | 1240_connected_grid_router | - | |
| cisco | industrial_security_appliances_3000_firmware | * | |
| cisco | industrial_security_appliances_3000 | - | |
| cisco | integrated_services_router_4200_firmware | * | |
| cisco | 4221_integrated_services_router | - | |
| cisco | integrated_services_router_4300_firmware | * | |
| cisco | 4321_integrated_services_router | - | |
| cisco | 4331_integrated_services_router | - | |
| cisco | 4351_integrated_services_router | - | |
| cisco | integrated_services_router_4400_firmware | * | |
| cisco | 4431_integrated_services_router | - | |
| cisco | 44461_integrated_services_router | - | |
| cisco | 4451-x_integrated_services_router | - | |
| cisco | ios | * | |
| cisco | ios | * | |
| cisco | ios | * | |
| cisco | 809_industrial_integrated_services_routers | - | |
| cisco | 829_industrial_integrated_services_routers | - | |
| cisco | asr_1000_series_firmware | * | |
| cisco | asr_1000-esp100 | - | |
| cisco | asr_1000_series | - | |
| cisco | asr1000-2t\+20x1ge | - | |
| cisco | asr1000-6tge | - | |
| cisco | asr1000-esp200 | - | |
| cisco | asr1000-mip100 | - | |
| cisco | asr1000-rp3 | - | |
| cisco | asr_1001_firmware | 16.0.0 | |
| cisco | asr_1001-hx | - | |
| cisco | asr_1001-x | - | |
| cisco | asr_1002-hx | - | |
| cisco | ios_xe | * | |
| cisco | a900-rsp2a-128 | - | |
| cisco | a900-rsp2a-64 | - | |
| cisco | a900-rsp3c-200 | - | |
| cisco | a900-rsp3c-400\/w | - | |
| cisco | asr-920-10sz-pd | - | |
| cisco | asr-920-12cz-a | - | |
| cisco | asr-920-12cz-d | - | |
| cisco | asr-920-12sz-a | - | |
| cisco | asr-920-12sz-d | - | |
| cisco | asr-920-12sz-im-cc | - | |
| cisco | asr-920-24sz-m | - | |
| cisco | asr-920-24tz-im | - | |
| cisco | asr-920-24tz-m | - | |
| cisco | asr-920-4sz-a | - | |
| cisco | asr-920-4sz-d | - | |
| cisco | c9300-24p | - | |
| cisco | c9300-24t | - | |
| cisco | c9300-24u | - | |
| cisco | c9300-24ux | - | |
| cisco | c9300-48p | - | |
| cisco | c9300-48t | - | |
| cisco | c9300-48u | - | |
| cisco | c9300-48un | - | |
| cisco | c9300-48uxm | - | |
| cisco | catalyst_9600_supervisor_engine-1 | - | |
| cisco | cbr-ccap-lc-40g-r | - | |
| cisco | cbr-lc-8d31-16u31 | - | |
| cisco | ios_xr | 7.0.1 | |
| cisco | a99-16x100ge-x-se | - | |
| cisco | a99-32x100ge-cm | - | |
| cisco | a99-32x100ge-tr | - | |
| cisco | a99-rp3-se | - | |
| cisco | a99-rp3-tr | - | |
| cisco | a9k-16x100ge-cm | - | |
| cisco | a9k-16x100ge-tr | - | |
| cisco | a9k-rsp5-se | - | |
| cisco | a9k-rsp5-tr | - | |
| cisco | network_convergence_system_1002 | - | |
| cisco | ios_xe | * | |
| cisco | c6800-16p10g-xl | - | |
| cisco | c6800-32p10g-xl | - | |
| cisco | c6800-8p10g-xl | - | |
| cisco | c6800-8p40g-xl | - | |
| cisco | c6800-sup6t-xl | - | |
| cisco | c6816-x-le | - | |
| cisco | c6824-x-le-40g | - | |
| cisco | c6832-x-le | - | |
| cisco | c6840-x-le-40g | - | |
| cisco | ios_xe | * | |
| cisco | ios_xe | * | |
| cisco | c9500-12q | - | |
| cisco | c9500-16x | - | |
| cisco | c9500-24q | - | |
| cisco | c9500-24y4c | - | |
| cisco | c9500-32c | - | |
| cisco | c9500-32qc | - | |
| cisco | c9500-40x | - | |
| cisco | c9500-48y4c | - | |
| cisco | catalyst_9800-40_wireless_controller_firmware | - | |
| cisco | catalyst_9800-40_wireless_controller | - | |
| cisco | catalyst_9800-80_wireless_controller_firmware | - | |
| cisco | catalyst_9800-80_wireless_controller | - | |
| cisco | ic3000-k9_firmware | * | |
| cisco | ic3000-k9 | - | |
| cisco | nx-os | * | |
| cisco | ds-x9334-k9 | - | |
| cisco | ncs2k-mr-mxp-k9_firmware | * | |
| cisco | ncs2k-mr-mxp-k9 | - | |
| cisco | ios_xr | 7.1.1 | |
| cisco | nc55-24h12f-se | - | |
| cisco | nc55-36x100g-a-se | - | |
| cisco | nc55-36x100g-s | - | |
| cisco | nc55-5504-fc | - | |
| cisco | nc55-5516-fc | - | |
| cisco | nc55-6x200-dwdm-s | - | |
| cisco | nc55-mod-a-s | - | |
| cisco | ncs-5501 | - | |
| cisco | ncs-5501-se | - | |
| cisco | ncs-5502 | - | |
| cisco | ncs-5502-se | - | |
| cisco | ncs-55a1-24h | - | |
| cisco | ncs-55a1-36h-s | - | |
| cisco | ncs-55a1-36h-se | - | |
| cisco | ncs-55a2-mod-hd-s | - | |
| cisco | ncs-55a2-mod-hx-s | - | |
| cisco | ncs-55a2-mod-s | - | |
| cisco | ncs-55a2-mod-se-h-s | - | |
| cisco | ncs-55a2-mod-se-s | - | |
| cisco | network_convergence_system_5001 | - | |
| cisco | network_convergence_system_5002 | - | |
| cisco | nx-os | * | |
| cisco | n3k-c31108pc-v | - | |
| cisco | n3k-c31108tc-v | - | |
| cisco | n3k-c3132c-z | - | |
| cisco | n3k-c3264c-e | - | |
| cisco | n9k-c92300yc | - | |
| cisco | n9k-c93108tc-ex | - | |
| cisco | n9k-c93108tc-fx | - | |
| cisco | n9k-c93180lc-ex | - | |
| cisco | n9k-c93180yc-ex | - | |
| cisco | n9k-c93180yc-fx | - | |
| cisco | n9k-c93240yc-fx2 | - | |
| cisco | n9k-c9348gc-fxp | - | |
| cisco | nx-os | * | |
| cisco | ds-x9648-1536k9 | - | |
| cisco | n3k-c3264c-e | - | |
| cisco | n77-m312cq-26l | - | |
| cisco | n77-m348xp-23l | - | |
| cisco | n77-sup3e | - | |
| cisco | n7k-m324fq-25l | - | |
| cisco | n7k-m348xp-25l | - | |
| cisco | sm-x-1t3\/e3_firmware | - | |
| cisco | sm-x-1t3\/e3 | - | |
| cisco | encs_5100_firmware | - | |
| cisco | encs_5100 | - | |
| cisco | encs_5400_firmware | - | |
| cisco | encs_5400 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "524E28A1-ABD9-416B-804C-EFFD7F822DE5",
"versionEndExcluding": "1.1.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "763B801D-CA1E-4C56-8B06-3373EA307C7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30AC6907-3091-409F-967D-64A82A0C5A8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92AE506A-E710-465B-B795-470FDE0E0ECA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32B7016C-C909-4F30-A80E-E30E9C2FB607",
"versionEndExcluding": "2.6.1.134",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52D96810-5F79-4A83-B8CA-D015790FCF72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16FE2945-4975-4003-AE48-7E134E167A7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "976901BF-C52C-4F81-956A-711AF8A60140",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B8DB36E-D0AC-4FFC-8FDB-C5520689013A",
"versionEndExcluding": "1.0.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E924AE61-94D5-4A68-A586-CA7119487F67",
"versionEndExcluding": "1.0.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07DAFDDA-718B-4B69-A524-B0CEB80FE960",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F8A7F11-B920-4C5B-B3CA-D29740FFE891",
"versionEndExcluding": "11.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEBE1DDE-6C69-45EC-A666-D9596E8721DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*",
"matchCriteriaId": "00BCB49E-E2D2-4374-8D48-A287FC538F4A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637D7CA3-89CD-418A-BF87-0935A7805173",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBE2B16-B9AD-4ED2-AE18-7087C478FEEC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D94B415B-08E2-4845-BD11-7EBCD08215E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "784ECC2E-F4AC-4430-9F33-9B1DBD89692F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A34FAE4-7B2A-47BF-AB0A-5FAF8E8920CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FADBF85-52F4-468C-A44C-5107484757EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90E418C4-F91B-4E0D-B1DC-2B099D991F80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E22A4B07-04DF-4AF2-B2A9-E4430C4F3A64",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDCD640-E1BB-48F8-BEB4-85AAF7099FA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "893147FC-1AD0-441C-B031-6C432ED2FFD8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE30FCF9-DFF6-419C-8DCA-0B695E3FADE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*",
"matchCriteriaId": "239EC4DE-5E2C-44D7-9C32-BFCD854670AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2956624-92FC-43D7-A038-15071A90E0B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "988125C4-DB88-438F-8F6D-0992424081A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9B34B9-78EC-49AE-B342-F2BAD63CD50C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D258F96-93A5-455E-9542-2C95B3D31455",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B443FC34-767F-45B4-8516-A1A8B6C8D917",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08C3403A-3943-4A69-A536-3FA6DEDFF21B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7259F6BC-BA31-47E4-BFA6-647068A946CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
"matchCriteriaId": "3F825D9C-25C6-4F76-A7EE-F61A548A0CE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "360B9A25-5272-487A-AF1A-CE2FDFD6F23C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
"matchCriteriaId": "77C59A0F-F256-42C3-A3E1-71F02614F55A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADE8708-95D4-4D30-85ED-BE870410F3B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F99FC1A-2738-468B-BD01-4F715A1B7809",
"versionEndExcluding": "11.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90242967-37AB-4124-87DE-D826A3895BE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB99D062-EE0C-4695-AA4D-2DCE3E2B15AF",
"versionEndExcluding": "16.12.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6CCBE67-E509-43EC-9AFB-8A9B6A115126",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39C9F8C2-9E34-4027-9112-42AEC0B84F7C",
"versionEndExcluding": "16.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76843179-3569-4556-9F4C-6543B8A8E1DE",
"versionEndExcluding": "16.6.7",
"versionStartIncluding": "16.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B526102-9DDC-4E23-B582-DEF7EA35E42C",
"versionEndExcluding": "16.9.4",
"versionStartIncluding": "16.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F50DDAE4-2C87-4B8B-9BCB-2FD32A6976D6",
"versionEndExcluding": "16.12.1",
"versionStartIncluding": "16.10.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C56A1D02-3061-40C5-AD87-0BEA869838F4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F98C767-8E9F-4B01-A09E-359A496B2B3A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCAA286-6B36-4EB7-9AE5-CA082D125E78",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B1C2CF-0EF1-428F-8FB8-D45E4C6CB340",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "450EA21E-68E0-4617-85A9-9C39B96E12ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17B65497-2EAC-4B9E-9D05-58A0B6D1F399",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35726753-BAA4-479F-AF9C-F4D012881F83",
"versionEndExcluding": "15.6\\(3\\)m7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A3FBAE1-F786-4799-AF70-6E7B5DC19BB9",
"versionEndIncluding": "15.7\\(3\\)m5",
"versionStartIncluding": "15.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72240B45-0D8E-4EA6-8208-068BF6EF8B30",
"versionEndExcluding": "15.8\\(3\\)m3",
"versionStartIncluding": "15.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F56D01-F647-452D-A564-4198A893BC70",
"versionEndExcluding": "15.9\\(3\\)m",
"versionStartIncluding": "15.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83AA5C75-B959-4167-906C-BE9C84C7E676",
"versionEndExcluding": "1.0.05",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FBBA8E7-14B2-4869-8ED4-72F120E547FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB084F19-E475-41FA-A72F-23D4D6913523",
"versionEndExcluding": "1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C49E8AE0-745B-459C-AAD9-D41690D48DDE",
"versionEndExcluding": "1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC5D8FF8-60F8-4F89-A488-F815D0FB00E1",
"versionEndExcluding": "1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BEF89-6D9B-4870-BE85-9090152F3E6E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13C3D17D-DD95-49CA-918A-A0F5289B0C3D",
"versionEndExcluding": "15.6\\(3\\)m6b",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA254534-247F-47BA-B146-0E3B7E9F9269",
"versionEndIncluding": "15.7\\(3\\)m4b",
"versionStartIncluding": "15.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F05F3A-A38F-4922-AE54-BE1BC64C4B7C",
"versionEndExcluding": "15.8\\(3\\)m2a",
"versionStartIncluding": "15.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C996F3B-0333-4B9A-B3E7-F50E64B0AAB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D05CC9-8D04-4DE0-A854-375192B4D46C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64C3BBBB-4349-4D2B-9944-84BE03407650",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76B7C13F-46C5-460A-A6C9-3837A28A0CE2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB060D83-2924-4D1D-9FEE-F8087FA8976D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF4D0E5-FF09-4919-B603-B42DB535386C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22C36989-4353-4B81-8B0F-FC6322C1C179",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A267A86B-144D-46C3-9F63-95606106A5B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C807F789-3038-42C3-B5EB-6CD628EBF718",
"versionEndExcluding": "16.2.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2353D-A508-4764-975F-57F9DACD91FA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EBA765C-B6F0-4D4D-8933-06E655084AF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6F34E1-7DE4-459B-AF41-D973201ADC49",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DAC3AF-FEFC-4B14-A7BE-7008E65FD012",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B83BED-5A49-4CF0-9827-AA291D01F60E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C1E8937-51D9-43E6-876E-5D39AD3D32C4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA7AE63-99B9-4F28-8670-639A9B31E494",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E858B4AB-49B1-4F1C-8722-6E6911194924",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "577D1BF2-5180-4301-941C-3C0ADDD23AA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE70CCD-6062-45D8-8566-7C9E237E030F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA3A897-ED4E-417F-BA6C-C1A825A210F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "375F9E12-A61B-4FD3-AE07-D4E686EB112A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D724F932-4548-429D-8CAA-E82C3435A194",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16088337-C057-4271-B5C7-74FE1573B0F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A69B8AFD-17F5-4809-BDB9-3337BA52BC58",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A628A7B-FE58-4881-B705-C3BCBED6F201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9C769E-ED9C-4F06-928D-CC7FFBA54EC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B19A31-99E3-4141-9FE8-7A5FD16FAE5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB1DFCD7-F14A-4530-8E36-55FE0EE1E7C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84C89BB9-D62D-4E36-8BFD-D583F383120D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88262B7E-8C2F-49FE-9F58-8A1C78285A93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6109DBC-5489-4FF9-B940-E174126488AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA59279-3504-417D-9E86-E5886EE198BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C44B33A5-DB73-4A3B-AA5B-97B8493AD28B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB82552-DD9D-45C9-8296-B4C8D510FFA1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82AF763B-9299-4EDC-B42D-B83736839CA1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EA89F6-14B5-4EC7-BAEB-E783FF1982AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BF29D2-7C65-4724-B6AE-249BB22725CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D55DC09B-CF82-4461-8886-BE90451BFF9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F393681D-7EC1-46D5-BAFB-786528E259B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE8CE5B-09CF-4138-9495-7223FFA64443",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15AEC57E-7851-4C8D-AB02-A932C3929F26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B14DB778-9B07-4AFF-8BF3-4631B23501BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326F9936-57E7-4E8F-9C51-093788454A3A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D54F012-3136-4CA8-B119-FD7446EC96C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0514874D-C8F0-496E-9B04-FA699B339EEE",
"versionEndExcluding": "15.5\\(1\\)sy4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F508C81E-D31B-44BA-82C8-FEDA00324B8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05A9E0CA-BB70-4F74-BAD6-BE80669D1699",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAE1989-0E75-414E-BCB3-E0057F1492E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A1BA05-615E-4304-992D-6EEA176D852F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D883A807-6909-4087-892B-1E505521EA7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2D76C8-552A-44C2-9C30-0CF31F6BC719",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "649A1287-A03D-48B8-ADFA-26F175366C91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8776111D-894D-4EEB-8ADD-A9AC26AE30D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "975D2EC3-3499-48FD-87F2-4BAD1CDB0E4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27ACCA11-D39B-468E-9C3C-BBF110ED3581",
"versionEndExcluding": "16.9.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB36C23-9303-4E3D-8C4A-B2E2150CF3FE",
"versionEndExcluding": "16.12.1",
"versionStartIncluding": "16.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03F5F6FA-9499-4232-A80A-494CE287A87A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58918BAA-7070-4901-B1C8-344E8A4DBEE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C809A939-105E-471E-A150-859015641989",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C657B7-172E-4E85-8027-4B5563F2CE14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B42926F-0841-4D40-BABE-852893C6020F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "381144D6-7CDE-46E6-ADE7-76372740F283",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "902D1451-9E2E-4BC3-8B61-D87C142F4485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E283C34-43AE-49A5-A72B-32DEA185ABD3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59CD23DF-9B9D-459F-A3BF-F2D53FBDAF71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB3AF13-5324-42CD-8EDB-6F730BF46214",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13174CD9-8564-4041-93EC-8E8D7F4F3443",
"versionEndExcluding": "1.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B443B2C3-E3C1-4ADF-BF9B-164D00318B08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053",
"versionEndExcluding": "8.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE54217-EF6D-4191-9267-113041B14A08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DE58C19-66CD-45DD-BF5C-C333A30AA096",
"versionEndExcluding": "11.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFF3999-1FF6-42C0-BE62-3FA227297264",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "966F7DF8-1F20-4A74-B633-8B5AEE63C193",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46EA0E17-C399-4DA0-A550-F5469CC82F3F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41C4BF85-7077-463B-8E52-F67949849123",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9102353-A21A-41C2-AA0B-9B00F66B693E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1536A363-E423-42DD-928B-FC6E91264371",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB4F5CA4-BBD2-4DC9-8F99-9CC1B2A90BF2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2442B13-F163-4219-AED9-7FA4CCD1A8D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7617BA24-6474-49CF-B78D-0056D3F8385B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "344675F6-9045-492D-9577-E0CE333AD6E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7F2221-B5BE-408C-BA84-9776469EE2D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8D61548-61B4-4B53-8574-9DB92B00A627",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF08FAF-67DD-4361-947A-40D5938DB8BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE2AD36-5D52-4489-AAC1-A7AC1B3D2581",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A95FEA95-703B-44E0-A7CA-9E38B2EB1980",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D37BF94-9D5F-4A88-8115-3A88FF144845",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C33F0D81-1314-440B-9FC2-56D76CA4CD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E50806D-115D-4903-A5B2-62654FFDD9F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15AE071E-0CEF-4305-A92D-9F4C324BD4ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E007368-04AF-49C7-892F-ED2BB1E4EA61",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DBEF775-EC98-4391-BAD2-61870A7DEE88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68A586A3-0291-4BA3-9211-6EE0BBB7F39C",
"versionEndExcluding": "9.3\\(2\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AEB8547-3FA8-42F5-8106-57B0F994BEC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D2069C-23A2-4113-B674-024D36E40BDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*",
"matchCriteriaId": "572F9105-9B6C-4460-8B49-14812AC3DC28",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8EFEE8-FC8D-480C-917E-24C3B8D56E29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6487A95B-0D04-4ABA-B491-8A935694AFD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E84307-41BC-4F85-BC9A-FF02178765F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55A31452-5B60-4273-BA38-8FA684DED953",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3FCA39-927B-4C89-A58B-E6859ED8176A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7B464B3-DE25-4980-ABC3-10D7C79C12E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "214472EB-424C-48B7-8EF3-7B679A5042BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053",
"versionEndExcluding": "8.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E3CF0C-5AD0-4A30-9335-4945CBC04A60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6AC35C-29B2-42C7-862D-D9AC3461D8D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F33AB95C-62FC-48EC-84AB-5EFA5C061F3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D409BDF3-9F35-4D94-9DF0-7B58A519A005",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B12A01-8EF8-4DDE-9A40-51A9BC7D42AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "696AFE49-10E1-4C56-93D3-F4118B3E01AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6741CC-EEA4-4DC8-A21B-DB84B861316B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "678F3A32-372A-441E-8115-95181FBAF628",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF426F3E-4474-43C7-84F5-EF61957E5004",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01AE8153-6C23-46AB-BEAA-A6F27FDFEED7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la l\u00f3gica que maneja el control de acceso de uno de los componentes de hardware en la implementaci\u00f3n Secure Boot de propiedad de Cisco, podr\u00eda permitir que un atacante local autenticado escriba una imagen de firmware modificada en el componente. Esta vulnerabilidad afecta a varios productos de Cisco que admiten la funcionalidad de Secure Boot basada en hardware. La vulnerabilidad se genera por una comprobaci\u00f3n incorrecta en el \u00e1rea de c\u00f3digo que administra las actualizaciones en las instalaciones de Field Programmable Gate Array (FPGA) parte de la implementaci\u00f3n del hardware Secure Boot. Un atacante con privilegios elevados y acceso al sistema operativo subyacente que se ejecuta en el dispositivo afectado podr\u00eda explotar esta vulnerabilidad al escribir una imagen de firmware modificada en el FPGA. Una explotaci\u00f3n exitosa podr\u00eda hacer que el dispositivo se vuelva inutilizable (y requiera un reemplazo de hardware) o permitir la manipulaci\u00f3n del proceso de comprobaci\u00f3n de Secure Boot, que en algunas circunstancias puede permitir al atacante instalar y arrancar una imagen de software malicioso. Un atacante deber\u00e1 cumplir todas las condiciones siguientes para intentar explotar esta vulnerabilidad: Tener acceso administrativo privilegiado al dispositivo. Poder acceder al sistema operativo subyacente que se ejecuta en el dispositivo; Esto se puede lograr mediante el uso de un mecanismo documentado de soporte o mediante la explotaci\u00f3n de otra vulnerabilidad que proporcionar\u00eda a un atacante con dicho acceso. Desarrollar o tener acceso a un exploit espec\u00edfico de la plataforma. Un atacante que busque explotar esta vulnerabilidad en m\u00faltiples plataformas afectadas necesitar\u00e1 investigar cada una de esas plataformas y despu\u00e9s desarrollar una vulnerabilidad espec\u00edfica de la plataforma. Si bien el proceso de investigaci\u00f3n se podr\u00eda realizar en diferentes plataformas, es poco probable que una vulnerabilidad desarrollada para una plataforma de hardware determinada opere en una plataforma de hardware diferente."
}
],
"id": "CVE-2019-1649",
"lastModified": "2024-11-21T04:37:00.627",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-05-13T19:29:01.520",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108350"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-667"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2019-1649
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-1649",
"description": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.",
"id": "GSD-2019-1649"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-1649"
],
"details": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.",
"id": "GSD-2019-1649",
"modified": "2023-12-13T01:23:51.237953Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-05-13T17:30:00-0700",
"ID": "CVE-2019-1649",
"STATE": "PUBLIC",
"TITLE": "Cisco Secure Boot Hardware Tampering Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Routers",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_value": "16.12.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019. "
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"name": "VU#400865",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"name": "108350",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108350"
},
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
}
]
},
"source": {
"advisory": "cisco-sa-20190513-secureboot",
"defect": [
[
"CSCvn77141",
"CSCvn77142",
"CSCvn77143",
"CSCvn77147",
"CSCvn77150",
"CSCvn77151",
"CSCvn77152",
"CSCvn77153",
"CSCvn77154",
"CSCvn77155",
"CSCvn77156",
"CSCvn77158",
"CSCvn77159",
"CSCvn77160",
"CSCvn77162",
"CSCvn77166",
"CSCvn77167",
"CSCvn77168",
"CSCvn77169",
"CSCvn77170",
"CSCvn77171",
"CSCvn77172",
"CSCvn77175",
"CSCvn77178",
"CSCvn77180",
"CSCvn77181",
"CSCvn77182",
"CSCvn77183",
"CSCvn77184",
"CSCvn77185",
"CSCvn77191",
"CSCvn77201",
"CSCvn77202",
"CSCvn77205",
"CSCvn77207",
"CSCvn77209",
"CSCvn77212",
"CSCvn77219",
"CSCvn77220",
"CSCvn77222",
"CSCvn77245",
"CSCvn77246",
"CSCvn77248",
"CSCvn77249",
"CSCvn89137",
"CSCvn89138",
"CSCvn89140",
"CSCvn89143",
"CSCvn89144",
"CSCvn89145",
"CSCvn89146",
"CSCvn89150",
"CSCvp42792"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6.1.134",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.0.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.0.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.12.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.12.1",
"versionStartIncluding": "16.10.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.9.4",
"versionStartIncluding": "16.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.6.7",
"versionStartIncluding": "16.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.9\\(3\\)m",
"versionStartIncluding": "15.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.8\\(3\\)m3",
"versionStartIncluding": "15.8",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.7\\(3\\)m5",
"versionStartIncluding": "15.7",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.6\\(3\\)m7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.0.05",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.8\\(3\\)m2a",
"versionStartIncluding": "15.8",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.7\\(3\\)m4b",
"versionStartIncluding": "15.7",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.6\\(3\\)m6b",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.2.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.5\\(1\\)sy4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.12.1",
"versionStartIncluding": "16.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.9.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.0.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.4.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.3\\(2\\)",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.4.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2019-1649"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco\u0027s proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot"
},
{
"name": "VU#400865",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/400865"
},
{
"name": "108350",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108350"
},
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-12-13T19:42Z",
"publishedDate": "2019-05-13T19:29Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.