Refine your search
107 vulnerabilities found for Cisco IOS XR Software by Cisco
CVE-2026-20118 (GCVE-0-2026-20118)
Vulnerability from cvelistv5
Published
2026-03-11 16:31
Modified
2026-03-11 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-460 - Improper Cleanup on Thrown Exception
Summary
A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards and Cisco NCS 5700 Routers and Cisco IOS XR Software for Third Party Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preventing traffic from traversing the interface.
This vulnerability is due to the corruption of packets in specific cases when an EPNI Aligner interrupt is triggered while an affected device is experiencing heavy transit traffic. An attacker could exploit this vulnerability by sending a continuous flow of crafted packets to an interface of the affected device. A successful exploit could allow the attacker to cause persistent, heavy packet loss, resulting in a denial of service (DoS) condition.
Note: If active exploitation of this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider.
Cisco has assigned this security advisory a Security Impact Rating (SIR) of High rather than Medium as the score indicates. This change was made because the affected device operates within a critical network segment where compromise could lead to significant disruption or exposure, thereby elevating the overall risk beyond the base technical severity.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.9.1 Version: 7.10.1 Version: 7.9.2 Version: 7.11.1 Version: 7.10.2 Version: 24.1.1 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.3.1 Version: 24.4.1 Version: 24.2.11 Version: 24.2.2 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 25.1.1 Version: 24.3.20 Version: 24.4.2 Version: 25.1.2 Version: 24.3.30 Version: 24.4.30 Version: 24.2.21 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20118",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-11T17:05:28.107036Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T17:20:21.023Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "25.1.1"
},
{
"status": "affected",
"version": "24.3.20"
},
{
"status": "affected",
"version": "24.4.2"
},
{
"status": "affected",
"version": "25.1.2"
},
{
"status": "affected",
"version": "24.3.30"
},
{
"status": "affected",
"version": "24.4.30"
},
{
"status": "affected",
"version": "24.2.21"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards and Cisco NCS 5700 Routers and Cisco IOS XR Software for Third Party Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preventing traffic from traversing the interface.\r\n\r\nThis vulnerability is due to the corruption of packets in specific cases when an EPNI Aligner interrupt is triggered while an affected device is experiencing heavy transit traffic. An attacker could exploit this vulnerability by sending a continuous flow of crafted packets to an interface of the affected device. A successful exploit could allow the attacker to cause persistent, heavy packet loss, resulting in a denial of service (DoS) condition.\r\nNote: If active exploitation of this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider.\r\nCisco has assigned this security advisory a Security Impact Rating (SIR) of High rather than Medium as the score indicates. This change was made because the affected device operates within a critical network segment where compromise could lead to significant disruption or exposure, thereby elevating the overall risk beyond the base technical severity."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-460",
"description": "Improper Cleanup on Thrown Exception",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T16:31:32.117Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-xrncs-epni-int-dos-TWMffUsN",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN"
}
],
"source": {
"advisory": "cisco-sa-xrncs-epni-int-dos-TWMffUsN",
"defects": [
"CSCws66900"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS-XR NCS 5500 and NCS 5700 Egress Packet Network Interfaces Aligner Interrupt Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2026-20118",
"datePublished": "2026-03-11T16:31:32.117Z",
"dateReserved": "2025-10-08T11:59:15.376Z",
"dateUpdated": "2026-03-11T17:20:21.023Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-20046 (GCVE-0-2026-20046)
Vulnerability from cvelistv5
Published
2026-03-11 16:31
Modified
2026-03-12 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-264 - Permissions, Privileges, and Access Control
Summary
A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device.
This vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by using the CLI command to bypass the task group–based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on an affected device without authorization checks.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.6.1 Version: 6.5.3 Version: 7.0.1 Version: 6.5.1 Version: 6.5.2 Version: 6.6.2 Version: 6.6.25 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 7.0.2 Version: 7.1.2 Version: 7.2.1 Version: 6.6.4 Version: 7.3.1 Version: 7.4.1 Version: 7.2.2 Version: 7.3.2 Version: 7.5.1 Version: 7.6.1 Version: 7.5.2 Version: 7.3.4 Version: 7.3.3 Version: 7.4.2 Version: 7.7.1 Version: 7.6.2 Version: 7.8.1 Version: 7.7.2 Version: 7.9.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.10.1 Version: 7.7.21 Version: 7.9.2 Version: 7.5.5 Version: 7.11.1 Version: 7.10.2 Version: 7.3.6 Version: 24.1.1 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 24.4.2 Version: 25.1.1 Version: 24.3.20 Version: 25.2.1 Version: 25.1.2 Version: 24.3.30 Version: 24.2.21 Version: 25.1.30 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20046",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-11T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-12T03:55:36.546Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.2"
},
{
"status": "affected",
"version": "25.1.1"
},
{
"status": "affected",
"version": "24.3.20"
},
{
"status": "affected",
"version": "25.2.1"
},
{
"status": "affected",
"version": "25.1.2"
},
{
"status": "affected",
"version": "24.3.30"
},
{
"status": "affected",
"version": "24.2.21"
},
{
"status": "affected",
"version": "25.1.30"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device.\r\n\r\nThis vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by using the CLI command to bypass the task group\u0026ndash;based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on an affected device without authorization checks."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-264",
"description": "Permissions, Privileges, and Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T16:31:18.318Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-privesc-bF8D5U4W",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W"
}
],
"source": {
"advisory": "cisco-sa-iosxr-privesc-bF8D5U4W",
"defects": [
"CSCwp87543"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software CLI Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2026-20046",
"datePublished": "2026-03-11T16:31:18.318Z",
"dateReserved": "2025-10-08T11:59:15.354Z",
"dateUpdated": "2026-03-12T03:55:36.546Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-20074 (GCVE-0-2026-20074)
Vulnerability from cvelistv5
Published
2026-03-11 16:31
Modified
2026-03-11 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Summary
A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the IS-IS process to restart unexpectedly.
This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending crafted IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process to restart unexpectedly, resulting in a temporary loss of connectivity to advertised networks and a denial of service (DoS) condition.
Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.8.1 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.8.22 Version: 7.9.2 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 24.4.10 Version: 25.1.1 Version: 24.4.2 Version: 24.3.20 Version: 24.4.15 Version: 25.2.1 Version: 25.1.2 Version: 24.3.30 Version: 24.4.30 Version: 24.2.21 Version: 25.2.15 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20074",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-11T17:04:46.266844Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T17:20:21.640Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.10"
},
{
"status": "affected",
"version": "25.1.1"
},
{
"status": "affected",
"version": "24.4.2"
},
{
"status": "affected",
"version": "24.3.20"
},
{
"status": "affected",
"version": "24.4.15"
},
{
"status": "affected",
"version": "25.2.1"
},
{
"status": "affected",
"version": "25.1.2"
},
{
"status": "affected",
"version": "24.3.30"
},
{
"status": "affected",
"version": "24.4.30"
},
{
"status": "affected",
"version": "24.2.21"
},
{
"status": "affected",
"version": "25.2.15"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the IS-IS process to restart unexpectedly.\r\n\r\nThis vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending crafted IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process to restart unexpectedly, resulting in a temporary loss of connectivity to advertised networks and a denial of service (DoS) condition.\r\nNote: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency.\u0026nbsp;\u0026nbsp;"
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1287",
"description": "Improper Validation of Specified Type of Input",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T16:31:14.712Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-isis-dos-kDMxpSzK",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-dos-kDMxpSzK"
}
],
"source": {
"advisory": "cisco-sa-isis-dos-kDMxpSzK",
"defects": [
"CSCwq71827"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2026-20074",
"datePublished": "2026-03-11T16:31:14.712Z",
"dateReserved": "2025-10-08T11:59:15.362Z",
"dateUpdated": "2026-03-11T17:20:21.640Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-20040 (GCVE-0-2026-20040)
Vulnerability from cvelistv5
Published
2026-03-11 16:31
Modified
2026-03-12 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.8.12 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.5.52 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 24.4.10 Version: 6.5.35 Version: 25.1.1 Version: 24.4.2 Version: 24.3.20 Version: 24.4.15 Version: 25.2.1 Version: 6.5.351 Version: 25.1.2 Version: 24.3.30 Version: 25.3.1 Version: 6.5.352 Version: 24.4.30 Version: 24.2.21 Version: 25.4.1 Version: 25.2.2 Version: 25.2.15 Version: 7.2.0 Version: 7.0.0 Version: 25.2.30 Version: 6.5.353 Version: 25.1.30 Version: 25.3.15 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20040",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-11T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-12T03:55:35.692Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.5.52"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.10"
},
{
"status": "affected",
"version": "6.5.35"
},
{
"status": "affected",
"version": "25.1.1"
},
{
"status": "affected",
"version": "24.4.2"
},
{
"status": "affected",
"version": "24.3.20"
},
{
"status": "affected",
"version": "24.4.15"
},
{
"status": "affected",
"version": "25.2.1"
},
{
"status": "affected",
"version": "6.5.351"
},
{
"status": "affected",
"version": "25.1.2"
},
{
"status": "affected",
"version": "24.3.30"
},
{
"status": "affected",
"version": "25.3.1"
},
{
"status": "affected",
"version": "6.5.352"
},
{
"status": "affected",
"version": "24.4.30"
},
{
"status": "affected",
"version": "24.2.21"
},
{
"status": "affected",
"version": "25.4.1"
},
{
"status": "affected",
"version": "25.2.2"
},
{
"status": "affected",
"version": "25.2.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "25.2.30"
},
{
"status": "affected",
"version": "6.5.353"
},
{
"status": "affected",
"version": "25.1.30"
},
{
"status": "affected",
"version": "25.3.15"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T16:31:14.292Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-privesc-bF8D5U4W",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W"
}
],
"source": {
"advisory": "cisco-sa-iosxr-privesc-bF8D5U4W",
"defects": [
"CSCwp27221"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software CLI Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2026-20040",
"datePublished": "2026-03-11T16:31:14.292Z",
"dateReserved": "2025-10-08T11:59:15.354Z",
"dateUpdated": "2026-03-12T03:55:35.692Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-20363 (GCVE-0-2025-20363)
Vulnerability from cvelistv5
Published
2025-09-25 16:12
Modified
2026-02-26 17:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device.
This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device after obtaining additional information about the system, overcoming exploit mitigations, or both. A successful exploit could allow the attacker to execute arbitrary code as root, which may lead to the complete compromise of the affected device.
For more information about this vulnerability, see the Details ["#details"] section of this advisory.
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | IOS |
Version: 12.2(15)B Version: 12.2(16)B1 Version: 12.2(16)B2 Version: 12.2(16)B Version: 12.2(15)BC2a Version: 12.2(15)BC1a Version: 12.2(15)BC1b Version: 12.2(15)BC2d Version: 12.2(15)BC2g Version: 12.2(15)BC1g Version: 12.2(15)BC2i Version: 12.2(15)BC1c Version: 12.2(15)BC2c Version: 12.2(15)BC2f Version: 12.2(15)BC1d Version: 12.2(15)BC1 Version: 12.2(15)BC2 Version: 12.2(15)BC2e Version: 12.2(15)BC1e Version: 12.2(15)BC2h Version: 12.2(15)BC1f Version: 12.2(15)BC2b Version: 12.2(15)BX Version: 12.2(16)BX Version: 12.2(16)BX2 Version: 12.2(16)BX3 Version: 12.2(16)BX1 Version: 12.2(15)BZ2 Version: 12.2(15)CX Version: 12.2(15)CX1 Version: 12.2(33)CX Version: 12.2(33)CY Version: 12.2(33)CY1 Version: 12.2(33)CY2 Version: 12.2(15)MC1c Version: 12.2(15)MC2g Version: 12.2(15)MC2k Version: 12.2(15)MC1b Version: 12.2(15)MC2b Version: 12.2(15)MC2a Version: 12.2(15)MC2m Version: 12.2(15)MC1 Version: 12.2(15)MC2 Version: 12.2(15)MC2f Version: 12.2(15)MC2j Version: 12.2(15)MC2e Version: 12.2(15)MC1a Version: 12.2(15)MC2c Version: 12.2(15)MC2i Version: 12.2(15)MC2h Version: 12.2(15)MC2l Version: 12.2(11)YU Version: 12.2(11)YV Version: 12.2(11)YV1 Version: 12.2(13)ZD Version: 12.2(13)ZD3 Version: 12.2(13)ZD2 Version: 12.2(13)ZD1 Version: 12.2(13)ZD4 Version: 12.2(13)ZE Version: 12.2(13)ZF Version: 12.2(13)ZF2 Version: 12.2(13)ZF1 Version: 12.2(13)ZG Version: 12.2(13)ZH Version: 12.2(13)ZH5 Version: 12.2(13)ZH9 Version: 12.2(13)ZH2 Version: 12.2(13)ZH8 Version: 12.2(13)ZH10 Version: 12.2(13)ZH4 Version: 12.2(13)ZH3 Version: 12.2(13)ZH7 Version: 12.2(13)ZH6 Version: 12.2(13)ZH1 Version: 12.2(15)ZJ Version: 12.2(15)ZJ2 Version: 12.2(15)ZJ1 Version: 12.2(15)ZJ3 Version: 12.2(15)ZJ5 Version: 12.2(15)ZL Version: 12.2(15)ZL1 Version: 12.3(9a) Version: 12.3(15) Version: 12.3(19) Version: 12.3(10f) Version: 12.3(10a) Version: 12.3(1) Version: 12.3(1a) Version: 12.3(10) Version: 12.3(10b) Version: 12.3(10c) Version: 12.3(10d) Version: 12.3(10e) Version: 12.3(12b) Version: 12.3(12a) Version: 12.3(12c) Version: 12.3(12d) Version: 12.3(12e) Version: 12.3(12) Version: 12.3(13) Version: 12.3(13a) Version: 12.3(13b) Version: 12.3(15a) Version: 12.3(16) Version: 12.3(17) Version: 12.3(17a) Version: 12.3(17b) Version: 12.3(18) Version: 12.3(20) Version: 12.3(3f) Version: 12.3(3e) Version: 12.3(3g) Version: 12.3(3c) Version: 12.3(3b) Version: 12.3(3a) Version: 12.3(3) Version: 12.3(3i) Version: 12.3(3h) Version: 12.3(5c) Version: 12.3(5b) Version: 12.3(5a) Version: 12.3(5) Version: 12.3(5f) Version: 12.3(5e) Version: 12.3(5d) Version: 12.3(6f) Version: 12.3(6e) Version: 12.3(6c) Version: 12.3(6b) Version: 12.3(6a) Version: 12.3(6) Version: 12.3(9d) Version: 12.3(9e) Version: 12.3(9) Version: 12.3(9b) Version: 12.3(9c) Version: 12.3(16a) Version: 12.3(15b) Version: 12.3(21) Version: 12.3(22) Version: 12.3(21b) Version: 12.3(23) Version: 12.3(26) Version: 12.3(20a) Version: 12.3(22a) Version: 12.3(25) Version: 12.3(17c) Version: 12.3(24) Version: 12.3(19a) Version: 12.3(24a) Version: 12.3(18a) Version: 12.3(1a)B Version: 12.3(3)B Version: 12.3(5a)B Version: 12.3(3)B1 Version: 12.3(5a)B3 Version: 12.3(5a)B2 Version: 12.3(5a)B5 Version: 12.3(5a)B4 Version: 12.3(5a)B1 Version: 12.3(11)T Version: 12.3(7)T12 Version: 12.3(11)T11 Version: 12.3(11)T10 Version: 12.3(14)T7 Version: 12.3(14)T Version: 12.3(8)T Version: 12.3(2)T Version: 12.3(4)T Version: 12.3(7)T Version: 12.3(8)T9 Version: 12.3(2)T9 Version: 12.3(8)T6 Version: 12.3(4)T2a Version: 12.3(4)T9 Version: 12.3(4)T4 Version: 12.3(2)T1 Version: 12.3(11)T5 Version: 12.3(7)T3 Version: 12.3(2)T2 Version: 12.3(8)T3 Version: 12.3(4)T7 Version: 12.3(8)T7 Version: 12.3(11)T8 Version: 12.3(7)T2 Version: 12.3(8)T4 Version: 12.3(8)T8 Version: 12.3(14)T5 Version: 12.3(11)T3 Version: 12.3(4)T10 Version: 12.3(2)T4 Version: 12.3(8)T10 Version: 12.3(14)T2 Version: 12.3(4)T2 Version: 12.3(7)T7 Version: 12.3(7)T10 Version: 12.3(7)T4 Version: 12.3(11)T6 Version: 12.3(7)T11 Version: 12.3(4)T6 Version: 12.3(2)T3 Version: 12.3(2)T5 Version: 12.3(2)T6 Version: 12.3(4)T3 Version: 12.3(14)T3 Version: 12.3(2)T8 Version: 12.3(11)T4 Version: 12.3(7)T9 Version: 12.3(8)T11 Version: 12.3(11)T9 Version: 12.3(7)T8 Version: 12.3(4)T1 Version: 12.3(8)T5 Version: 12.3(4)T11 Version: 12.3(4)T8 Version: 12.3(14)T1 Version: 12.3(11)T2 Version: 12.3(7)T6 Version: 12.3(2)T7 Version: 12.3(11)T7 Version: 12.3(7)T1 Version: 12.3(14)T6 Version: 12.3(8)T1 Version: 12.2(15)CZ Version: 12.2(15)CZ1 Version: 12.2(15)CZ3 Version: 12.2(15)CZ2 Version: 12.3(2)XA Version: 12.3(2)XA4 Version: 12.3(2)XA7 Version: 12.3(2)XA1 Version: 12.3(2)XA3 Version: 12.3(2)XA6 Version: 12.3(2)XA2 Version: 12.3(2)XA5 Version: 12.3(4)XQ Version: 12.3(4)XQ1 Version: 12.3(11)XL Version: 12.3(11)XL1 Version: 12.3(4)XK3 Version: 12.3(4)XK1 Version: 12.3(4)XK4 Version: 12.3(4)XK Version: 12.3(4)XK2 Version: 12.3(7)XJ Version: 12.3(7)XJ1 Version: 12.3(7)XJ2 Version: 12.3(7)XI8 Version: 12.3(7)XI7 Version: 12.3(7)XI8d Version: 12.3(7)XI10a Version: 12.3(7)XI8a Version: 12.3(7)XI4 Version: 12.3(7)XI1b Version: 12.3(7)XI7a Version: 12.3(7)XI2a Version: 12.3(7)XI10 Version: 12.3(7)XI7b Version: 12.3(7)XI1c Version: 12.3(7)XI9 Version: 12.3(7)XI3 Version: 12.3(7)XI6 Version: 12.3(7)XI8c Version: 12.3(7)XI2 Version: 12.3(7)XI5 Version: 12.3(4)XG Version: 12.3(4)XG3 Version: 12.3(4)XG1 Version: 12.3(4)XG4 Version: 12.3(4)XG2 Version: 12.3(4)XG5 Version: 12.3(2)XF Version: 12.3(2)XE Version: 12.3(2)XE5 Version: 12.3(2)XE2 Version: 12.3(2)XE1 Version: 12.3(2)XE4 Version: 12.3(2)XE3 Version: 12.3(4)XD Version: 12.3(4)XD4 Version: 12.3(4)XD1 Version: 12.3(4)XD3 Version: 12.3(4)XD2 Version: 12.3(2)XC Version: 12.3(2)XC4 Version: 12.3(2)XC3 Version: 12.3(2)XC2 Version: 12.3(2)XC1 Version: 12.3(2)XC5 Version: 12.3(2)XB2 Version: 12.3(2)XB Version: 12.3(2)XB3 Version: 12.3(2)XB1 Version: 12.2(25)EW Version: 12.2(25)EWA Version: 12.2(25)EWA6 Version: 12.2(25)EWA5 Version: 12.2(25)EWA1 Version: 12.2(25)EWA10 Version: 12.2(25)EWA8 Version: 12.2(25)EWA11 Version: 12.2(25)EWA9 Version: 12.2(25)EWA2 Version: 12.2(25)EWA14 Version: 12.2(25)EWA4 Version: 12.2(25)EWA3 Version: 12.2(25)EWA7 Version: 12.2(25)EWA12 Version: 12.2(25)EWA13 Version: 12.2(35)SE Version: 12.2(25)SE Version: 12.2(37)SE Version: 12.2(53)SE1 Version: 12.2(55)SE Version: 12.2(25)SE2 Version: 12.2(40)SE2 Version: 12.2(46)SE Version: 12.2(46)SE2 Version: 12.2(50)SE2 Version: 12.2(35)SE5 Version: 12.2(50)SE1 Version: 12.2(44)SE2 Version: 12.2(35)SE1 Version: 12.2(50)SE5 Version: 12.2(35)SE4 Version: 12.2(44)SE1 Version: 12.2(53)SE Version: 12.2(37)SE1 Version: 12.2(25)SE3 Version: 12.2(35)SE3 Version: 12.2(44)SE4 Version: 12.2(55)SE3 Version: 12.2(55)SE2 Version: 12.2(40)SE Version: 12.2(44)SE Version: 12.2(52)SE Version: 12.2(58)SE Version: 12.2(50)SE3 Version: 12.2(55)SE1 Version: 12.2(35)SE2 Version: 12.2(40)SE1 Version: 12.2(44)SE6 Version: 12.2(44)SE3 Version: 12.2(53)SE2 Version: 12.2(52)SE1 Version: 12.2(46)SE1 Version: 12.2(54)SE Version: 12.2(44)SE5 Version: 12.2(50)SE4 Version: 12.2(50)SE Version: 12.2(58)SE1 Version: 12.2(55)SE4 Version: 12.2(58)SE2 Version: 12.2(55)SE5 Version: 12.2(55)SE6 Version: 12.2(55)SE7 Version: 12.2(55)SE8 Version: 12.2(55)SE9 Version: 12.2(55)SE10 Version: 12.2(55)SE11 Version: 12.2(55)SE12 Version: 12.2(55)SE13 Version: 12.3(7)XR Version: 12.3(7)XR4 Version: 12.3(7)XR3 Version: 12.3(7)XR5 Version: 12.3(7)XR6 Version: 12.3(7)XR2 Version: 12.3(7)XR7 Version: 12.3(7)XS Version: 12.3(7)XS2 Version: 12.3(7)XS1 Version: 12.3(8)XU Version: 12.3(8)XU5 Version: 12.3(8)XU2 Version: 12.3(8)XU1 Version: 12.3(8)XU4 Version: 12.3(8)XU3 Version: 12.3(8)XX Version: 12.3(8)XX1 Version: 12.3(8)XX2d Version: 12.3(8)XW Version: 12.3(8)XW2 Version: 12.3(8)XW3 Version: 12.3(8)XW1 Version: 12.3(8)XY Version: 12.3(8)XY3 Version: 12.3(8)XY5 Version: 12.3(8)XY4 Version: 12.3(8)XY1 Version: 12.3(8)XY7 Version: 12.3(8)XY2 Version: 12.3(8)XY6 Version: 12.3(2)XZ1 Version: 12.3(2)XZ2 Version: 12.3(8)YA Version: 12.3(8)YA1 Version: 12.3(8)YD Version: 12.3(8)YD1 Version: 12.3(11)YF Version: 12.3(11)YF2 Version: 12.3(11)YF3 Version: 12.3(11)YF4 Version: 12.3(11)YF1 Version: 12.3(8)YH Version: 12.3(8)YG Version: 12.3(8)YG5 Version: 12.3(8)YG3 Version: 12.3(8)YG6 Version: 12.3(8)YG2 Version: 12.3(8)YG1 Version: 12.3(8)YG4 Version: 12.3(13a)BC6 Version: 12.3(17a)BC2 Version: 12.3(17a)BC Version: 12.3(13a)BC Version: 12.3(21)BC Version: 12.3(9a)BC Version: 12.3(21a)BC9 Version: 12.3(21a)BC4 Version: 12.3(9a)BC9 Version: 12.3(17b)BC6 Version: 12.3(13a)BC2 Version: 12.3(23)BC Version: 12.3(17b)BC3 Version: 12.3(9a)BC2 Version: 12.3(17b)BC9 Version: 12.3(23)BC8 Version: 12.3(23)BC10 Version: 12.3(23)BC1 Version: 12.3(9a)BC1 Version: 12.3(17b)BC8 Version: 12.3(9a)BC3 Version: 12.3(23)BC9 Version: 12.3(21a)BC6 Version: 12.3(9a)BC6 Version: 12.3(9a)BC5 Version: 12.3(23)BC7 Version: 12.3(13a)BC3 Version: 12.3(23)BC6 Version: 12.3(23)BC4 Version: 12.3(13a)BC1 Version: 12.3(17b)BC5 Version: 12.3(21a)BC8 Version: 12.3(9a)BC8 Version: 12.3(21a)BC3 Version: 12.3(21a)BC7 Version: 12.3(9a)BC7 Version: 12.3(23)BC5 Version: 12.3(13a)BC5 Version: 12.3(9a)BC4 Version: 12.3(21a)BC2 Version: 12.3(13a)BC4 Version: 12.3(17b)BC7 Version: 12.3(23)BC3 Version: 12.3(21a)BC1 Version: 12.3(17a)BC1 Version: 12.3(17b)BC4 Version: 12.3(23)BC2 Version: 12.3(21a)BC5 Version: 12.3(1a)BW Version: 12.3(11)YJ Version: 12.3(8)YI2 Version: 12.3(8)YI3 Version: 12.3(8)YI1 Version: 12.3(11)YK Version: 12.3(11)YK1 Version: 12.3(11)YK2 Version: 12.3(11)YK3 Version: 12.2(25)EX Version: 12.2(35)EX Version: 12.2(44)EX Version: 12.2(35)EX2 Version: 12.2(40)EX3 Version: 12.2(40)EX Version: 12.2(53)EX Version: 12.2(37)EX Version: 12.2(52)EX Version: 12.2(44)EX1 Version: 12.2(35)EX1 Version: 12.2(25)EX1 Version: 12.2(40)EX2 Version: 12.2(40)EX1 Version: 12.2(55)EX Version: 12.2(46)EX Version: 12.2(52)EX1 Version: 12.2(55)EX1 Version: 12.2(55)EX2 Version: 12.2(55)EX3 Version: 12.2(58)EX Version: 12.2(25)SEB Version: 12.2(25)SEB2 Version: 12.2(25)SEB1 Version: 12.2(25)SEB4 Version: 12.2(25)SEB3 Version: 12.2(25)SEA Version: 12.2(25)EY Version: 12.2(46)EY Version: 12.2(55)EY Version: 12.2(52)EY1 Version: 12.2(25)EY1 Version: 12.2(44)EY Version: 12.2(52)EY Version: 12.2(53)EY Version: 12.2(25)EY3 Version: 12.2(52)EY2 Version: 12.2(37)EY Version: 12.2(25)EY2 Version: 12.2(25)EY4 Version: 12.2(52)EY1b Version: 12.2(52)EY1c Version: 12.2(58)EY Version: 12.2(52)EY3 Version: 12.2(52)EY2a Version: 12.2(58)EY1 Version: 12.2(52)EY4 Version: 12.2(52)EY3a Version: 12.2(58)EY2 Version: 12.3(2)JA Version: 12.3(2)JA1 Version: 12.3(2)JA2 Version: 12.3(2)JA3 Version: 12.3(2)JA4 Version: 12.3(2)JA5 Version: 12.3(4)JA1 Version: 12.3(4)JA Version: 12.3(7)JA1 Version: 12.3(7)JA Version: 12.3(8)JA Version: 12.3(8)JA1 Version: 12.3(8)JA2 Version: 12.3(11)JA Version: 12.3(7)JA4 Version: 12.3(4)JA2 Version: 12.3(7)JA5 Version: 12.3(11)JA3 Version: 12.3(11)JA4 Version: 12.3(2)JA6 Version: 12.3(11)JA2 Version: 12.3(11)JA1 Version: 12.3(7)JA3 Version: 12.3(7)JA2 Version: 12.3(14)YQ8 Version: 12.3(14)YQ Version: 12.3(14)YQ5 Version: 12.3(14)YQ4 Version: 12.3(14)YQ7 Version: 12.3(14)YQ1 Version: 12.3(14)YQ6 Version: 12.3(14)YQ3 Version: 12.3(14)YQ2 Version: 12.3(11)YS Version: 12.3(11)YS1 Version: 12.3(11)YS2 Version: 12.4(3e) Version: 12.4(7b) Version: 12.4(8) Version: 12.4(5b) Version: 12.4(7a) Version: 12.4(3d) Version: 12.4(1) Version: 12.4(1a) Version: 12.4(1b) Version: 12.4(1c) Version: 12.4(10) Version: 12.4(3) Version: 12.4(3a) Version: 12.4(3b) Version: 12.4(3c) Version: 12.4(3f) Version: 12.4(5) Version: 12.4(5a) Version: 12.4(7c) Version: 12.4(7) Version: 12.4(8a) Version: 12.4(8b) Version: 12.4(7d) Version: 12.4(3g) Version: 12.4(8c) Version: 12.4(10b) Version: 12.4(12) Version: 12.4(12a) Version: 12.4(12b) Version: 12.4(13) Version: 12.4(13a) Version: 12.4(13b) Version: 12.4(13c) Version: 12.4(7e) Version: 12.4(17) Version: 12.4(25e) Version: 12.4(18b) Version: 12.4(18e) Version: 12.4(25g) Version: 12.4(3i) Version: 12.4(3j) Version: 12.4(23b) Version: 12.4(3h) Version: 12.4(7h) Version: 12.4(25a) Version: 12.4(16) Version: 12.4(13d) Version: 12.4(25) Version: 12.4(25c) Version: 12.4(19) Version: 12.4(13e) Version: 12.4(25b) Version: 12.4(23) Version: 12.4(10c) Version: 12.4(21) Version: 12.4(16b) Version: 12.4(16a) Version: 12.4(23a) Version: 12.4(25d) Version: 12.4(7f) Version: 12.4(18) Version: 12.4(21a) Version: 12.4(13f) Version: 12.4(25f) Version: 12.4(18c) Version: 12.4(5c) Version: 12.4(8d) Version: 12.4(12c) Version: 12.4(17a) Version: 12.4(18a) Version: 12.4(17b) Version: 12.4(7g) Version: 12.2(25)EZ Version: 12.2(25)EZ1 Version: 12.2(58)EZ Version: 12.2(53)EZ Version: 12.2(55)EZ Version: 12.2(60)EZ Version: 12.2(60)EZ1 Version: 12.2(60)EZ2 Version: 12.2(60)EZ3 Version: 12.2(60)EZ4 Version: 12.2(60)EZ5 Version: 12.2(60)EZ6 Version: 12.2(60)EZ7 Version: 12.2(60)EZ8 Version: 12.2(60)EZ9 Version: 12.2(60)EZ10 Version: 12.2(60)EZ11 Version: 12.2(60)EZ12 Version: 12.2(60)EZ13 Version: 12.2(60)EZ14 Version: 12.2(60)EZ15 Version: 12.2(25)SEC Version: 12.2(25)SEC2 Version: 12.2(25)SEC1 Version: 12.3(2)JK Version: 12.3(2)JK1 Version: 12.3(2)JK2 Version: 12.3(8)JK Version: 12.3(8)JK1 Version: 12.3(2)JK3 Version: 12.3(14)YU Version: 12.3(14)YU1 Version: 12.4(6)MR1 Version: 12.4(11)MR Version: 12.4(2)MR Version: 12.4(4)MR Version: 12.4(6)MR Version: 12.4(9)MR Version: 12.4(12)MR Version: 12.4(16)MR Version: 12.4(16)MR1 Version: 12.4(19)MR2 Version: 12.4(19)MR1 Version: 12.4(19)MR Version: 12.4(20)MR Version: 12.4(4)MR1 Version: 12.4(19)MR3 Version: 12.4(12)MR1 Version: 12.4(20)MR2 Version: 12.4(16)MR2 Version: 12.4(12)MR2 Version: 12.4(2)MR1 Version: 12.4(20)MR1 Version: 12.4(4)T Version: 12.4(4)T1 Version: 12.4(4)T2 Version: 12.4(4)T3 Version: 12.4(6)T Version: 12.4(6)T1 Version: 12.4(6)T2 Version: 12.4(9)T Version: 12.4(4)T4 Version: 12.4(2)T5 Version: 12.4(6)T3 Version: 12.4(2)T Version: 12.4(11)T Version: 12.4(15)T Version: 12.4(20)T Version: 12.4(24)T Version: 12.4(24)T3 Version: 12.4(4)T8 Version: 12.4(20)T1 Version: 12.4(22)T1 Version: 12.4(15)T9 Version: 12.4(11)T4 Version: 12.4(15)T8 Version: 12.4(6)T5 Version: 12.4(15)T15 Version: 12.4(24)T5 Version: 12.4(15)T2 Version: 12.4(6)T8 Version: 12.4(15)T12 Version: 12.4(24)T4 Version: 12.4(6)T11 Version: 12.4(9)T5 Version: 12.4(20)T3 Version: 12.4(6)T4 Version: 12.4(4)T6 Version: 12.4(22)T Version: 12.4(20)T6 Version: 12.4(9)T3 Version: 12.4(24)T8 Version: 12.4(6)T7 Version: 12.4(15)T13 Version: 12.4(6)T10 Version: 12.4(15)T3 Version: 12.4(24)T2 Version: 12.4(22)T5 Version: 12.4(2)T3 Version: 12.4(15)T10 Version: 12.4(22)T4 Version: 12.4(20)T5 Version: 12.4(9)T6 Version: 12.4(15)T4 Version: 12.4(2)T4 Version: 12.4(24)T1 Version: 12.4(9)T4 Version: 12.4(24)T7 Version: 12.4(22)T3 Version: 12.4(9)T1 Version: 12.4(24)T6 Version: 12.4(6)T9 Version: 12.4(15)T5 Version: 12.4(4)T7 Version: 12.4(20)T2 Version: 12.4(2)T1 Version: 12.4(11)T1 Version: 12.4(15)T11 Version: 12.4(2)T6 Version: 12.4(2)T2 Version: 12.4(15)T7 Version: 12.4(11)T2 Version: 12.4(9)T7 Version: 12.4(15)T14 Version: 12.4(11)T3 Version: 12.4(15)T6 Version: 12.4(15)T16 Version: 12.4(15)T1 Version: 12.4(9)T2 Version: 12.4(6)T6 Version: 12.4(22)T2 Version: 12.4(4)T5 Version: 12.4(20)T4 Version: 12.4(24)T4a Version: 12.4(24)T4b Version: 12.4(24)T3e Version: 12.4(24)T4c Version: 12.4(15)T17 Version: 12.4(24)T4d Version: 12.4(24)T4e Version: 12.4(24)T3f Version: 12.4(24)T4f Version: 12.4(24)T4l Version: 12.3(14)YT Version: 12.3(14)YT1 Version: 12.2(31)SG Version: 12.2(25)SG Version: 12.2(37)SG Version: 12.2(44)SG Version: 12.2(50)SG3 Version: 12.2(31)SG1 Version: 12.2(53)SG Version: 12.2(31)SG3 Version: 12.2(50)SG6 Version: 12.2(53)SG1 Version: 12.2(46)SG Version: 12.2(25)SG1 Version: 12.2(53)SG2 Version: 12.2(50)SG5 Version: 12.2(37)SG1 Version: 12.2(53)SG3 Version: 12.2(50)SG8 Version: 12.2(25)SG3 Version: 12.2(50)SG2 Version: 12.2(40)SG Version: 12.2(25)SG2 Version: 12.2(54)SG1 Version: 12.2(44)SG1 Version: 12.2(50)SG1 Version: 12.2(52)SG Version: 12.2(54)SG Version: 12.2(31)SG2 Version: 12.2(50)SG Version: 12.2(25)SG4 Version: 12.2(50)SG7 Version: 12.2(53)SG4 Version: 12.2(50)SG4 Version: 12.2(46)SG1 Version: 12.2(53)SG5 Version: 12.2(53)SG6 Version: 12.2(53)SG7 Version: 12.2(53)SG8 Version: 12.2(53)SG9 Version: 12.2(53)SG10 Version: 12.2(53)SG11 Version: 12.2(25)FX Version: 12.2(25)FY Version: 12.3(7)JX2 Version: 12.3(7)JX Version: 12.3(7)JX1 Version: 12.3(7)JX4 Version: 12.3(11)JX Version: 12.3(7)JX7 Version: 12.3(7)JX12 Version: 12.3(7)JX9 Version: 12.3(7)JX10 Version: 12.3(11)JX1 Version: 12.3(7)JX6 Version: 12.3(7)JX5 Version: 12.3(7)JX3 Version: 12.3(7)JX11 Version: 12.3(7)JX8 Version: 12.3(4)TPC11b Version: 12.3(4)TPC11a Version: 12.4(2)XB Version: 12.4(2)XB1 Version: 12.4(2)XB6 Version: 12.4(2)XB7 Version: 12.4(2)XB11 Version: 12.4(2)XB3 Version: 12.4(2)XB9 Version: 12.4(2)XB8 Version: 12.4(2)XB2 Version: 12.4(2)XB10 Version: 12.4(2)XB4 Version: 12.4(2)XB5 Version: 12.4(2)XB12 Version: 12.4(2)XA Version: 12.4(2)XA1 Version: 12.4(2)XA2 Version: 12.3(14)YM8 Version: 12.3(14)YM12 Version: 12.3(14)YM4 Version: 12.3(14)YM3 Version: 12.3(14)YM7 Version: 12.3(14)YM11 Version: 12.3(14)YM9 Version: 12.3(14)YM6 Version: 12.3(14)YM10 Version: 12.3(14)YM13 Version: 12.3(14)YM5 Version: 12.3(14)YM2 Version: 12.2(31)SB3x Version: 12.2(33)SB3 Version: 12.2(31)SB5 Version: 12.2(31)SB10 Version: 12.2(33)SB9 Version: 12.2(31)SB15 Version: 12.2(33)SB10 Version: 12.2(33)SB6 Version: 12.2(31)SB11 Version: 12.2(31)SB7 Version: 12.2(33)SB5 Version: 12.2(31)SB6 Version: 12.2(33)SB8 Version: 12.2(31)SB17 Version: 12.2(31)SB13 Version: 12.2(31)SB9 Version: 12.2(31)SB16 Version: 12.2(31)SB12 Version: 12.2(31)SB20 Version: 12.2(33)SB2 Version: 12.2(31)SB8 Version: 12.2(31)SB3 Version: 12.2(31)SB18 Version: 12.2(31)SB2 Version: 12.2(31)SB14 Version: 12.2(31)SB19 Version: 12.2(33)SB Version: 12.2(33)SB7 Version: 12.2(33)SB1 Version: 12.2(33)SB4 Version: 12.2(33)SB11 Version: 12.2(31)SB21 Version: 12.2(33)SB12 Version: 12.2(33)SB13 Version: 12.2(33)SB14 Version: 12.2(33)SB15 Version: 12.2(33)SB16 Version: 12.2(33)SB17 Version: 12.2(33)SB8a Version: 12.2(33)SRA Version: 12.2(33)SRA6 Version: 12.2(33)SRA7 Version: 12.2(33)SRA2 Version: 12.2(33)SRA3 Version: 12.2(33)SRA1 Version: 12.2(33)SRA4 Version: 12.2(33)SRA5 Version: 12.4(4)XC Version: 12.4(4)XC1 Version: 12.4(4)XC5 Version: 12.4(4)XC7 Version: 12.4(4)XC3 Version: 12.4(4)XC4 Version: 12.4(4)XC2 Version: 12.4(4)XC6 Version: 12.4(4)XD Version: 12.4(4)XD4 Version: 12.4(4)XD10 Version: 12.4(4)XD12 Version: 12.4(4)XD2 Version: 12.4(4)XD8 Version: 12.4(4)XD11 Version: 12.4(4)XD1 Version: 12.4(4)XD5 Version: 12.4(4)XD7 Version: 12.4(4)XD9 Version: 12.4(6)XE Version: 12.4(6)XE2 Version: 12.4(6)XE1 Version: 12.2(25)SEF1 Version: 12.2(25)SEF2 Version: 12.2(25)SEF3 Version: 12.2(25)SEE Version: 12.2(25)SEE1 Version: 12.2(25)SEE3 Version: 12.2(25)SEE4 Version: 12.2(25)SEE2 Version: 12.2(25)SED Version: 12.2(25)SED1 Version: 12.3(11)YZ1 Version: 12.3(11)YZ Version: 12.3(11)YZ2 Version: 12.4(11)SW Version: 12.4(15)SW6 Version: 12.4(15)SW Version: 12.4(11)SW1 Version: 12.4(15)SW5 Version: 12.4(15)SW1 Version: 12.4(15)SW4 Version: 12.4(11)SW3 Version: 12.4(11)SW2 Version: 12.4(15)SW3 Version: 12.4(15)SW2 Version: 12.4(15)SW7 Version: 12.4(15)SW8 Version: 12.4(15)SW8a Version: 12.4(15)SW9 Version: 12.4(9)XG Version: 12.4(9)XG3 Version: 12.4(9)XG5 Version: 12.4(9)XG2 Version: 12.4(9)XG1 Version: 12.4(9)XG4 Version: 12.4(11)XJ Version: 12.4(11)XJ3 Version: 12.4(11)XJ2 Version: 12.4(11)XJ4 Version: 12.4(6)XT Version: 12.4(6)XT1 Version: 12.4(6)XT2 Version: 12.4(6)XP Version: 12.2(31)SGA Version: 12.2(31)SGA3 Version: 12.2(31)SGA2 Version: 12.2(31)SGA10 Version: 12.2(31)SGA5 Version: 12.2(31)SGA4 Version: 12.2(31)SGA11 Version: 12.2(31)SGA6 Version: 12.2(31)SGA1 Version: 12.2(31)SGA7 Version: 12.2(31)SGA8 Version: 12.2(31)SGA9 Version: 12.2(25)SEG Version: 12.2(25)SEG5 Version: 12.2(25)SEG2 Version: 12.2(25)SEG4 Version: 12.2(25)SEG1 Version: 12.2(25)SEG3 Version: 12.2(25)SEG6 Version: 12.3(8)JEA Version: 12.3(8)JEA1 Version: 12.3(8)JEA3 Version: 12.3(8)JEA2 Version: 12.4(11)MD Version: 12.4(11)MD2 Version: 12.4(24)MD1 Version: 12.4(11)MD1 Version: 12.4(24)MD Version: 12.4(11)MD10 Version: 12.4(15)MD3 Version: 12.4(24)MD3 Version: 12.4(15)MD2 Version: 12.4(11)MD5 Version: 12.4(24)MD2 Version: 12.4(11)MD9 Version: 12.4(22)MD1 Version: 12.4(15)MD5 Version: 12.4(15)MD4 Version: 12.4(22)MD2 Version: 12.4(11)MD8 Version: 12.4(11)MD7 Version: 12.4(24)MD5 Version: 12.4(15)MD Version: 12.4(15)MD1 Version: 12.4(11)MD6 Version: 12.4(22)MD Version: 12.4(11)MD4 Version: 12.4(11)MD3 Version: 12.4(24)MD4 Version: 12.4(24)MD6 Version: 12.4(24)MD7 Version: 12.4(14)XK Version: 12.4(11)XV Version: 12.4(11)XV1 Version: 12.4(11)XW Version: 12.4(11)XW3 Version: 12.4(11)XW7 Version: 12.4(11)XW10 Version: 12.4(11)XW8 Version: 12.4(11)XW9 Version: 12.4(11)XW6 Version: 12.4(11)XW4 Version: 12.4(11)XW1 Version: 12.4(11)XW5 Version: 12.4(11)XW2 Version: 12.2(33)SRB Version: 12.2(33)SRB4 Version: 12.2(33)SRB5a Version: 12.2(33)SRB3 Version: 12.2(33)SRB1 Version: 12.2(33)SRB7 Version: 12.2(33)SRB6 Version: 12.2(33)SRB5 Version: 12.2(33)SRB2 Version: 12.4(3g)JMA1 Version: 12.3(8)JEB Version: 12.3(8)JEB1 Version: 12.3(8)JEC2 Version: 12.3(8)JEC1 Version: 12.3(8)JEC3 Version: 12.3(8)JEC Version: 12.2(25)FZ Version: 12.4(15)XF Version: 12.3(2)JL Version: 12.3(2)JL3 Version: 12.3(2)JL1 Version: 12.3(2)JL4 Version: 12.3(2)JL2 Version: 12.2(33)SCA2 Version: 12.2(33)SCA1 Version: 12.2(33)SCA Version: 12.2(33)SRC2 Version: 12.2(33)SRC Version: 12.2(33)SRC3 Version: 12.2(33)SRC5 Version: 12.2(33)SRC6 Version: 12.2(33)SRC4 Version: 12.2(33)SRC1 Version: 12.2(33)SXH3a Version: 12.2(33)SXH8a Version: 12.2(33)SXH3 Version: 12.2(33)SXH4 Version: 12.2(33)SXH7 Version: 12.2(33)SXH Version: 12.2(33)SXH8 Version: 12.2(33)SXH2a Version: 12.2(33)SXH2 Version: 12.2(33)SXH1 Version: 12.2(33)SXH5 Version: 12.2(33)SXH6 Version: 12.2(33)SXH8b Version: 12.4(15)XQ4 Version: 12.4(15)XQ1 Version: 12.4(15)XQ7 Version: 12.4(15)XQ2a Version: 12.4(15)XQ6 Version: 12.4(15)XQ2 Version: 12.4(15)XQ Version: 12.4(15)XQ3 Version: 12.4(15)XQ5 Version: 12.4(15)XQ2b Version: 12.4(15)XQ8 Version: 12.4(15)XY4 Version: 12.4(15)XY5 Version: 12.4(15)XY1 Version: 12.4(15)XY Version: 12.4(15)XY2 Version: 12.4(15)XY3 Version: 12.4(15)XZ Version: 12.4(15)XZ2 Version: 12.4(15)XZ1 Version: 12.4(15)XL3 Version: 12.4(15)XL1 Version: 12.4(15)XL2 Version: 12.4(15)XL4 Version: 12.4(15)XL5 Version: 12.4(15)XL Version: 12.3(8)ZA Version: 12.4(15)XM3 Version: 12.4(15)XM1 Version: 12.4(15)XM2 Version: 12.4(15)XM Version: 12.4(15)XN Version: 12.4(22)XR5 Version: 12.4(22)XR4 Version: 12.4(15)XR5 Version: 12.4(15)XR2 Version: 12.4(22)XR7 Version: 12.4(15)XR4 Version: 12.4(15)XR1 Version: 12.4(15)XR7 Version: 12.4(22)XR2 Version: 12.4(15)XR9 Version: 12.4(15)XR6 Version: 12.4(15)XR3 Version: 12.4(15)XR Version: 12.4(22)XR6 Version: 12.4(22)XR10 Version: 12.4(15)XR8 Version: 12.4(22)XR1 Version: 12.4(22)XR9 Version: 12.4(22)XR3 Version: 12.4(22)XR8 Version: 12.4(22)XR11 Version: 12.4(15)XR10 Version: 12.4(22)XR12 Version: 12.2(33)IRA Version: 12.2(33)IRB Version: 12.2(33)SCB9 Version: 12.2(33)SCB Version: 12.2(33)SCB6 Version: 12.2(33)SCB3 Version: 12.2(33)SCB10 Version: 12.2(33)SCB4 Version: 12.2(33)SCB2 Version: 12.2(33)SCB7 Version: 12.2(33)SCB1 Version: 12.2(33)SCB5 Version: 12.2(33)SCB8 Version: 12.2(33)SCB11 Version: 12.2(33)SRD7 Version: 12.2(33)SRD6 Version: 12.2(33)SRD2a Version: 12.2(33)SRD4 Version: 12.2(33)SRD5 Version: 12.2(33)SRD3 Version: 12.2(33)SRD2 Version: 12.2(33)SRD1 Version: 12.2(33)SRD Version: 12.2(33)SRD8 Version: 12.2(33)STE0 Version: 12.2(33)SXI2 Version: 12.2(33)SXI3 Version: 12.2(33)SXI5 Version: 12.2(33)SXI4a Version: 12.2(33)SXI4 Version: 12.2(33)SXI2a Version: 12.2(33)SXI Version: 12.2(33)SXI6 Version: 12.2(33)SXI7 Version: 12.2(33)SXI1 Version: 12.2(33)SXI8 Version: 12.2(33)SXI9 Version: 12.2(33)SXI8a Version: 12.2(33)SXI10 Version: 12.2(33)SXI11 Version: 12.2(33)SXI12 Version: 12.2(33)SXI13 Version: 12.2(33)SXI14 Version: 12.2(52)XO Version: 12.2(54)XO Version: 12.2(40)XO Version: 12.4(10b)JDA3 Version: 12.4(10b)JDA Version: 12.4(10b)JDA2 Version: 12.4(10b)JDA1 Version: 12.4(3)JL Version: 12.4(3)JL2 Version: 12.4(3)JL1 Version: 12.4(3g)JMB Version: 12.4(3g)JX Version: 12.4(3g)JX1 Version: 12.4(25e)JX Version: 12.4(10b)JY Version: 12.4(21a)JY Version: 12.4(23c)JY Version: 12.2(44)SQ Version: 12.2(44)SQ2 Version: 12.2(50)SQ2 Version: 12.2(50)SQ1 Version: 12.2(50)SQ Version: 12.2(50)SQ3 Version: 12.2(50)SQ4 Version: 12.2(50)SQ5 Version: 12.2(50)SQ6 Version: 12.2(50)SQ7 Version: 12.4(10b)JDC Version: 12.4(10b)JDD Version: 12.2(33)IRC Version: 12.4(22)MDA3 Version: 12.4(24)MDA5 Version: 12.4(22)MDA5 Version: 12.4(24)MDA3 Version: 12.4(22)MDA4 Version: 12.4(24)MDA4 Version: 12.4(24)MDA1 Version: 12.4(22)MDA Version: 12.4(22)MDA2 Version: 12.4(22)MDA1 Version: 12.4(24)MDA2 Version: 12.4(22)MDA6 Version: 12.4(24)MDA6 Version: 12.4(24)MDA7 Version: 12.4(24)MDA8 Version: 12.4(24)MDA10 Version: 12.4(24)MDA9 Version: 12.4(24)MDA11 Version: 12.4(24)MDA12 Version: 12.4(24)MDA13 Version: 12.2(33)SCC Version: 12.2(33)SCC2 Version: 12.2(33)SCC6 Version: 12.2(33)SCC7 Version: 12.2(33)SCC5 Version: 12.2(33)SCC4 Version: 12.2(33)SCC3 Version: 12.2(33)SCC1 Version: 12.2(33)SCD5 Version: 12.2(33)SCD1 Version: 12.2(33)SCD7 Version: 12.2(33)SCD4 Version: 12.2(33)SCD Version: 12.2(33)SCD6 Version: 12.2(33)SCD3 Version: 12.2(33)SCD2 Version: 12.2(33)SCD8 Version: 12.3(8)JED Version: 12.3(8)JED1 Version: 12.4(24)YG3 Version: 12.4(24)YG4 Version: 12.4(24)YG1 Version: 12.4(24)YG2 Version: 12.4(24)YG Version: 15.0(1)M1 Version: 15.0(1)M5 Version: 15.0(1)M4 Version: 15.0(1)M3 Version: 15.0(1)M2 Version: 15.0(1)M6 Version: 15.0(1)M Version: 15.0(1)M7 Version: 15.0(1)M10 Version: 15.0(1)M9 Version: 15.0(1)M8 Version: 15.0(1)XA2 Version: 15.0(1)XA4 Version: 15.0(1)XA1 Version: 15.0(1)XA3 Version: 15.0(1)XA Version: 15.0(1)XA5 Version: 15.1(2)T Version: 15.1(1)T4 Version: 15.1(3)T2 Version: 15.1(1)T1 Version: 15.1(2)T0a Version: 15.1(3)T3 Version: 15.1(1)T3 Version: 15.1(2)T3 Version: 15.1(2)T4 Version: 15.1(1)T2 Version: 15.1(3)T Version: 15.1(2)T2a Version: 15.1(3)T1 Version: 15.1(1)T Version: 15.1(2)T2 Version: 15.1(2)T1 Version: 15.1(2)T5 Version: 15.1(3)T4 Version: 15.1(1)T5 Version: 15.1(1)XB Version: 12.2(33)SRE1 Version: 12.2(33)SRE2 Version: 12.2(33)SRE3 Version: 12.2(33)SRE4 Version: 12.2(33)SRE Version: 12.2(33)SRE0a Version: 12.2(33)SRE5 Version: 12.2(33)SRE6 Version: 12.2(33)SRE8 Version: 12.2(33)SRE7 Version: 12.2(33)SRE9 Version: 12.2(33)SRE7a Version: 12.2(33)SRE10 Version: 12.2(33)SRE11 Version: 12.2(33)SRE9a Version: 12.2(33)SRE12 Version: 12.2(33)SRE13 Version: 12.2(33)SRE14 Version: 12.2(33)SRE15 Version: 12.2(33)SRE15a Version: 15.0(1)XO1 Version: 15.0(1)XO Version: 15.0(2)XO Version: 15.0(1)S2 Version: 15.0(1)S1 Version: 15.0(1)S Version: 15.0(1)S3a Version: 15.0(1)S4 Version: 15.0(1)S5 Version: 15.0(1)S4a Version: 15.0(1)S6 Version: 12.2(33)IRD Version: 12.2(33)IRE Version: 12.2(33)IRE2 Version: 12.2(33)IRE1 Version: 12.2(33)MRA Version: 12.2(33)MRB5 Version: 12.2(33)MRB2 Version: 12.2(33)MRB1 Version: 12.2(33)MRB4 Version: 12.2(33)MRB Version: 12.2(33)MRB3 Version: 12.2(33)MRB6 Version: 12.4(21a)JHA Version: 15.2(1)S Version: 15.2(2)S Version: 15.2(1)S1 Version: 15.2(4)S Version: 15.2(1)S2 Version: 15.2(2)S1 Version: 15.2(2)S2 Version: 15.2(2)S0a Version: 15.2(2)S0c Version: 15.2(4)S1 Version: 15.2(4)S4 Version: 15.2(4)S6 Version: 15.2(4)S2 Version: 15.2(4)S5 Version: 15.2(4)S3 Version: 15.2(4)S3a Version: 15.2(4)S4a Version: 15.2(4)S7 Version: 15.3(1)T Version: 15.3(2)T Version: 15.3(1)T1 Version: 15.3(1)T2 Version: 15.3(1)T3 Version: 15.3(1)T4 Version: 15.3(2)T1 Version: 15.3(2)T2 Version: 15.3(2)T3 Version: 15.3(2)T4 Version: 12.4(10b)JDE Version: 15.0(1)EY Version: 15.0(1)EY1 Version: 15.0(1)EY2 Version: 15.0(2)EY Version: 15.0(2)EY1 Version: 15.0(2)EY2 Version: 15.0(2)EY3 Version: 12.4(20)MRB Version: 12.4(20)MRB1 Version: 12.3(8)JEE Version: 12.2(54)WO Version: 15.1(2)S Version: 15.1(1)S Version: 15.1(1)S1 Version: 15.1(3)S Version: 15.1(1)S2 Version: 15.1(2)S1 Version: 15.1(2)S2 Version: 15.1(3)S1 Version: 15.1(3)S0a Version: 15.1(3)S2 Version: 15.1(3)S4 Version: 15.1(3)S3 Version: 15.1(3)S5 Version: 15.1(3)S6 Version: 15.1(3)S5a Version: 15.1(4)M3 Version: 15.1(4)M Version: 15.1(4)M1 Version: 15.1(4)M2 Version: 15.1(4)M6 Version: 15.1(4)M5 Version: 15.1(4)M4 Version: 15.1(4)M7 Version: 15.1(4)M3a Version: 15.1(4)M10 Version: 15.1(4)M8 Version: 15.1(4)M9 Version: 12.2(33)IRF Version: 12.4(3g)JMC1 Version: 12.4(3g)JMC Version: 12.4(3g)JMC2 Version: 15.0(1)SE Version: 15.0(2)SE Version: 15.0(1)SE1 Version: 15.0(1)SE2 Version: 15.0(1)SE3 Version: 15.0(2)SE1 Version: 15.0(2)SE2 Version: 15.0(2)SE3 Version: 15.0(2)SE4 Version: 15.0(2)SE5 Version: 15.0(2)SE6 Version: 15.0(2)SE7 Version: 15.0(2)SE8 Version: 15.0(2)SE9 Version: 15.0(2)SE10 Version: 15.0(2)SE11 Version: 15.0(2)SE10a Version: 15.0(2)SE12 Version: 15.0(2)SE13 Version: 15.1(2)GC Version: 15.1(2)GC1 Version: 15.1(2)GC2 Version: 15.1(4)GC Version: 15.1(4)GC1 Version: 15.1(4)GC2 Version: 15.0(1)SY Version: 15.0(1)SY1 Version: 15.0(1)SY2 Version: 15.0(1)SY3 Version: 15.0(1)SY4 Version: 15.0(1)SY5 Version: 15.0(1)SY6 Version: 15.0(1)SY7 Version: 15.0(1)SY8 Version: 15.0(1)SY7a Version: 15.0(1)SY9 Version: 15.0(1)SY10 Version: 12.2(33)SXJ Version: 12.2(33)SXJ1 Version: 12.2(33)SXJ2 Version: 12.2(33)SXJ3 Version: 12.2(33)SXJ4 Version: 12.2(33)SXJ5 Version: 12.2(33)SXJ6 Version: 12.2(33)SXJ7 Version: 12.2(33)SXJ8 Version: 12.2(33)SXJ9 Version: 12.2(33)SXJ10 Version: 15.1(1)SG Version: 15.1(2)SG Version: 15.1(1)SG1 Version: 15.1(1)SG2 Version: 15.1(2)SG1 Version: 15.1(2)SG2 Version: 15.1(2)SG3 Version: 15.1(2)SG4 Version: 15.1(2)SG5 Version: 15.1(2)SG6 Version: 15.1(2)SG7 Version: 15.1(2)SG8 Version: 15.0(1)MR Version: 15.0(2)MR Version: 12.2(33)SCF Version: 12.2(33)SCF1 Version: 12.2(33)SCF2 Version: 12.2(33)SCF3 Version: 12.2(33)SCF4 Version: 12.2(33)SCF5 Version: 15.2(4)M Version: 15.2(4)M1 Version: 15.2(4)M2 Version: 15.2(4)M4 Version: 15.2(4)M3 Version: 15.2(4)M5 Version: 15.2(4)M8 Version: 15.2(4)M10 Version: 15.2(4)M7 Version: 15.2(4)M6 Version: 15.2(4)M9 Version: 15.2(4)M6a Version: 15.2(4)M11 Version: 12.2(33)SCE Version: 12.2(33)SCE1 Version: 12.2(33)SCE2 Version: 12.2(33)SCE3 Version: 12.2(33)SCE4 Version: 12.2(33)SCE5 Version: 12.2(33)SCE6 Version: 15.0(2)SG Version: 15.0(2)SG1 Version: 15.0(2)SG2 Version: 15.0(2)SG3 Version: 15.0(2)SG4 Version: 15.0(2)SG5 Version: 15.0(2)SG6 Version: 15.0(2)SG7 Version: 15.0(2)SG8 Version: 15.0(2)SG9 Version: 15.0(2)SG10 Version: 15.0(2)SG11 Version: 12.4(24)MDB Version: 12.4(24)MDB1 Version: 12.4(24)MDB3 Version: 12.4(24)MDB4 Version: 12.4(24)MDB5 Version: 12.4(24)MDB6 Version: 12.4(24)MDB7 Version: 12.4(24)MDB5a Version: 12.4(24)MDB8 Version: 12.4(24)MDB9 Version: 12.4(24)MDB10 Version: 12.4(24)MDB11 Version: 12.4(24)MDB12 Version: 12.4(24)MDB13 Version: 12.4(24)MDB14 Version: 12.4(24)MDB15 Version: 12.4(24)MDB16 Version: 12.4(24)MDB17 Version: 12.4(24)MDB18 Version: 12.4(24)MDB19 Version: 12.2(33)IRG Version: 12.2(33)IRG1 Version: 12.4(21a)JHC Version: 15.0(1)EX Version: 15.0(2)EX Version: 15.0(2)EX1 Version: 15.0(2)EX2 Version: 15.0(2)EX3 Version: 15.0(2)EX4 Version: 15.0(2)EX5 Version: 15.0(2)EX8 Version: 15.0(2a)EX5 Version: 15.0(2)EX10 Version: 15.0(2)EX11 Version: 15.0(2)EX13 Version: 15.0(2)EX12 Version: 15.2(1)GC Version: 15.2(1)GC1 Version: 15.2(1)GC2 Version: 15.2(2)GC Version: 15.2(3)GC Version: 15.2(3)GC1 Version: 15.2(4)GC Version: 15.2(4)GC1 Version: 15.2(4)GC2 Version: 15.2(4)GC3 Version: 12.2(33)SCG Version: 12.2(33)SCG1 Version: 12.2(33)SCG2 Version: 12.2(33)SCG3 Version: 12.2(33)SCG4 Version: 12.2(33)SCG5 Version: 12.2(33)SCG6 Version: 12.2(33)SCG7 Version: 12.2(33)IRH Version: 12.2(33)IRH1 Version: 15.1(1)SY Version: 15.1(1)SY1 Version: 15.1(2)SY Version: 15.1(2)SY1 Version: 15.1(2)SY2 Version: 15.1(1)SY2 Version: 15.1(1)SY3 Version: 15.1(2)SY3 Version: 15.1(1)SY4 Version: 15.1(2)SY4 Version: 15.1(1)SY5 Version: 15.1(2)SY5 Version: 15.1(2)SY4a Version: 15.1(1)SY6 Version: 15.1(2)SY6 Version: 15.1(2)SY7 Version: 15.1(2)SY8 Version: 15.1(2)SY9 Version: 15.1(2)SY10 Version: 15.1(2)SY11 Version: 15.1(2)SY12 Version: 15.1(2)SY13 Version: 15.1(2)SY14 Version: 15.1(2)SY15 Version: 15.1(2)SY16 Version: 15.3(1)S Version: 15.3(2)S Version: 15.3(3)S Version: 15.3(1)S2 Version: 15.3(1)S1 Version: 15.3(2)S2 Version: 15.3(2)S1 Version: 15.3(3)S1 Version: 15.3(3)S2 Version: 15.3(3)S3 Version: 15.3(3)S6 Version: 15.3(3)S4 Version: 15.3(3)S1a Version: 15.3(3)S5 Version: 15.3(3)S7 Version: 15.3(3)S8 Version: 15.3(3)S9 Version: 15.3(3)S10 Version: 15.3(3)S8a Version: 15.4(1)T Version: 15.4(2)T Version: 15.4(1)T2 Version: 15.4(1)T1 Version: 15.4(1)T3 Version: 15.4(2)T1 Version: 15.4(2)T3 Version: 15.4(2)T2 Version: 15.4(1)T4 Version: 15.4(2)T4 Version: 12.2(33)SCH Version: 12.2(33)SCH1 Version: 12.2(33)SCH2 Version: 12.2(33)SCH0a Version: 12.2(33)SCH3 Version: 12.2(33)SCH2a Version: 12.2(33)SCH4 Version: 12.2(33)SCH5 Version: 12.2(33)SCH6 Version: 12.4(25e)JAL Version: 12.4(25e)JAL2 Version: 15.0(2)EA Version: 15.0(2)EA1 Version: 15.2(1)E Version: 15.2(2)E Version: 15.2(1)E1 Version: 15.2(3)E Version: 15.2(1)E2 Version: 15.2(1)E3 Version: 15.2(2)E1 Version: 15.2(4)E Version: 15.2(3)E1 Version: 15.2(2)E2 Version: 15.2(2a)E1 Version: 15.2(2)E3 Version: 15.2(2a)E2 Version: 15.2(3)E2 Version: 15.2(3a)E Version: 15.2(3)E3 Version: 15.2(4)E1 Version: 15.2(2)E4 Version: 15.2(2)E5 Version: 15.2(4)E2 Version: 15.2(3)E4 Version: 15.2(5)E Version: 15.2(4)E3 Version: 15.2(2)E6 Version: 15.2(5a)E Version: 15.2(5)E1 Version: 15.2(5b)E Version: 15.2(2)E5a Version: 15.2(5c)E Version: 15.2(2)E5b Version: 15.2(5a)E1 Version: 15.2(4)E4 Version: 15.2(2)E7 Version: 15.2(5)E2 Version: 15.2(6)E Version: 15.2(4)E5 Version: 15.2(5)E2c Version: 15.2(2)E8 Version: 15.2(6)E0a Version: 15.2(6)E1 Version: 15.2(6)E0c Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(2)E9 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(2)E10 Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(6)E2b Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(7)E2a Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(7)E3k Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(7)E11 Version: 15.2(8)E7 Version: 15.2(7)E12 Version: 15.1(3)MRA Version: 15.1(3)MRA1 Version: 15.1(3)MRA2 Version: 15.1(3)MRA3 Version: 15.1(3)MRA4 Version: 15.1(3)SVB1 Version: 15.1(3)SVB2 Version: 15.2(4)JB5h Version: 15.4(1)S Version: 15.4(2)S Version: 15.4(3)S Version: 15.4(1)S1 Version: 15.4(1)S2 Version: 15.4(2)S1 Version: 15.4(1)S3 Version: 15.4(3)S1 Version: 15.4(2)S2 Version: 15.4(3)S2 Version: 15.4(3)S3 Version: 15.4(1)S4 Version: 15.4(2)S3 Version: 15.4(2)S4 Version: 15.4(3)S4 Version: 15.4(3)S5 Version: 15.4(3)S6 Version: 15.4(3)S7 Version: 15.4(3)S6a Version: 15.4(3)S8 Version: 15.4(3)S9 Version: 15.4(3)S10 Version: 15.3(3)M Version: 15.3(3)M1 Version: 15.3(3)M2 Version: 15.3(3)M3 Version: 15.3(3)M5 Version: 15.3(3)M4 Version: 15.3(3)M6 Version: 15.3(3)M7 Version: 15.3(3)M8 Version: 15.3(3)M9 Version: 15.3(3)M10 Version: 15.3(3)M8a Version: 15.0(2)EZ Version: 15.1(3)SVD Version: 15.1(3)SVD1 Version: 15.1(3)SVD2 Version: 15.2(1)EY Version: 15.0(2)EJ Version: 15.0(2)EJ1 Version: 15.2(1)SY Version: 15.2(1)SY1 Version: 15.2(1)SY0a Version: 15.2(1)SY2 Version: 15.2(2)SY Version: 15.2(1)SY1a Version: 15.2(2)SY1 Version: 15.2(2)SY2 Version: 15.2(1)SY3 Version: 15.2(1)SY4 Version: 15.2(2)SY3 Version: 15.2(1)SY5 Version: 15.2(1)SY6 Version: 15.2(1)SY7 Version: 15.2(1)SY8 Version: 15.2(5)EX Version: 15.1(3)SVF Version: 15.1(3)SVF1 Version: 15.1(3)SVE Version: 15.0(2)EK Version: 15.0(2)EK1 Version: 15.4(1)CG Version: 15.4(1)CG1 Version: 15.4(2)CG Version: 15.5(1)S Version: 15.5(2)S Version: 15.5(1)S1 Version: 15.5(3)S Version: 15.5(1)S2 Version: 15.5(1)S3 Version: 15.5(2)S1 Version: 15.5(2)S2 Version: 15.5(3)S1 Version: 15.5(3)S1a Version: 15.5(2)S3 Version: 15.5(3)S2 Version: 15.5(3)S0a Version: 15.5(3)S3 Version: 15.5(1)S4 Version: 15.5(2)S4 Version: 15.5(3)S4 Version: 15.5(3)S5 Version: 15.5(3)S6 Version: 15.5(3)S6a Version: 15.5(3)S7 Version: 15.5(3)S6b Version: 15.5(3)S8 Version: 15.5(3)S9 Version: 15.5(3)S10 Version: 15.5(3)S9a Version: 15.1(3)SVG Version: 15.2(2)EB Version: 15.2(2)EB1 Version: 15.2(2)EB2 Version: 15.2(6)EB Version: 15.5(1)T Version: 15.5(1)T1 Version: 15.5(2)T Version: 15.5(1)T2 Version: 15.5(1)T3 Version: 15.5(2)T1 Version: 15.5(2)T2 Version: 15.5(2)T3 Version: 15.5(2)T4 Version: 15.5(1)T4 Version: 15.2(2)EA Version: 15.2(2)EA1 Version: 15.2(2)EA2 Version: 15.2(3)EA Version: 15.2(4)EA Version: 15.2(4)EA1 Version: 15.2(2)EA3 Version: 15.2(4)EA3 Version: 15.2(5)EA Version: 15.2(4)EA4 Version: 15.2(4)EA5 Version: 15.2(4)EA6 Version: 15.2(4)EA7 Version: 15.2(4)EA8 Version: 15.2(4)EA9 Version: 15.2(4)EA9a Version: 15.5(3)M Version: 15.5(3)M1 Version: 15.5(3)M0a Version: 15.5(3)M2 Version: 15.5(3)M3 Version: 15.5(3)M4 Version: 15.5(3)M4a Version: 15.5(3)M5 Version: 15.5(3)M6 Version: 15.5(3)M7 Version: 15.5(3)M6a Version: 15.5(3)M8 Version: 15.5(3)M9 Version: 15.5(3)M10 Version: 12.2(33)SCI Version: 12.2(33)SCI1 Version: 12.2(33)SCI1a Version: 12.2(33)SCI2 Version: 12.2(33)SCI3 Version: 12.2(33)SCI2a Version: 15.5(3)SN Version: 15.0(2)SQD Version: 15.0(2)SQD1 Version: 15.0(2)SQD2 Version: 15.0(2)SQD3 Version: 15.0(2)SQD4 Version: 15.0(2)SQD5 Version: 15.0(2)SQD6 Version: 15.0(2)SQD7 Version: 15.0(2)SQD8 Version: 15.6(1)S Version: 15.6(2)S Version: 15.6(2)S1 Version: 15.6(1)S1 Version: 15.6(1)S2 Version: 15.6(2)S2 Version: 15.6(1)S3 Version: 15.6(2)S3 Version: 15.6(1)S4 Version: 15.6(2)S4 Version: 15.6(1)T Version: 15.6(2)T Version: 15.6(1)T0a Version: 15.6(1)T1 Version: 15.6(2)T1 Version: 15.6(1)T2 Version: 15.6(2)T2 Version: 15.6(1)T3 Version: 15.6(2)T3 Version: 15.3(1)SY Version: 15.3(1)SY1 Version: 15.3(1)SY2 Version: 15.3(3)JNC2 Version: 15.3(3)JNC3 Version: 12.2(33)SCJ Version: 12.2(33)SCJ1a Version: 12.2(33)SCJ2 Version: 12.2(33)SCJ2a Version: 12.2(33)SCJ2b Version: 12.2(33)SCJ2c Version: 12.2(33)SCJ3 Version: 12.2(33)SCJ4 Version: 15.6(2)SP Version: 15.6(2)SP1 Version: 15.6(2)SP2 Version: 15.6(2)SP3 Version: 15.6(2)SP4 Version: 15.6(2)SP5 Version: 15.6(2)SP6 Version: 15.6(2)SP7 Version: 15.6(2)SP8 Version: 15.6(2)SP9 Version: 15.6(2)SN Version: 15.6(3)M Version: 15.6(3)M1 Version: 15.6(3)M0a Version: 15.6(3)M1b Version: 15.6(3)M2 Version: 15.6(3)M2a Version: 15.6(3)M3 Version: 15.6(3)M3a Version: 15.6(3)M4 Version: 15.6(3)M5 Version: 15.6(3)M6 Version: 15.6(3)M7 Version: 15.6(3)M6a Version: 15.6(3)M6b Version: 15.6(3)M8 Version: 15.6(3)M9 Version: 15.1(3)SVJ2 Version: 15.2(4)EC1 Version: 15.2(4)EC2 Version: 15.3(3)JPC100 Version: 15.4(1)SY Version: 15.4(1)SY1 Version: 15.4(1)SY2 Version: 15.4(1)SY3 Version: 15.4(1)SY4 Version: 15.5(1)SY Version: 15.5(1)SY1 Version: 15.5(1)SY2 Version: 15.5(1)SY3 Version: 15.5(1)SY4 Version: 15.5(1)SY5 Version: 15.5(1)SY6 Version: 15.5(1)SY7 Version: 15.5(1)SY8 Version: 15.5(1)SY9 Version: 15.5(1)SY10 Version: 15.5(1)SY11 Version: 15.5(1)SY12 Version: 15.5(1)SY13 Version: 15.5(1)SY14 Version: 15.5(1)SY15 Version: 15.7(3)M Version: 15.7(3)M1 Version: 15.7(3)M0a Version: 15.7(3)M3 Version: 15.7(3)M2 Version: 15.7(3)M4 Version: 15.7(3)M5 Version: 15.7(3)M4a Version: 15.7(3)M4b Version: 15.7(3)M6 Version: 15.7(3)M7 Version: 15.7(3)M8 Version: 15.7(3)M9 Version: 15.8(3)M Version: 15.8(3)M1 Version: 15.8(3)M0a Version: 15.8(3)M0b Version: 15.8(3)M2 Version: 15.8(3)M1a Version: 15.8(3)M3 Version: 15.8(3)M2a Version: 15.8(3)M4 Version: 15.8(3)M3a Version: 15.8(3)M3b Version: 15.8(3)M5 Version: 15.8(3)M6 Version: 15.8(3)M7 Version: 15.8(3)M8 Version: 15.8(3)M9 Version: 15.9(3)M Version: 15.9(3)M1 Version: 15.9(3)M0a Version: 15.9(3)M2 Version: 15.9(3)M3 Version: 15.9(3)M2a Version: 15.9(3)M3a Version: 15.9(3)M4 Version: 15.9(3)M3b Version: 15.9(3)M5 Version: 15.9(3)M4a Version: 15.9(3)M6 Version: 15.9(3)M7 Version: 15.9(3)M6a Version: 15.9(3)M6b Version: 15.9(3)M8 Version: 15.9(3)M7a Version: 15.9(3)M9 Version: 15.9(3)M8b Version: 15.9(3)M10 Version: 15.9(3)M11 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20363",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-26T03:55:15.482960Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:47:56.711Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "12.2(15)B"
},
{
"status": "affected",
"version": "12.2(16)B1"
},
{
"status": "affected",
"version": "12.2(16)B2"
},
{
"status": "affected",
"version": "12.2(16)B"
},
{
"status": "affected",
"version": "12.2(15)BC2a"
},
{
"status": "affected",
"version": "12.2(15)BC1a"
},
{
"status": "affected",
"version": "12.2(15)BC1b"
},
{
"status": "affected",
"version": "12.2(15)BC2d"
},
{
"status": "affected",
"version": "12.2(15)BC2g"
},
{
"status": "affected",
"version": "12.2(15)BC1g"
},
{
"status": "affected",
"version": "12.2(15)BC2i"
},
{
"status": "affected",
"version": "12.2(15)BC1c"
},
{
"status": "affected",
"version": "12.2(15)BC2c"
},
{
"status": "affected",
"version": "12.2(15)BC2f"
},
{
"status": "affected",
"version": "12.2(15)BC1d"
},
{
"status": "affected",
"version": "12.2(15)BC1"
},
{
"status": "affected",
"version": "12.2(15)BC2"
},
{
"status": "affected",
"version": "12.2(15)BC2e"
},
{
"status": "affected",
"version": "12.2(15)BC1e"
},
{
"status": "affected",
"version": "12.2(15)BC2h"
},
{
"status": "affected",
"version": "12.2(15)BC1f"
},
{
"status": "affected",
"version": "12.2(15)BC2b"
},
{
"status": "affected",
"version": "12.2(15)BX"
},
{
"status": "affected",
"version": "12.2(16)BX"
},
{
"status": "affected",
"version": "12.2(16)BX2"
},
{
"status": "affected",
"version": "12.2(16)BX3"
},
{
"status": "affected",
"version": "12.2(16)BX1"
},
{
"status": "affected",
"version": "12.2(15)BZ2"
},
{
"status": "affected",
"version": "12.2(15)CX"
},
{
"status": "affected",
"version": "12.2(15)CX1"
},
{
"status": "affected",
"version": "12.2(33)CX"
},
{
"status": "affected",
"version": "12.2(33)CY"
},
{
"status": "affected",
"version": "12.2(33)CY1"
},
{
"status": "affected",
"version": "12.2(33)CY2"
},
{
"status": "affected",
"version": "12.2(15)MC1c"
},
{
"status": "affected",
"version": "12.2(15)MC2g"
},
{
"status": "affected",
"version": "12.2(15)MC2k"
},
{
"status": "affected",
"version": "12.2(15)MC1b"
},
{
"status": "affected",
"version": "12.2(15)MC2b"
},
{
"status": "affected",
"version": "12.2(15)MC2a"
},
{
"status": "affected",
"version": "12.2(15)MC2m"
},
{
"status": "affected",
"version": "12.2(15)MC1"
},
{
"status": "affected",
"version": "12.2(15)MC2"
},
{
"status": "affected",
"version": "12.2(15)MC2f"
},
{
"status": "affected",
"version": "12.2(15)MC2j"
},
{
"status": "affected",
"version": "12.2(15)MC2e"
},
{
"status": "affected",
"version": "12.2(15)MC1a"
},
{
"status": "affected",
"version": "12.2(15)MC2c"
},
{
"status": "affected",
"version": "12.2(15)MC2i"
},
{
"status": "affected",
"version": "12.2(15)MC2h"
},
{
"status": "affected",
"version": "12.2(15)MC2l"
},
{
"status": "affected",
"version": "12.2(11)YU"
},
{
"status": "affected",
"version": "12.2(11)YV"
},
{
"status": "affected",
"version": "12.2(11)YV1"
},
{
"status": "affected",
"version": "12.2(13)ZD"
},
{
"status": "affected",
"version": "12.2(13)ZD3"
},
{
"status": "affected",
"version": "12.2(13)ZD2"
},
{
"status": "affected",
"version": "12.2(13)ZD1"
},
{
"status": "affected",
"version": "12.2(13)ZD4"
},
{
"status": "affected",
"version": "12.2(13)ZE"
},
{
"status": "affected",
"version": "12.2(13)ZF"
},
{
"status": "affected",
"version": "12.2(13)ZF2"
},
{
"status": "affected",
"version": "12.2(13)ZF1"
},
{
"status": "affected",
"version": "12.2(13)ZG"
},
{
"status": "affected",
"version": "12.2(13)ZH"
},
{
"status": "affected",
"version": "12.2(13)ZH5"
},
{
"status": "affected",
"version": "12.2(13)ZH9"
},
{
"status": "affected",
"version": "12.2(13)ZH2"
},
{
"status": "affected",
"version": "12.2(13)ZH8"
},
{
"status": "affected",
"version": "12.2(13)ZH10"
},
{
"status": "affected",
"version": "12.2(13)ZH4"
},
{
"status": "affected",
"version": "12.2(13)ZH3"
},
{
"status": "affected",
"version": "12.2(13)ZH7"
},
{
"status": "affected",
"version": "12.2(13)ZH6"
},
{
"status": "affected",
"version": "12.2(13)ZH1"
},
{
"status": "affected",
"version": "12.2(15)ZJ"
},
{
"status": "affected",
"version": "12.2(15)ZJ2"
},
{
"status": "affected",
"version": "12.2(15)ZJ1"
},
{
"status": "affected",
"version": "12.2(15)ZJ3"
},
{
"status": "affected",
"version": "12.2(15)ZJ5"
},
{
"status": "affected",
"version": "12.2(15)ZL"
},
{
"status": "affected",
"version": "12.2(15)ZL1"
},
{
"status": "affected",
"version": "12.3(9a)"
},
{
"status": "affected",
"version": "12.3(15)"
},
{
"status": "affected",
"version": "12.3(19)"
},
{
"status": "affected",
"version": "12.3(10f)"
},
{
"status": "affected",
"version": "12.3(10a)"
},
{
"status": "affected",
"version": "12.3(1)"
},
{
"status": "affected",
"version": "12.3(1a)"
},
{
"status": "affected",
"version": "12.3(10)"
},
{
"status": "affected",
"version": "12.3(10b)"
},
{
"status": "affected",
"version": "12.3(10c)"
},
{
"status": "affected",
"version": "12.3(10d)"
},
{
"status": "affected",
"version": "12.3(10e)"
},
{
"status": "affected",
"version": "12.3(12b)"
},
{
"status": "affected",
"version": "12.3(12a)"
},
{
"status": "affected",
"version": "12.3(12c)"
},
{
"status": "affected",
"version": "12.3(12d)"
},
{
"status": "affected",
"version": "12.3(12e)"
},
{
"status": "affected",
"version": "12.3(12)"
},
{
"status": "affected",
"version": "12.3(13)"
},
{
"status": "affected",
"version": "12.3(13a)"
},
{
"status": "affected",
"version": "12.3(13b)"
},
{
"status": "affected",
"version": "12.3(15a)"
},
{
"status": "affected",
"version": "12.3(16)"
},
{
"status": "affected",
"version": "12.3(17)"
},
{
"status": "affected",
"version": "12.3(17a)"
},
{
"status": "affected",
"version": "12.3(17b)"
},
{
"status": "affected",
"version": "12.3(18)"
},
{
"status": "affected",
"version": "12.3(20)"
},
{
"status": "affected",
"version": "12.3(3f)"
},
{
"status": "affected",
"version": "12.3(3e)"
},
{
"status": "affected",
"version": "12.3(3g)"
},
{
"status": "affected",
"version": "12.3(3c)"
},
{
"status": "affected",
"version": "12.3(3b)"
},
{
"status": "affected",
"version": "12.3(3a)"
},
{
"status": "affected",
"version": "12.3(3)"
},
{
"status": "affected",
"version": "12.3(3i)"
},
{
"status": "affected",
"version": "12.3(3h)"
},
{
"status": "affected",
"version": "12.3(5c)"
},
{
"status": "affected",
"version": "12.3(5b)"
},
{
"status": "affected",
"version": "12.3(5a)"
},
{
"status": "affected",
"version": "12.3(5)"
},
{
"status": "affected",
"version": "12.3(5f)"
},
{
"status": "affected",
"version": "12.3(5e)"
},
{
"status": "affected",
"version": "12.3(5d)"
},
{
"status": "affected",
"version": "12.3(6f)"
},
{
"status": "affected",
"version": "12.3(6e)"
},
{
"status": "affected",
"version": "12.3(6c)"
},
{
"status": "affected",
"version": "12.3(6b)"
},
{
"status": "affected",
"version": "12.3(6a)"
},
{
"status": "affected",
"version": "12.3(6)"
},
{
"status": "affected",
"version": "12.3(9d)"
},
{
"status": "affected",
"version": "12.3(9e)"
},
{
"status": "affected",
"version": "12.3(9)"
},
{
"status": "affected",
"version": "12.3(9b)"
},
{
"status": "affected",
"version": "12.3(9c)"
},
{
"status": "affected",
"version": "12.3(16a)"
},
{
"status": "affected",
"version": "12.3(15b)"
},
{
"status": "affected",
"version": "12.3(21)"
},
{
"status": "affected",
"version": "12.3(22)"
},
{
"status": "affected",
"version": "12.3(21b)"
},
{
"status": "affected",
"version": "12.3(23)"
},
{
"status": "affected",
"version": "12.3(26)"
},
{
"status": "affected",
"version": "12.3(20a)"
},
{
"status": "affected",
"version": "12.3(22a)"
},
{
"status": "affected",
"version": "12.3(25)"
},
{
"status": "affected",
"version": "12.3(17c)"
},
{
"status": "affected",
"version": "12.3(24)"
},
{
"status": "affected",
"version": "12.3(19a)"
},
{
"status": "affected",
"version": "12.3(24a)"
},
{
"status": "affected",
"version": "12.3(18a)"
},
{
"status": "affected",
"version": "12.3(1a)B"
},
{
"status": "affected",
"version": "12.3(3)B"
},
{
"status": "affected",
"version": "12.3(5a)B"
},
{
"status": "affected",
"version": "12.3(3)B1"
},
{
"status": "affected",
"version": "12.3(5a)B3"
},
{
"status": "affected",
"version": "12.3(5a)B2"
},
{
"status": "affected",
"version": "12.3(5a)B5"
},
{
"status": "affected",
"version": "12.3(5a)B4"
},
{
"status": "affected",
"version": "12.3(5a)B1"
},
{
"status": "affected",
"version": "12.3(11)T"
},
{
"status": "affected",
"version": "12.3(7)T12"
},
{
"status": "affected",
"version": "12.3(11)T11"
},
{
"status": "affected",
"version": "12.3(11)T10"
},
{
"status": "affected",
"version": "12.3(14)T7"
},
{
"status": "affected",
"version": "12.3(14)T"
},
{
"status": "affected",
"version": "12.3(8)T"
},
{
"status": "affected",
"version": "12.3(2)T"
},
{
"status": "affected",
"version": "12.3(4)T"
},
{
"status": "affected",
"version": "12.3(7)T"
},
{
"status": "affected",
"version": "12.3(8)T9"
},
{
"status": "affected",
"version": "12.3(2)T9"
},
{
"status": "affected",
"version": "12.3(8)T6"
},
{
"status": "affected",
"version": "12.3(4)T2a"
},
{
"status": "affected",
"version": "12.3(4)T9"
},
{
"status": "affected",
"version": "12.3(4)T4"
},
{
"status": "affected",
"version": "12.3(2)T1"
},
{
"status": "affected",
"version": "12.3(11)T5"
},
{
"status": "affected",
"version": "12.3(7)T3"
},
{
"status": "affected",
"version": "12.3(2)T2"
},
{
"status": "affected",
"version": "12.3(8)T3"
},
{
"status": "affected",
"version": "12.3(4)T7"
},
{
"status": "affected",
"version": "12.3(8)T7"
},
{
"status": "affected",
"version": "12.3(11)T8"
},
{
"status": "affected",
"version": "12.3(7)T2"
},
{
"status": "affected",
"version": "12.3(8)T4"
},
{
"status": "affected",
"version": "12.3(8)T8"
},
{
"status": "affected",
"version": "12.3(14)T5"
},
{
"status": "affected",
"version": "12.3(11)T3"
},
{
"status": "affected",
"version": "12.3(4)T10"
},
{
"status": "affected",
"version": "12.3(2)T4"
},
{
"status": "affected",
"version": "12.3(8)T10"
},
{
"status": "affected",
"version": "12.3(14)T2"
},
{
"status": "affected",
"version": "12.3(4)T2"
},
{
"status": "affected",
"version": "12.3(7)T7"
},
{
"status": "affected",
"version": "12.3(7)T10"
},
{
"status": "affected",
"version": "12.3(7)T4"
},
{
"status": "affected",
"version": "12.3(11)T6"
},
{
"status": "affected",
"version": "12.3(7)T11"
},
{
"status": "affected",
"version": "12.3(4)T6"
},
{
"status": "affected",
"version": "12.3(2)T3"
},
{
"status": "affected",
"version": "12.3(2)T5"
},
{
"status": "affected",
"version": "12.3(2)T6"
},
{
"status": "affected",
"version": "12.3(4)T3"
},
{
"status": "affected",
"version": "12.3(14)T3"
},
{
"status": "affected",
"version": "12.3(2)T8"
},
{
"status": "affected",
"version": "12.3(11)T4"
},
{
"status": "affected",
"version": "12.3(7)T9"
},
{
"status": "affected",
"version": "12.3(8)T11"
},
{
"status": "affected",
"version": "12.3(11)T9"
},
{
"status": "affected",
"version": "12.3(7)T8"
},
{
"status": "affected",
"version": "12.3(4)T1"
},
{
"status": "affected",
"version": "12.3(8)T5"
},
{
"status": "affected",
"version": "12.3(4)T11"
},
{
"status": "affected",
"version": "12.3(4)T8"
},
{
"status": "affected",
"version": "12.3(14)T1"
},
{
"status": "affected",
"version": "12.3(11)T2"
},
{
"status": "affected",
"version": "12.3(7)T6"
},
{
"status": "affected",
"version": "12.3(2)T7"
},
{
"status": "affected",
"version": "12.3(11)T7"
},
{
"status": "affected",
"version": "12.3(7)T1"
},
{
"status": "affected",
"version": "12.3(14)T6"
},
{
"status": "affected",
"version": "12.3(8)T1"
},
{
"status": "affected",
"version": "12.2(15)CZ"
},
{
"status": "affected",
"version": "12.2(15)CZ1"
},
{
"status": "affected",
"version": "12.2(15)CZ3"
},
{
"status": "affected",
"version": "12.2(15)CZ2"
},
{
"status": "affected",
"version": "12.3(2)XA"
},
{
"status": "affected",
"version": "12.3(2)XA4"
},
{
"status": "affected",
"version": "12.3(2)XA7"
},
{
"status": "affected",
"version": "12.3(2)XA1"
},
{
"status": "affected",
"version": "12.3(2)XA3"
},
{
"status": "affected",
"version": "12.3(2)XA6"
},
{
"status": "affected",
"version": "12.3(2)XA2"
},
{
"status": "affected",
"version": "12.3(2)XA5"
},
{
"status": "affected",
"version": "12.3(4)XQ"
},
{
"status": "affected",
"version": "12.3(4)XQ1"
},
{
"status": "affected",
"version": "12.3(11)XL"
},
{
"status": "affected",
"version": "12.3(11)XL1"
},
{
"status": "affected",
"version": "12.3(4)XK3"
},
{
"status": "affected",
"version": "12.3(4)XK1"
},
{
"status": "affected",
"version": "12.3(4)XK4"
},
{
"status": "affected",
"version": "12.3(4)XK"
},
{
"status": "affected",
"version": "12.3(4)XK2"
},
{
"status": "affected",
"version": "12.3(7)XJ"
},
{
"status": "affected",
"version": "12.3(7)XJ1"
},
{
"status": "affected",
"version": "12.3(7)XJ2"
},
{
"status": "affected",
"version": "12.3(7)XI8"
},
{
"status": "affected",
"version": "12.3(7)XI7"
},
{
"status": "affected",
"version": "12.3(7)XI8d"
},
{
"status": "affected",
"version": "12.3(7)XI10a"
},
{
"status": "affected",
"version": "12.3(7)XI8a"
},
{
"status": "affected",
"version": "12.3(7)XI4"
},
{
"status": "affected",
"version": "12.3(7)XI1b"
},
{
"status": "affected",
"version": "12.3(7)XI7a"
},
{
"status": "affected",
"version": "12.3(7)XI2a"
},
{
"status": "affected",
"version": "12.3(7)XI10"
},
{
"status": "affected",
"version": "12.3(7)XI7b"
},
{
"status": "affected",
"version": "12.3(7)XI1c"
},
{
"status": "affected",
"version": "12.3(7)XI9"
},
{
"status": "affected",
"version": "12.3(7)XI3"
},
{
"status": "affected",
"version": "12.3(7)XI6"
},
{
"status": "affected",
"version": "12.3(7)XI8c"
},
{
"status": "affected",
"version": "12.3(7)XI2"
},
{
"status": "affected",
"version": "12.3(7)XI5"
},
{
"status": "affected",
"version": "12.3(4)XG"
},
{
"status": "affected",
"version": "12.3(4)XG3"
},
{
"status": "affected",
"version": "12.3(4)XG1"
},
{
"status": "affected",
"version": "12.3(4)XG4"
},
{
"status": "affected",
"version": "12.3(4)XG2"
},
{
"status": "affected",
"version": "12.3(4)XG5"
},
{
"status": "affected",
"version": "12.3(2)XF"
},
{
"status": "affected",
"version": "12.3(2)XE"
},
{
"status": "affected",
"version": "12.3(2)XE5"
},
{
"status": "affected",
"version": "12.3(2)XE2"
},
{
"status": "affected",
"version": "12.3(2)XE1"
},
{
"status": "affected",
"version": "12.3(2)XE4"
},
{
"status": "affected",
"version": "12.3(2)XE3"
},
{
"status": "affected",
"version": "12.3(4)XD"
},
{
"status": "affected",
"version": "12.3(4)XD4"
},
{
"status": "affected",
"version": "12.3(4)XD1"
},
{
"status": "affected",
"version": "12.3(4)XD3"
},
{
"status": "affected",
"version": "12.3(4)XD2"
},
{
"status": "affected",
"version": "12.3(2)XC"
},
{
"status": "affected",
"version": "12.3(2)XC4"
},
{
"status": "affected",
"version": "12.3(2)XC3"
},
{
"status": "affected",
"version": "12.3(2)XC2"
},
{
"status": "affected",
"version": "12.3(2)XC1"
},
{
"status": "affected",
"version": "12.3(2)XC5"
},
{
"status": "affected",
"version": "12.3(2)XB2"
},
{
"status": "affected",
"version": "12.3(2)XB"
},
{
"status": "affected",
"version": "12.3(2)XB3"
},
{
"status": "affected",
"version": "12.3(2)XB1"
},
{
"status": "affected",
"version": "12.2(25)EW"
},
{
"status": "affected",
"version": "12.2(25)EWA"
},
{
"status": "affected",
"version": "12.2(25)EWA6"
},
{
"status": "affected",
"version": "12.2(25)EWA5"
},
{
"status": "affected",
"version": "12.2(25)EWA1"
},
{
"status": "affected",
"version": "12.2(25)EWA10"
},
{
"status": "affected",
"version": "12.2(25)EWA8"
},
{
"status": "affected",
"version": "12.2(25)EWA11"
},
{
"status": "affected",
"version": "12.2(25)EWA9"
},
{
"status": "affected",
"version": "12.2(25)EWA2"
},
{
"status": "affected",
"version": "12.2(25)EWA14"
},
{
"status": "affected",
"version": "12.2(25)EWA4"
},
{
"status": "affected",
"version": "12.2(25)EWA3"
},
{
"status": "affected",
"version": "12.2(25)EWA7"
},
{
"status": "affected",
"version": "12.2(25)EWA12"
},
{
"status": "affected",
"version": "12.2(25)EWA13"
},
{
"status": "affected",
"version": "12.2(35)SE"
},
{
"status": "affected",
"version": "12.2(25)SE"
},
{
"status": "affected",
"version": "12.2(37)SE"
},
{
"status": "affected",
"version": "12.2(53)SE1"
},
{
"status": "affected",
"version": "12.2(55)SE"
},
{
"status": "affected",
"version": "12.2(25)SE2"
},
{
"status": "affected",
"version": "12.2(40)SE2"
},
{
"status": "affected",
"version": "12.2(46)SE"
},
{
"status": "affected",
"version": "12.2(46)SE2"
},
{
"status": "affected",
"version": "12.2(50)SE2"
},
{
"status": "affected",
"version": "12.2(35)SE5"
},
{
"status": "affected",
"version": "12.2(50)SE1"
},
{
"status": "affected",
"version": "12.2(44)SE2"
},
{
"status": "affected",
"version": "12.2(35)SE1"
},
{
"status": "affected",
"version": "12.2(50)SE5"
},
{
"status": "affected",
"version": "12.2(35)SE4"
},
{
"status": "affected",
"version": "12.2(44)SE1"
},
{
"status": "affected",
"version": "12.2(53)SE"
},
{
"status": "affected",
"version": "12.2(37)SE1"
},
{
"status": "affected",
"version": "12.2(25)SE3"
},
{
"status": "affected",
"version": "12.2(35)SE3"
},
{
"status": "affected",
"version": "12.2(44)SE4"
},
{
"status": "affected",
"version": "12.2(55)SE3"
},
{
"status": "affected",
"version": "12.2(55)SE2"
},
{
"status": "affected",
"version": "12.2(40)SE"
},
{
"status": "affected",
"version": "12.2(44)SE"
},
{
"status": "affected",
"version": "12.2(52)SE"
},
{
"status": "affected",
"version": "12.2(58)SE"
},
{
"status": "affected",
"version": "12.2(50)SE3"
},
{
"status": "affected",
"version": "12.2(55)SE1"
},
{
"status": "affected",
"version": "12.2(35)SE2"
},
{
"status": "affected",
"version": "12.2(40)SE1"
},
{
"status": "affected",
"version": "12.2(44)SE6"
},
{
"status": "affected",
"version": "12.2(44)SE3"
},
{
"status": "affected",
"version": "12.2(53)SE2"
},
{
"status": "affected",
"version": "12.2(52)SE1"
},
{
"status": "affected",
"version": "12.2(46)SE1"
},
{
"status": "affected",
"version": "12.2(54)SE"
},
{
"status": "affected",
"version": "12.2(44)SE5"
},
{
"status": "affected",
"version": "12.2(50)SE4"
},
{
"status": "affected",
"version": "12.2(50)SE"
},
{
"status": "affected",
"version": "12.2(58)SE1"
},
{
"status": "affected",
"version": "12.2(55)SE4"
},
{
"status": "affected",
"version": "12.2(58)SE2"
},
{
"status": "affected",
"version": "12.2(55)SE5"
},
{
"status": "affected",
"version": "12.2(55)SE6"
},
{
"status": "affected",
"version": "12.2(55)SE7"
},
{
"status": "affected",
"version": "12.2(55)SE8"
},
{
"status": "affected",
"version": "12.2(55)SE9"
},
{
"status": "affected",
"version": "12.2(55)SE10"
},
{
"status": "affected",
"version": "12.2(55)SE11"
},
{
"status": "affected",
"version": "12.2(55)SE12"
},
{
"status": "affected",
"version": "12.2(55)SE13"
},
{
"status": "affected",
"version": "12.3(7)XR"
},
{
"status": "affected",
"version": "12.3(7)XR4"
},
{
"status": "affected",
"version": "12.3(7)XR3"
},
{
"status": "affected",
"version": "12.3(7)XR5"
},
{
"status": "affected",
"version": "12.3(7)XR6"
},
{
"status": "affected",
"version": "12.3(7)XR2"
},
{
"status": "affected",
"version": "12.3(7)XR7"
},
{
"status": "affected",
"version": "12.3(7)XS"
},
{
"status": "affected",
"version": "12.3(7)XS2"
},
{
"status": "affected",
"version": "12.3(7)XS1"
},
{
"status": "affected",
"version": "12.3(8)XU"
},
{
"status": "affected",
"version": "12.3(8)XU5"
},
{
"status": "affected",
"version": "12.3(8)XU2"
},
{
"status": "affected",
"version": "12.3(8)XU1"
},
{
"status": "affected",
"version": "12.3(8)XU4"
},
{
"status": "affected",
"version": "12.3(8)XU3"
},
{
"status": "affected",
"version": "12.3(8)XX"
},
{
"status": "affected",
"version": "12.3(8)XX1"
},
{
"status": "affected",
"version": "12.3(8)XX2d"
},
{
"status": "affected",
"version": "12.3(8)XW"
},
{
"status": "affected",
"version": "12.3(8)XW2"
},
{
"status": "affected",
"version": "12.3(8)XW3"
},
{
"status": "affected",
"version": "12.3(8)XW1"
},
{
"status": "affected",
"version": "12.3(8)XY"
},
{
"status": "affected",
"version": "12.3(8)XY3"
},
{
"status": "affected",
"version": "12.3(8)XY5"
},
{
"status": "affected",
"version": "12.3(8)XY4"
},
{
"status": "affected",
"version": "12.3(8)XY1"
},
{
"status": "affected",
"version": "12.3(8)XY7"
},
{
"status": "affected",
"version": "12.3(8)XY2"
},
{
"status": "affected",
"version": "12.3(8)XY6"
},
{
"status": "affected",
"version": "12.3(2)XZ1"
},
{
"status": "affected",
"version": "12.3(2)XZ2"
},
{
"status": "affected",
"version": "12.3(8)YA"
},
{
"status": "affected",
"version": "12.3(8)YA1"
},
{
"status": "affected",
"version": "12.3(8)YD"
},
{
"status": "affected",
"version": "12.3(8)YD1"
},
{
"status": "affected",
"version": "12.3(11)YF"
},
{
"status": "affected",
"version": "12.3(11)YF2"
},
{
"status": "affected",
"version": "12.3(11)YF3"
},
{
"status": "affected",
"version": "12.3(11)YF4"
},
{
"status": "affected",
"version": "12.3(11)YF1"
},
{
"status": "affected",
"version": "12.3(8)YH"
},
{
"status": "affected",
"version": "12.3(8)YG"
},
{
"status": "affected",
"version": "12.3(8)YG5"
},
{
"status": "affected",
"version": "12.3(8)YG3"
},
{
"status": "affected",
"version": "12.3(8)YG6"
},
{
"status": "affected",
"version": "12.3(8)YG2"
},
{
"status": "affected",
"version": "12.3(8)YG1"
},
{
"status": "affected",
"version": "12.3(8)YG4"
},
{
"status": "affected",
"version": "12.3(13a)BC6"
},
{
"status": "affected",
"version": "12.3(17a)BC2"
},
{
"status": "affected",
"version": "12.3(17a)BC"
},
{
"status": "affected",
"version": "12.3(13a)BC"
},
{
"status": "affected",
"version": "12.3(21)BC"
},
{
"status": "affected",
"version": "12.3(9a)BC"
},
{
"status": "affected",
"version": "12.3(21a)BC9"
},
{
"status": "affected",
"version": "12.3(21a)BC4"
},
{
"status": "affected",
"version": "12.3(9a)BC9"
},
{
"status": "affected",
"version": "12.3(17b)BC6"
},
{
"status": "affected",
"version": "12.3(13a)BC2"
},
{
"status": "affected",
"version": "12.3(23)BC"
},
{
"status": "affected",
"version": "12.3(17b)BC3"
},
{
"status": "affected",
"version": "12.3(9a)BC2"
},
{
"status": "affected",
"version": "12.3(17b)BC9"
},
{
"status": "affected",
"version": "12.3(23)BC8"
},
{
"status": "affected",
"version": "12.3(23)BC10"
},
{
"status": "affected",
"version": "12.3(23)BC1"
},
{
"status": "affected",
"version": "12.3(9a)BC1"
},
{
"status": "affected",
"version": "12.3(17b)BC8"
},
{
"status": "affected",
"version": "12.3(9a)BC3"
},
{
"status": "affected",
"version": "12.3(23)BC9"
},
{
"status": "affected",
"version": "12.3(21a)BC6"
},
{
"status": "affected",
"version": "12.3(9a)BC6"
},
{
"status": "affected",
"version": "12.3(9a)BC5"
},
{
"status": "affected",
"version": "12.3(23)BC7"
},
{
"status": "affected",
"version": "12.3(13a)BC3"
},
{
"status": "affected",
"version": "12.3(23)BC6"
},
{
"status": "affected",
"version": "12.3(23)BC4"
},
{
"status": "affected",
"version": "12.3(13a)BC1"
},
{
"status": "affected",
"version": "12.3(17b)BC5"
},
{
"status": "affected",
"version": "12.3(21a)BC8"
},
{
"status": "affected",
"version": "12.3(9a)BC8"
},
{
"status": "affected",
"version": "12.3(21a)BC3"
},
{
"status": "affected",
"version": "12.3(21a)BC7"
},
{
"status": "affected",
"version": "12.3(9a)BC7"
},
{
"status": "affected",
"version": "12.3(23)BC5"
},
{
"status": "affected",
"version": "12.3(13a)BC5"
},
{
"status": "affected",
"version": "12.3(9a)BC4"
},
{
"status": "affected",
"version": "12.3(21a)BC2"
},
{
"status": "affected",
"version": "12.3(13a)BC4"
},
{
"status": "affected",
"version": "12.3(17b)BC7"
},
{
"status": "affected",
"version": "12.3(23)BC3"
},
{
"status": "affected",
"version": "12.3(21a)BC1"
},
{
"status": "affected",
"version": "12.3(17a)BC1"
},
{
"status": "affected",
"version": "12.3(17b)BC4"
},
{
"status": "affected",
"version": "12.3(23)BC2"
},
{
"status": "affected",
"version": "12.3(21a)BC5"
},
{
"status": "affected",
"version": "12.3(1a)BW"
},
{
"status": "affected",
"version": "12.3(11)YJ"
},
{
"status": "affected",
"version": "12.3(8)YI2"
},
{
"status": "affected",
"version": "12.3(8)YI3"
},
{
"status": "affected",
"version": "12.3(8)YI1"
},
{
"status": "affected",
"version": "12.3(11)YK"
},
{
"status": "affected",
"version": "12.3(11)YK1"
},
{
"status": "affected",
"version": "12.3(11)YK2"
},
{
"status": "affected",
"version": "12.3(11)YK3"
},
{
"status": "affected",
"version": "12.2(25)EX"
},
{
"status": "affected",
"version": "12.2(35)EX"
},
{
"status": "affected",
"version": "12.2(44)EX"
},
{
"status": "affected",
"version": "12.2(35)EX2"
},
{
"status": "affected",
"version": "12.2(40)EX3"
},
{
"status": "affected",
"version": "12.2(40)EX"
},
{
"status": "affected",
"version": "12.2(53)EX"
},
{
"status": "affected",
"version": "12.2(37)EX"
},
{
"status": "affected",
"version": "12.2(52)EX"
},
{
"status": "affected",
"version": "12.2(44)EX1"
},
{
"status": "affected",
"version": "12.2(35)EX1"
},
{
"status": "affected",
"version": "12.2(25)EX1"
},
{
"status": "affected",
"version": "12.2(40)EX2"
},
{
"status": "affected",
"version": "12.2(40)EX1"
},
{
"status": "affected",
"version": "12.2(55)EX"
},
{
"status": "affected",
"version": "12.2(46)EX"
},
{
"status": "affected",
"version": "12.2(52)EX1"
},
{
"status": "affected",
"version": "12.2(55)EX1"
},
{
"status": "affected",
"version": "12.2(55)EX2"
},
{
"status": "affected",
"version": "12.2(55)EX3"
},
{
"status": "affected",
"version": "12.2(58)EX"
},
{
"status": "affected",
"version": "12.2(25)SEB"
},
{
"status": "affected",
"version": "12.2(25)SEB2"
},
{
"status": "affected",
"version": "12.2(25)SEB1"
},
{
"status": "affected",
"version": "12.2(25)SEB4"
},
{
"status": "affected",
"version": "12.2(25)SEB3"
},
{
"status": "affected",
"version": "12.2(25)SEA"
},
{
"status": "affected",
"version": "12.2(25)EY"
},
{
"status": "affected",
"version": "12.2(46)EY"
},
{
"status": "affected",
"version": "12.2(55)EY"
},
{
"status": "affected",
"version": "12.2(52)EY1"
},
{
"status": "affected",
"version": "12.2(25)EY1"
},
{
"status": "affected",
"version": "12.2(44)EY"
},
{
"status": "affected",
"version": "12.2(52)EY"
},
{
"status": "affected",
"version": "12.2(53)EY"
},
{
"status": "affected",
"version": "12.2(25)EY3"
},
{
"status": "affected",
"version": "12.2(52)EY2"
},
{
"status": "affected",
"version": "12.2(37)EY"
},
{
"status": "affected",
"version": "12.2(25)EY2"
},
{
"status": "affected",
"version": "12.2(25)EY4"
},
{
"status": "affected",
"version": "12.2(52)EY1b"
},
{
"status": "affected",
"version": "12.2(52)EY1c"
},
{
"status": "affected",
"version": "12.2(58)EY"
},
{
"status": "affected",
"version": "12.2(52)EY3"
},
{
"status": "affected",
"version": "12.2(52)EY2a"
},
{
"status": "affected",
"version": "12.2(58)EY1"
},
{
"status": "affected",
"version": "12.2(52)EY4"
},
{
"status": "affected",
"version": "12.2(52)EY3a"
},
{
"status": "affected",
"version": "12.2(58)EY2"
},
{
"status": "affected",
"version": "12.3(2)JA"
},
{
"status": "affected",
"version": "12.3(2)JA1"
},
{
"status": "affected",
"version": "12.3(2)JA2"
},
{
"status": "affected",
"version": "12.3(2)JA3"
},
{
"status": "affected",
"version": "12.3(2)JA4"
},
{
"status": "affected",
"version": "12.3(2)JA5"
},
{
"status": "affected",
"version": "12.3(4)JA1"
},
{
"status": "affected",
"version": "12.3(4)JA"
},
{
"status": "affected",
"version": "12.3(7)JA1"
},
{
"status": "affected",
"version": "12.3(7)JA"
},
{
"status": "affected",
"version": "12.3(8)JA"
},
{
"status": "affected",
"version": "12.3(8)JA1"
},
{
"status": "affected",
"version": "12.3(8)JA2"
},
{
"status": "affected",
"version": "12.3(11)JA"
},
{
"status": "affected",
"version": "12.3(7)JA4"
},
{
"status": "affected",
"version": "12.3(4)JA2"
},
{
"status": "affected",
"version": "12.3(7)JA5"
},
{
"status": "affected",
"version": "12.3(11)JA3"
},
{
"status": "affected",
"version": "12.3(11)JA4"
},
{
"status": "affected",
"version": "12.3(2)JA6"
},
{
"status": "affected",
"version": "12.3(11)JA2"
},
{
"status": "affected",
"version": "12.3(11)JA1"
},
{
"status": "affected",
"version": "12.3(7)JA3"
},
{
"status": "affected",
"version": "12.3(7)JA2"
},
{
"status": "affected",
"version": "12.3(14)YQ8"
},
{
"status": "affected",
"version": "12.3(14)YQ"
},
{
"status": "affected",
"version": "12.3(14)YQ5"
},
{
"status": "affected",
"version": "12.3(14)YQ4"
},
{
"status": "affected",
"version": "12.3(14)YQ7"
},
{
"status": "affected",
"version": "12.3(14)YQ1"
},
{
"status": "affected",
"version": "12.3(14)YQ6"
},
{
"status": "affected",
"version": "12.3(14)YQ3"
},
{
"status": "affected",
"version": "12.3(14)YQ2"
},
{
"status": "affected",
"version": "12.3(11)YS"
},
{
"status": "affected",
"version": "12.3(11)YS1"
},
{
"status": "affected",
"version": "12.3(11)YS2"
},
{
"status": "affected",
"version": "12.4(3e)"
},
{
"status": "affected",
"version": "12.4(7b)"
},
{
"status": "affected",
"version": "12.4(8)"
},
{
"status": "affected",
"version": "12.4(5b)"
},
{
"status": "affected",
"version": "12.4(7a)"
},
{
"status": "affected",
"version": "12.4(3d)"
},
{
"status": "affected",
"version": "12.4(1)"
},
{
"status": "affected",
"version": "12.4(1a)"
},
{
"status": "affected",
"version": "12.4(1b)"
},
{
"status": "affected",
"version": "12.4(1c)"
},
{
"status": "affected",
"version": "12.4(10)"
},
{
"status": "affected",
"version": "12.4(3)"
},
{
"status": "affected",
"version": "12.4(3a)"
},
{
"status": "affected",
"version": "12.4(3b)"
},
{
"status": "affected",
"version": "12.4(3c)"
},
{
"status": "affected",
"version": "12.4(3f)"
},
{
"status": "affected",
"version": "12.4(5)"
},
{
"status": "affected",
"version": "12.4(5a)"
},
{
"status": "affected",
"version": "12.4(7c)"
},
{
"status": "affected",
"version": "12.4(7)"
},
{
"status": "affected",
"version": "12.4(8a)"
},
{
"status": "affected",
"version": "12.4(8b)"
},
{
"status": "affected",
"version": "12.4(7d)"
},
{
"status": "affected",
"version": "12.4(3g)"
},
{
"status": "affected",
"version": "12.4(8c)"
},
{
"status": "affected",
"version": "12.4(10b)"
},
{
"status": "affected",
"version": "12.4(12)"
},
{
"status": "affected",
"version": "12.4(12a)"
},
{
"status": "affected",
"version": "12.4(12b)"
},
{
"status": "affected",
"version": "12.4(13)"
},
{
"status": "affected",
"version": "12.4(13a)"
},
{
"status": "affected",
"version": "12.4(13b)"
},
{
"status": "affected",
"version": "12.4(13c)"
},
{
"status": "affected",
"version": "12.4(7e)"
},
{
"status": "affected",
"version": "12.4(17)"
},
{
"status": "affected",
"version": "12.4(25e)"
},
{
"status": "affected",
"version": "12.4(18b)"
},
{
"status": "affected",
"version": "12.4(18e)"
},
{
"status": "affected",
"version": "12.4(25g)"
},
{
"status": "affected",
"version": "12.4(3i)"
},
{
"status": "affected",
"version": "12.4(3j)"
},
{
"status": "affected",
"version": "12.4(23b)"
},
{
"status": "affected",
"version": "12.4(3h)"
},
{
"status": "affected",
"version": "12.4(7h)"
},
{
"status": "affected",
"version": "12.4(25a)"
},
{
"status": "affected",
"version": "12.4(16)"
},
{
"status": "affected",
"version": "12.4(13d)"
},
{
"status": "affected",
"version": "12.4(25)"
},
{
"status": "affected",
"version": "12.4(25c)"
},
{
"status": "affected",
"version": "12.4(19)"
},
{
"status": "affected",
"version": "12.4(13e)"
},
{
"status": "affected",
"version": "12.4(25b)"
},
{
"status": "affected",
"version": "12.4(23)"
},
{
"status": "affected",
"version": "12.4(10c)"
},
{
"status": "affected",
"version": "12.4(21)"
},
{
"status": "affected",
"version": "12.4(16b)"
},
{
"status": "affected",
"version": "12.4(16a)"
},
{
"status": "affected",
"version": "12.4(23a)"
},
{
"status": "affected",
"version": "12.4(25d)"
},
{
"status": "affected",
"version": "12.4(7f)"
},
{
"status": "affected",
"version": "12.4(18)"
},
{
"status": "affected",
"version": "12.4(21a)"
},
{
"status": "affected",
"version": "12.4(13f)"
},
{
"status": "affected",
"version": "12.4(25f)"
},
{
"status": "affected",
"version": "12.4(18c)"
},
{
"status": "affected",
"version": "12.4(5c)"
},
{
"status": "affected",
"version": "12.4(8d)"
},
{
"status": "affected",
"version": "12.4(12c)"
},
{
"status": "affected",
"version": "12.4(17a)"
},
{
"status": "affected",
"version": "12.4(18a)"
},
{
"status": "affected",
"version": "12.4(17b)"
},
{
"status": "affected",
"version": "12.4(7g)"
},
{
"status": "affected",
"version": "12.2(25)EZ"
},
{
"status": "affected",
"version": "12.2(25)EZ1"
},
{
"status": "affected",
"version": "12.2(58)EZ"
},
{
"status": "affected",
"version": "12.2(53)EZ"
},
{
"status": "affected",
"version": "12.2(55)EZ"
},
{
"status": "affected",
"version": "12.2(60)EZ"
},
{
"status": "affected",
"version": "12.2(60)EZ1"
},
{
"status": "affected",
"version": "12.2(60)EZ2"
},
{
"status": "affected",
"version": "12.2(60)EZ3"
},
{
"status": "affected",
"version": "12.2(60)EZ4"
},
{
"status": "affected",
"version": "12.2(60)EZ5"
},
{
"status": "affected",
"version": "12.2(60)EZ6"
},
{
"status": "affected",
"version": "12.2(60)EZ7"
},
{
"status": "affected",
"version": "12.2(60)EZ8"
},
{
"status": "affected",
"version": "12.2(60)EZ9"
},
{
"status": "affected",
"version": "12.2(60)EZ10"
},
{
"status": "affected",
"version": "12.2(60)EZ11"
},
{
"status": "affected",
"version": "12.2(60)EZ12"
},
{
"status": "affected",
"version": "12.2(60)EZ13"
},
{
"status": "affected",
"version": "12.2(60)EZ14"
},
{
"status": "affected",
"version": "12.2(60)EZ15"
},
{
"status": "affected",
"version": "12.2(25)SEC"
},
{
"status": "affected",
"version": "12.2(25)SEC2"
},
{
"status": "affected",
"version": "12.2(25)SEC1"
},
{
"status": "affected",
"version": "12.3(2)JK"
},
{
"status": "affected",
"version": "12.3(2)JK1"
},
{
"status": "affected",
"version": "12.3(2)JK2"
},
{
"status": "affected",
"version": "12.3(8)JK"
},
{
"status": "affected",
"version": "12.3(8)JK1"
},
{
"status": "affected",
"version": "12.3(2)JK3"
},
{
"status": "affected",
"version": "12.3(14)YU"
},
{
"status": "affected",
"version": "12.3(14)YU1"
},
{
"status": "affected",
"version": "12.4(6)MR1"
},
{
"status": "affected",
"version": "12.4(11)MR"
},
{
"status": "affected",
"version": "12.4(2)MR"
},
{
"status": "affected",
"version": "12.4(4)MR"
},
{
"status": "affected",
"version": "12.4(6)MR"
},
{
"status": "affected",
"version": "12.4(9)MR"
},
{
"status": "affected",
"version": "12.4(12)MR"
},
{
"status": "affected",
"version": "12.4(16)MR"
},
{
"status": "affected",
"version": "12.4(16)MR1"
},
{
"status": "affected",
"version": "12.4(19)MR2"
},
{
"status": "affected",
"version": "12.4(19)MR1"
},
{
"status": "affected",
"version": "12.4(19)MR"
},
{
"status": "affected",
"version": "12.4(20)MR"
},
{
"status": "affected",
"version": "12.4(4)MR1"
},
{
"status": "affected",
"version": "12.4(19)MR3"
},
{
"status": "affected",
"version": "12.4(12)MR1"
},
{
"status": "affected",
"version": "12.4(20)MR2"
},
{
"status": "affected",
"version": "12.4(16)MR2"
},
{
"status": "affected",
"version": "12.4(12)MR2"
},
{
"status": "affected",
"version": "12.4(2)MR1"
},
{
"status": "affected",
"version": "12.4(20)MR1"
},
{
"status": "affected",
"version": "12.4(4)T"
},
{
"status": "affected",
"version": "12.4(4)T1"
},
{
"status": "affected",
"version": "12.4(4)T2"
},
{
"status": "affected",
"version": "12.4(4)T3"
},
{
"status": "affected",
"version": "12.4(6)T"
},
{
"status": "affected",
"version": "12.4(6)T1"
},
{
"status": "affected",
"version": "12.4(6)T2"
},
{
"status": "affected",
"version": "12.4(9)T"
},
{
"status": "affected",
"version": "12.4(4)T4"
},
{
"status": "affected",
"version": "12.4(2)T5"
},
{
"status": "affected",
"version": "12.4(6)T3"
},
{
"status": "affected",
"version": "12.4(2)T"
},
{
"status": "affected",
"version": "12.4(11)T"
},
{
"status": "affected",
"version": "12.4(15)T"
},
{
"status": "affected",
"version": "12.4(20)T"
},
{
"status": "affected",
"version": "12.4(24)T"
},
{
"status": "affected",
"version": "12.4(24)T3"
},
{
"status": "affected",
"version": "12.4(4)T8"
},
{
"status": "affected",
"version": "12.4(20)T1"
},
{
"status": "affected",
"version": "12.4(22)T1"
},
{
"status": "affected",
"version": "12.4(15)T9"
},
{
"status": "affected",
"version": "12.4(11)T4"
},
{
"status": "affected",
"version": "12.4(15)T8"
},
{
"status": "affected",
"version": "12.4(6)T5"
},
{
"status": "affected",
"version": "12.4(15)T15"
},
{
"status": "affected",
"version": "12.4(24)T5"
},
{
"status": "affected",
"version": "12.4(15)T2"
},
{
"status": "affected",
"version": "12.4(6)T8"
},
{
"status": "affected",
"version": "12.4(15)T12"
},
{
"status": "affected",
"version": "12.4(24)T4"
},
{
"status": "affected",
"version": "12.4(6)T11"
},
{
"status": "affected",
"version": "12.4(9)T5"
},
{
"status": "affected",
"version": "12.4(20)T3"
},
{
"status": "affected",
"version": "12.4(6)T4"
},
{
"status": "affected",
"version": "12.4(4)T6"
},
{
"status": "affected",
"version": "12.4(22)T"
},
{
"status": "affected",
"version": "12.4(20)T6"
},
{
"status": "affected",
"version": "12.4(9)T3"
},
{
"status": "affected",
"version": "12.4(24)T8"
},
{
"status": "affected",
"version": "12.4(6)T7"
},
{
"status": "affected",
"version": "12.4(15)T13"
},
{
"status": "affected",
"version": "12.4(6)T10"
},
{
"status": "affected",
"version": "12.4(15)T3"
},
{
"status": "affected",
"version": "12.4(24)T2"
},
{
"status": "affected",
"version": "12.4(22)T5"
},
{
"status": "affected",
"version": "12.4(2)T3"
},
{
"status": "affected",
"version": "12.4(15)T10"
},
{
"status": "affected",
"version": "12.4(22)T4"
},
{
"status": "affected",
"version": "12.4(20)T5"
},
{
"status": "affected",
"version": "12.4(9)T6"
},
{
"status": "affected",
"version": "12.4(15)T4"
},
{
"status": "affected",
"version": "12.4(2)T4"
},
{
"status": "affected",
"version": "12.4(24)T1"
},
{
"status": "affected",
"version": "12.4(9)T4"
},
{
"status": "affected",
"version": "12.4(24)T7"
},
{
"status": "affected",
"version": "12.4(22)T3"
},
{
"status": "affected",
"version": "12.4(9)T1"
},
{
"status": "affected",
"version": "12.4(24)T6"
},
{
"status": "affected",
"version": "12.4(6)T9"
},
{
"status": "affected",
"version": "12.4(15)T5"
},
{
"status": "affected",
"version": "12.4(4)T7"
},
{
"status": "affected",
"version": "12.4(20)T2"
},
{
"status": "affected",
"version": "12.4(2)T1"
},
{
"status": "affected",
"version": "12.4(11)T1"
},
{
"status": "affected",
"version": "12.4(15)T11"
},
{
"status": "affected",
"version": "12.4(2)T6"
},
{
"status": "affected",
"version": "12.4(2)T2"
},
{
"status": "affected",
"version": "12.4(15)T7"
},
{
"status": "affected",
"version": "12.4(11)T2"
},
{
"status": "affected",
"version": "12.4(9)T7"
},
{
"status": "affected",
"version": "12.4(15)T14"
},
{
"status": "affected",
"version": "12.4(11)T3"
},
{
"status": "affected",
"version": "12.4(15)T6"
},
{
"status": "affected",
"version": "12.4(15)T16"
},
{
"status": "affected",
"version": "12.4(15)T1"
},
{
"status": "affected",
"version": "12.4(9)T2"
},
{
"status": "affected",
"version": "12.4(6)T6"
},
{
"status": "affected",
"version": "12.4(22)T2"
},
{
"status": "affected",
"version": "12.4(4)T5"
},
{
"status": "affected",
"version": "12.4(20)T4"
},
{
"status": "affected",
"version": "12.4(24)T4a"
},
{
"status": "affected",
"version": "12.4(24)T4b"
},
{
"status": "affected",
"version": "12.4(24)T3e"
},
{
"status": "affected",
"version": "12.4(24)T4c"
},
{
"status": "affected",
"version": "12.4(15)T17"
},
{
"status": "affected",
"version": "12.4(24)T4d"
},
{
"status": "affected",
"version": "12.4(24)T4e"
},
{
"status": "affected",
"version": "12.4(24)T3f"
},
{
"status": "affected",
"version": "12.4(24)T4f"
},
{
"status": "affected",
"version": "12.4(24)T4l"
},
{
"status": "affected",
"version": "12.3(14)YT"
},
{
"status": "affected",
"version": "12.3(14)YT1"
},
{
"status": "affected",
"version": "12.2(31)SG"
},
{
"status": "affected",
"version": "12.2(25)SG"
},
{
"status": "affected",
"version": "12.2(37)SG"
},
{
"status": "affected",
"version": "12.2(44)SG"
},
{
"status": "affected",
"version": "12.2(50)SG3"
},
{
"status": "affected",
"version": "12.2(31)SG1"
},
{
"status": "affected",
"version": "12.2(53)SG"
},
{
"status": "affected",
"version": "12.2(31)SG3"
},
{
"status": "affected",
"version": "12.2(50)SG6"
},
{
"status": "affected",
"version": "12.2(53)SG1"
},
{
"status": "affected",
"version": "12.2(46)SG"
},
{
"status": "affected",
"version": "12.2(25)SG1"
},
{
"status": "affected",
"version": "12.2(53)SG2"
},
{
"status": "affected",
"version": "12.2(50)SG5"
},
{
"status": "affected",
"version": "12.2(37)SG1"
},
{
"status": "affected",
"version": "12.2(53)SG3"
},
{
"status": "affected",
"version": "12.2(50)SG8"
},
{
"status": "affected",
"version": "12.2(25)SG3"
},
{
"status": "affected",
"version": "12.2(50)SG2"
},
{
"status": "affected",
"version": "12.2(40)SG"
},
{
"status": "affected",
"version": "12.2(25)SG2"
},
{
"status": "affected",
"version": "12.2(54)SG1"
},
{
"status": "affected",
"version": "12.2(44)SG1"
},
{
"status": "affected",
"version": "12.2(50)SG1"
},
{
"status": "affected",
"version": "12.2(52)SG"
},
{
"status": "affected",
"version": "12.2(54)SG"
},
{
"status": "affected",
"version": "12.2(31)SG2"
},
{
"status": "affected",
"version": "12.2(50)SG"
},
{
"status": "affected",
"version": "12.2(25)SG4"
},
{
"status": "affected",
"version": "12.2(50)SG7"
},
{
"status": "affected",
"version": "12.2(53)SG4"
},
{
"status": "affected",
"version": "12.2(50)SG4"
},
{
"status": "affected",
"version": "12.2(46)SG1"
},
{
"status": "affected",
"version": "12.2(53)SG5"
},
{
"status": "affected",
"version": "12.2(53)SG6"
},
{
"status": "affected",
"version": "12.2(53)SG7"
},
{
"status": "affected",
"version": "12.2(53)SG8"
},
{
"status": "affected",
"version": "12.2(53)SG9"
},
{
"status": "affected",
"version": "12.2(53)SG10"
},
{
"status": "affected",
"version": "12.2(53)SG11"
},
{
"status": "affected",
"version": "12.2(25)FX"
},
{
"status": "affected",
"version": "12.2(25)FY"
},
{
"status": "affected",
"version": "12.3(7)JX2"
},
{
"status": "affected",
"version": "12.3(7)JX"
},
{
"status": "affected",
"version": "12.3(7)JX1"
},
{
"status": "affected",
"version": "12.3(7)JX4"
},
{
"status": "affected",
"version": "12.3(11)JX"
},
{
"status": "affected",
"version": "12.3(7)JX7"
},
{
"status": "affected",
"version": "12.3(7)JX12"
},
{
"status": "affected",
"version": "12.3(7)JX9"
},
{
"status": "affected",
"version": "12.3(7)JX10"
},
{
"status": "affected",
"version": "12.3(11)JX1"
},
{
"status": "affected",
"version": "12.3(7)JX6"
},
{
"status": "affected",
"version": "12.3(7)JX5"
},
{
"status": "affected",
"version": "12.3(7)JX3"
},
{
"status": "affected",
"version": "12.3(7)JX11"
},
{
"status": "affected",
"version": "12.3(7)JX8"
},
{
"status": "affected",
"version": "12.3(4)TPC11b"
},
{
"status": "affected",
"version": "12.3(4)TPC11a"
},
{
"status": "affected",
"version": "12.4(2)XB"
},
{
"status": "affected",
"version": "12.4(2)XB1"
},
{
"status": "affected",
"version": "12.4(2)XB6"
},
{
"status": "affected",
"version": "12.4(2)XB7"
},
{
"status": "affected",
"version": "12.4(2)XB11"
},
{
"status": "affected",
"version": "12.4(2)XB3"
},
{
"status": "affected",
"version": "12.4(2)XB9"
},
{
"status": "affected",
"version": "12.4(2)XB8"
},
{
"status": "affected",
"version": "12.4(2)XB2"
},
{
"status": "affected",
"version": "12.4(2)XB10"
},
{
"status": "affected",
"version": "12.4(2)XB4"
},
{
"status": "affected",
"version": "12.4(2)XB5"
},
{
"status": "affected",
"version": "12.4(2)XB12"
},
{
"status": "affected",
"version": "12.4(2)XA"
},
{
"status": "affected",
"version": "12.4(2)XA1"
},
{
"status": "affected",
"version": "12.4(2)XA2"
},
{
"status": "affected",
"version": "12.3(14)YM8"
},
{
"status": "affected",
"version": "12.3(14)YM12"
},
{
"status": "affected",
"version": "12.3(14)YM4"
},
{
"status": "affected",
"version": "12.3(14)YM3"
},
{
"status": "affected",
"version": "12.3(14)YM7"
},
{
"status": "affected",
"version": "12.3(14)YM11"
},
{
"status": "affected",
"version": "12.3(14)YM9"
},
{
"status": "affected",
"version": "12.3(14)YM6"
},
{
"status": "affected",
"version": "12.3(14)YM10"
},
{
"status": "affected",
"version": "12.3(14)YM13"
},
{
"status": "affected",
"version": "12.3(14)YM5"
},
{
"status": "affected",
"version": "12.3(14)YM2"
},
{
"status": "affected",
"version": "12.2(31)SB3x"
},
{
"status": "affected",
"version": "12.2(33)SB3"
},
{
"status": "affected",
"version": "12.2(31)SB5"
},
{
"status": "affected",
"version": "12.2(31)SB10"
},
{
"status": "affected",
"version": "12.2(33)SB9"
},
{
"status": "affected",
"version": "12.2(31)SB15"
},
{
"status": "affected",
"version": "12.2(33)SB10"
},
{
"status": "affected",
"version": "12.2(33)SB6"
},
{
"status": "affected",
"version": "12.2(31)SB11"
},
{
"status": "affected",
"version": "12.2(31)SB7"
},
{
"status": "affected",
"version": "12.2(33)SB5"
},
{
"status": "affected",
"version": "12.2(31)SB6"
},
{
"status": "affected",
"version": "12.2(33)SB8"
},
{
"status": "affected",
"version": "12.2(31)SB17"
},
{
"status": "affected",
"version": "12.2(31)SB13"
},
{
"status": "affected",
"version": "12.2(31)SB9"
},
{
"status": "affected",
"version": "12.2(31)SB16"
},
{
"status": "affected",
"version": "12.2(31)SB12"
},
{
"status": "affected",
"version": "12.2(31)SB20"
},
{
"status": "affected",
"version": "12.2(33)SB2"
},
{
"status": "affected",
"version": "12.2(31)SB8"
},
{
"status": "affected",
"version": "12.2(31)SB3"
},
{
"status": "affected",
"version": "12.2(31)SB18"
},
{
"status": "affected",
"version": "12.2(31)SB2"
},
{
"status": "affected",
"version": "12.2(31)SB14"
},
{
"status": "affected",
"version": "12.2(31)SB19"
},
{
"status": "affected",
"version": "12.2(33)SB"
},
{
"status": "affected",
"version": "12.2(33)SB7"
},
{
"status": "affected",
"version": "12.2(33)SB1"
},
{
"status": "affected",
"version": "12.2(33)SB4"
},
{
"status": "affected",
"version": "12.2(33)SB11"
},
{
"status": "affected",
"version": "12.2(31)SB21"
},
{
"status": "affected",
"version": "12.2(33)SB12"
},
{
"status": "affected",
"version": "12.2(33)SB13"
},
{
"status": "affected",
"version": "12.2(33)SB14"
},
{
"status": "affected",
"version": "12.2(33)SB15"
},
{
"status": "affected",
"version": "12.2(33)SB16"
},
{
"status": "affected",
"version": "12.2(33)SB17"
},
{
"status": "affected",
"version": "12.2(33)SB8a"
},
{
"status": "affected",
"version": "12.2(33)SRA"
},
{
"status": "affected",
"version": "12.2(33)SRA6"
},
{
"status": "affected",
"version": "12.2(33)SRA7"
},
{
"status": "affected",
"version": "12.2(33)SRA2"
},
{
"status": "affected",
"version": "12.2(33)SRA3"
},
{
"status": "affected",
"version": "12.2(33)SRA1"
},
{
"status": "affected",
"version": "12.2(33)SRA4"
},
{
"status": "affected",
"version": "12.2(33)SRA5"
},
{
"status": "affected",
"version": "12.4(4)XC"
},
{
"status": "affected",
"version": "12.4(4)XC1"
},
{
"status": "affected",
"version": "12.4(4)XC5"
},
{
"status": "affected",
"version": "12.4(4)XC7"
},
{
"status": "affected",
"version": "12.4(4)XC3"
},
{
"status": "affected",
"version": "12.4(4)XC4"
},
{
"status": "affected",
"version": "12.4(4)XC2"
},
{
"status": "affected",
"version": "12.4(4)XC6"
},
{
"status": "affected",
"version": "12.4(4)XD"
},
{
"status": "affected",
"version": "12.4(4)XD4"
},
{
"status": "affected",
"version": "12.4(4)XD10"
},
{
"status": "affected",
"version": "12.4(4)XD12"
},
{
"status": "affected",
"version": "12.4(4)XD2"
},
{
"status": "affected",
"version": "12.4(4)XD8"
},
{
"status": "affected",
"version": "12.4(4)XD11"
},
{
"status": "affected",
"version": "12.4(4)XD1"
},
{
"status": "affected",
"version": "12.4(4)XD5"
},
{
"status": "affected",
"version": "12.4(4)XD7"
},
{
"status": "affected",
"version": "12.4(4)XD9"
},
{
"status": "affected",
"version": "12.4(6)XE"
},
{
"status": "affected",
"version": "12.4(6)XE2"
},
{
"status": "affected",
"version": "12.4(6)XE1"
},
{
"status": "affected",
"version": "12.2(25)SEF1"
},
{
"status": "affected",
"version": "12.2(25)SEF2"
},
{
"status": "affected",
"version": "12.2(25)SEF3"
},
{
"status": "affected",
"version": "12.2(25)SEE"
},
{
"status": "affected",
"version": "12.2(25)SEE1"
},
{
"status": "affected",
"version": "12.2(25)SEE3"
},
{
"status": "affected",
"version": "12.2(25)SEE4"
},
{
"status": "affected",
"version": "12.2(25)SEE2"
},
{
"status": "affected",
"version": "12.2(25)SED"
},
{
"status": "affected",
"version": "12.2(25)SED1"
},
{
"status": "affected",
"version": "12.3(11)YZ1"
},
{
"status": "affected",
"version": "12.3(11)YZ"
},
{
"status": "affected",
"version": "12.3(11)YZ2"
},
{
"status": "affected",
"version": "12.4(11)SW"
},
{
"status": "affected",
"version": "12.4(15)SW6"
},
{
"status": "affected",
"version": "12.4(15)SW"
},
{
"status": "affected",
"version": "12.4(11)SW1"
},
{
"status": "affected",
"version": "12.4(15)SW5"
},
{
"status": "affected",
"version": "12.4(15)SW1"
},
{
"status": "affected",
"version": "12.4(15)SW4"
},
{
"status": "affected",
"version": "12.4(11)SW3"
},
{
"status": "affected",
"version": "12.4(11)SW2"
},
{
"status": "affected",
"version": "12.4(15)SW3"
},
{
"status": "affected",
"version": "12.4(15)SW2"
},
{
"status": "affected",
"version": "12.4(15)SW7"
},
{
"status": "affected",
"version": "12.4(15)SW8"
},
{
"status": "affected",
"version": "12.4(15)SW8a"
},
{
"status": "affected",
"version": "12.4(15)SW9"
},
{
"status": "affected",
"version": "12.4(9)XG"
},
{
"status": "affected",
"version": "12.4(9)XG3"
},
{
"status": "affected",
"version": "12.4(9)XG5"
},
{
"status": "affected",
"version": "12.4(9)XG2"
},
{
"status": "affected",
"version": "12.4(9)XG1"
},
{
"status": "affected",
"version": "12.4(9)XG4"
},
{
"status": "affected",
"version": "12.4(11)XJ"
},
{
"status": "affected",
"version": "12.4(11)XJ3"
},
{
"status": "affected",
"version": "12.4(11)XJ2"
},
{
"status": "affected",
"version": "12.4(11)XJ4"
},
{
"status": "affected",
"version": "12.4(6)XT"
},
{
"status": "affected",
"version": "12.4(6)XT1"
},
{
"status": "affected",
"version": "12.4(6)XT2"
},
{
"status": "affected",
"version": "12.4(6)XP"
},
{
"status": "affected",
"version": "12.2(31)SGA"
},
{
"status": "affected",
"version": "12.2(31)SGA3"
},
{
"status": "affected",
"version": "12.2(31)SGA2"
},
{
"status": "affected",
"version": "12.2(31)SGA10"
},
{
"status": "affected",
"version": "12.2(31)SGA5"
},
{
"status": "affected",
"version": "12.2(31)SGA4"
},
{
"status": "affected",
"version": "12.2(31)SGA11"
},
{
"status": "affected",
"version": "12.2(31)SGA6"
},
{
"status": "affected",
"version": "12.2(31)SGA1"
},
{
"status": "affected",
"version": "12.2(31)SGA7"
},
{
"status": "affected",
"version": "12.2(31)SGA8"
},
{
"status": "affected",
"version": "12.2(31)SGA9"
},
{
"status": "affected",
"version": "12.2(25)SEG"
},
{
"status": "affected",
"version": "12.2(25)SEG5"
},
{
"status": "affected",
"version": "12.2(25)SEG2"
},
{
"status": "affected",
"version": "12.2(25)SEG4"
},
{
"status": "affected",
"version": "12.2(25)SEG1"
},
{
"status": "affected",
"version": "12.2(25)SEG3"
},
{
"status": "affected",
"version": "12.2(25)SEG6"
},
{
"status": "affected",
"version": "12.3(8)JEA"
},
{
"status": "affected",
"version": "12.3(8)JEA1"
},
{
"status": "affected",
"version": "12.3(8)JEA3"
},
{
"status": "affected",
"version": "12.3(8)JEA2"
},
{
"status": "affected",
"version": "12.4(11)MD"
},
{
"status": "affected",
"version": "12.4(11)MD2"
},
{
"status": "affected",
"version": "12.4(24)MD1"
},
{
"status": "affected",
"version": "12.4(11)MD1"
},
{
"status": "affected",
"version": "12.4(24)MD"
},
{
"status": "affected",
"version": "12.4(11)MD10"
},
{
"status": "affected",
"version": "12.4(15)MD3"
},
{
"status": "affected",
"version": "12.4(24)MD3"
},
{
"status": "affected",
"version": "12.4(15)MD2"
},
{
"status": "affected",
"version": "12.4(11)MD5"
},
{
"status": "affected",
"version": "12.4(24)MD2"
},
{
"status": "affected",
"version": "12.4(11)MD9"
},
{
"status": "affected",
"version": "12.4(22)MD1"
},
{
"status": "affected",
"version": "12.4(15)MD5"
},
{
"status": "affected",
"version": "12.4(15)MD4"
},
{
"status": "affected",
"version": "12.4(22)MD2"
},
{
"status": "affected",
"version": "12.4(11)MD8"
},
{
"status": "affected",
"version": "12.4(11)MD7"
},
{
"status": "affected",
"version": "12.4(24)MD5"
},
{
"status": "affected",
"version": "12.4(15)MD"
},
{
"status": "affected",
"version": "12.4(15)MD1"
},
{
"status": "affected",
"version": "12.4(11)MD6"
},
{
"status": "affected",
"version": "12.4(22)MD"
},
{
"status": "affected",
"version": "12.4(11)MD4"
},
{
"status": "affected",
"version": "12.4(11)MD3"
},
{
"status": "affected",
"version": "12.4(24)MD4"
},
{
"status": "affected",
"version": "12.4(24)MD6"
},
{
"status": "affected",
"version": "12.4(24)MD7"
},
{
"status": "affected",
"version": "12.4(14)XK"
},
{
"status": "affected",
"version": "12.4(11)XV"
},
{
"status": "affected",
"version": "12.4(11)XV1"
},
{
"status": "affected",
"version": "12.4(11)XW"
},
{
"status": "affected",
"version": "12.4(11)XW3"
},
{
"status": "affected",
"version": "12.4(11)XW7"
},
{
"status": "affected",
"version": "12.4(11)XW10"
},
{
"status": "affected",
"version": "12.4(11)XW8"
},
{
"status": "affected",
"version": "12.4(11)XW9"
},
{
"status": "affected",
"version": "12.4(11)XW6"
},
{
"status": "affected",
"version": "12.4(11)XW4"
},
{
"status": "affected",
"version": "12.4(11)XW1"
},
{
"status": "affected",
"version": "12.4(11)XW5"
},
{
"status": "affected",
"version": "12.4(11)XW2"
},
{
"status": "affected",
"version": "12.2(33)SRB"
},
{
"status": "affected",
"version": "12.2(33)SRB4"
},
{
"status": "affected",
"version": "12.2(33)SRB5a"
},
{
"status": "affected",
"version": "12.2(33)SRB3"
},
{
"status": "affected",
"version": "12.2(33)SRB1"
},
{
"status": "affected",
"version": "12.2(33)SRB7"
},
{
"status": "affected",
"version": "12.2(33)SRB6"
},
{
"status": "affected",
"version": "12.2(33)SRB5"
},
{
"status": "affected",
"version": "12.2(33)SRB2"
},
{
"status": "affected",
"version": "12.4(3g)JMA1"
},
{
"status": "affected",
"version": "12.3(8)JEB"
},
{
"status": "affected",
"version": "12.3(8)JEB1"
},
{
"status": "affected",
"version": "12.3(8)JEC2"
},
{
"status": "affected",
"version": "12.3(8)JEC1"
},
{
"status": "affected",
"version": "12.3(8)JEC3"
},
{
"status": "affected",
"version": "12.3(8)JEC"
},
{
"status": "affected",
"version": "12.2(25)FZ"
},
{
"status": "affected",
"version": "12.4(15)XF"
},
{
"status": "affected",
"version": "12.3(2)JL"
},
{
"status": "affected",
"version": "12.3(2)JL3"
},
{
"status": "affected",
"version": "12.3(2)JL1"
},
{
"status": "affected",
"version": "12.3(2)JL4"
},
{
"status": "affected",
"version": "12.3(2)JL2"
},
{
"status": "affected",
"version": "12.2(33)SCA2"
},
{
"status": "affected",
"version": "12.2(33)SCA1"
},
{
"status": "affected",
"version": "12.2(33)SCA"
},
{
"status": "affected",
"version": "12.2(33)SRC2"
},
{
"status": "affected",
"version": "12.2(33)SRC"
},
{
"status": "affected",
"version": "12.2(33)SRC3"
},
{
"status": "affected",
"version": "12.2(33)SRC5"
},
{
"status": "affected",
"version": "12.2(33)SRC6"
},
{
"status": "affected",
"version": "12.2(33)SRC4"
},
{
"status": "affected",
"version": "12.2(33)SRC1"
},
{
"status": "affected",
"version": "12.2(33)SXH3a"
},
{
"status": "affected",
"version": "12.2(33)SXH8a"
},
{
"status": "affected",
"version": "12.2(33)SXH3"
},
{
"status": "affected",
"version": "12.2(33)SXH4"
},
{
"status": "affected",
"version": "12.2(33)SXH7"
},
{
"status": "affected",
"version": "12.2(33)SXH"
},
{
"status": "affected",
"version": "12.2(33)SXH8"
},
{
"status": "affected",
"version": "12.2(33)SXH2a"
},
{
"status": "affected",
"version": "12.2(33)SXH2"
},
{
"status": "affected",
"version": "12.2(33)SXH1"
},
{
"status": "affected",
"version": "12.2(33)SXH5"
},
{
"status": "affected",
"version": "12.2(33)SXH6"
},
{
"status": "affected",
"version": "12.2(33)SXH8b"
},
{
"status": "affected",
"version": "12.4(15)XQ4"
},
{
"status": "affected",
"version": "12.4(15)XQ1"
},
{
"status": "affected",
"version": "12.4(15)XQ7"
},
{
"status": "affected",
"version": "12.4(15)XQ2a"
},
{
"status": "affected",
"version": "12.4(15)XQ6"
},
{
"status": "affected",
"version": "12.4(15)XQ2"
},
{
"status": "affected",
"version": "12.4(15)XQ"
},
{
"status": "affected",
"version": "12.4(15)XQ3"
},
{
"status": "affected",
"version": "12.4(15)XQ5"
},
{
"status": "affected",
"version": "12.4(15)XQ2b"
},
{
"status": "affected",
"version": "12.4(15)XQ8"
},
{
"status": "affected",
"version": "12.4(15)XY4"
},
{
"status": "affected",
"version": "12.4(15)XY5"
},
{
"status": "affected",
"version": "12.4(15)XY1"
},
{
"status": "affected",
"version": "12.4(15)XY"
},
{
"status": "affected",
"version": "12.4(15)XY2"
},
{
"status": "affected",
"version": "12.4(15)XY3"
},
{
"status": "affected",
"version": "12.4(15)XZ"
},
{
"status": "affected",
"version": "12.4(15)XZ2"
},
{
"status": "affected",
"version": "12.4(15)XZ1"
},
{
"status": "affected",
"version": "12.4(15)XL3"
},
{
"status": "affected",
"version": "12.4(15)XL1"
},
{
"status": "affected",
"version": "12.4(15)XL2"
},
{
"status": "affected",
"version": "12.4(15)XL4"
},
{
"status": "affected",
"version": "12.4(15)XL5"
},
{
"status": "affected",
"version": "12.4(15)XL"
},
{
"status": "affected",
"version": "12.3(8)ZA"
},
{
"status": "affected",
"version": "12.4(15)XM3"
},
{
"status": "affected",
"version": "12.4(15)XM1"
},
{
"status": "affected",
"version": "12.4(15)XM2"
},
{
"status": "affected",
"version": "12.4(15)XM"
},
{
"status": "affected",
"version": "12.4(15)XN"
},
{
"status": "affected",
"version": "12.4(22)XR5"
},
{
"status": "affected",
"version": "12.4(22)XR4"
},
{
"status": "affected",
"version": "12.4(15)XR5"
},
{
"status": "affected",
"version": "12.4(15)XR2"
},
{
"status": "affected",
"version": "12.4(22)XR7"
},
{
"status": "affected",
"version": "12.4(15)XR4"
},
{
"status": "affected",
"version": "12.4(15)XR1"
},
{
"status": "affected",
"version": "12.4(15)XR7"
},
{
"status": "affected",
"version": "12.4(22)XR2"
},
{
"status": "affected",
"version": "12.4(15)XR9"
},
{
"status": "affected",
"version": "12.4(15)XR6"
},
{
"status": "affected",
"version": "12.4(15)XR3"
},
{
"status": "affected",
"version": "12.4(15)XR"
},
{
"status": "affected",
"version": "12.4(22)XR6"
},
{
"status": "affected",
"version": "12.4(22)XR10"
},
{
"status": "affected",
"version": "12.4(15)XR8"
},
{
"status": "affected",
"version": "12.4(22)XR1"
},
{
"status": "affected",
"version": "12.4(22)XR9"
},
{
"status": "affected",
"version": "12.4(22)XR3"
},
{
"status": "affected",
"version": "12.4(22)XR8"
},
{
"status": "affected",
"version": "12.4(22)XR11"
},
{
"status": "affected",
"version": "12.4(15)XR10"
},
{
"status": "affected",
"version": "12.4(22)XR12"
},
{
"status": "affected",
"version": "12.2(33)IRA"
},
{
"status": "affected",
"version": "12.2(33)IRB"
},
{
"status": "affected",
"version": "12.2(33)SCB9"
},
{
"status": "affected",
"version": "12.2(33)SCB"
},
{
"status": "affected",
"version": "12.2(33)SCB6"
},
{
"status": "affected",
"version": "12.2(33)SCB3"
},
{
"status": "affected",
"version": "12.2(33)SCB10"
},
{
"status": "affected",
"version": "12.2(33)SCB4"
},
{
"status": "affected",
"version": "12.2(33)SCB2"
},
{
"status": "affected",
"version": "12.2(33)SCB7"
},
{
"status": "affected",
"version": "12.2(33)SCB1"
},
{
"status": "affected",
"version": "12.2(33)SCB5"
},
{
"status": "affected",
"version": "12.2(33)SCB8"
},
{
"status": "affected",
"version": "12.2(33)SCB11"
},
{
"status": "affected",
"version": "12.2(33)SRD7"
},
{
"status": "affected",
"version": "12.2(33)SRD6"
},
{
"status": "affected",
"version": "12.2(33)SRD2a"
},
{
"status": "affected",
"version": "12.2(33)SRD4"
},
{
"status": "affected",
"version": "12.2(33)SRD5"
},
{
"status": "affected",
"version": "12.2(33)SRD3"
},
{
"status": "affected",
"version": "12.2(33)SRD2"
},
{
"status": "affected",
"version": "12.2(33)SRD1"
},
{
"status": "affected",
"version": "12.2(33)SRD"
},
{
"status": "affected",
"version": "12.2(33)SRD8"
},
{
"status": "affected",
"version": "12.2(33)STE0"
},
{
"status": "affected",
"version": "12.2(33)SXI2"
},
{
"status": "affected",
"version": "12.2(33)SXI3"
},
{
"status": "affected",
"version": "12.2(33)SXI5"
},
{
"status": "affected",
"version": "12.2(33)SXI4a"
},
{
"status": "affected",
"version": "12.2(33)SXI4"
},
{
"status": "affected",
"version": "12.2(33)SXI2a"
},
{
"status": "affected",
"version": "12.2(33)SXI"
},
{
"status": "affected",
"version": "12.2(33)SXI6"
},
{
"status": "affected",
"version": "12.2(33)SXI7"
},
{
"status": "affected",
"version": "12.2(33)SXI1"
},
{
"status": "affected",
"version": "12.2(33)SXI8"
},
{
"status": "affected",
"version": "12.2(33)SXI9"
},
{
"status": "affected",
"version": "12.2(33)SXI8a"
},
{
"status": "affected",
"version": "12.2(33)SXI10"
},
{
"status": "affected",
"version": "12.2(33)SXI11"
},
{
"status": "affected",
"version": "12.2(33)SXI12"
},
{
"status": "affected",
"version": "12.2(33)SXI13"
},
{
"status": "affected",
"version": "12.2(33)SXI14"
},
{
"status": "affected",
"version": "12.2(52)XO"
},
{
"status": "affected",
"version": "12.2(54)XO"
},
{
"status": "affected",
"version": "12.2(40)XO"
},
{
"status": "affected",
"version": "12.4(10b)JDA3"
},
{
"status": "affected",
"version": "12.4(10b)JDA"
},
{
"status": "affected",
"version": "12.4(10b)JDA2"
},
{
"status": "affected",
"version": "12.4(10b)JDA1"
},
{
"status": "affected",
"version": "12.4(3)JL"
},
{
"status": "affected",
"version": "12.4(3)JL2"
},
{
"status": "affected",
"version": "12.4(3)JL1"
},
{
"status": "affected",
"version": "12.4(3g)JMB"
},
{
"status": "affected",
"version": "12.4(3g)JX"
},
{
"status": "affected",
"version": "12.4(3g)JX1"
},
{
"status": "affected",
"version": "12.4(25e)JX"
},
{
"status": "affected",
"version": "12.4(10b)JY"
},
{
"status": "affected",
"version": "12.4(21a)JY"
},
{
"status": "affected",
"version": "12.4(23c)JY"
},
{
"status": "affected",
"version": "12.2(44)SQ"
},
{
"status": "affected",
"version": "12.2(44)SQ2"
},
{
"status": "affected",
"version": "12.2(50)SQ2"
},
{
"status": "affected",
"version": "12.2(50)SQ1"
},
{
"status": "affected",
"version": "12.2(50)SQ"
},
{
"status": "affected",
"version": "12.2(50)SQ3"
},
{
"status": "affected",
"version": "12.2(50)SQ4"
},
{
"status": "affected",
"version": "12.2(50)SQ5"
},
{
"status": "affected",
"version": "12.2(50)SQ6"
},
{
"status": "affected",
"version": "12.2(50)SQ7"
},
{
"status": "affected",
"version": "12.4(10b)JDC"
},
{
"status": "affected",
"version": "12.4(10b)JDD"
},
{
"status": "affected",
"version": "12.2(33)IRC"
},
{
"status": "affected",
"version": "12.4(22)MDA3"
},
{
"status": "affected",
"version": "12.4(24)MDA5"
},
{
"status": "affected",
"version": "12.4(22)MDA5"
},
{
"status": "affected",
"version": "12.4(24)MDA3"
},
{
"status": "affected",
"version": "12.4(22)MDA4"
},
{
"status": "affected",
"version": "12.4(24)MDA4"
},
{
"status": "affected",
"version": "12.4(24)MDA1"
},
{
"status": "affected",
"version": "12.4(22)MDA"
},
{
"status": "affected",
"version": "12.4(22)MDA2"
},
{
"status": "affected",
"version": "12.4(22)MDA1"
},
{
"status": "affected",
"version": "12.4(24)MDA2"
},
{
"status": "affected",
"version": "12.4(22)MDA6"
},
{
"status": "affected",
"version": "12.4(24)MDA6"
},
{
"status": "affected",
"version": "12.4(24)MDA7"
},
{
"status": "affected",
"version": "12.4(24)MDA8"
},
{
"status": "affected",
"version": "12.4(24)MDA10"
},
{
"status": "affected",
"version": "12.4(24)MDA9"
},
{
"status": "affected",
"version": "12.4(24)MDA11"
},
{
"status": "affected",
"version": "12.4(24)MDA12"
},
{
"status": "affected",
"version": "12.4(24)MDA13"
},
{
"status": "affected",
"version": "12.2(33)SCC"
},
{
"status": "affected",
"version": "12.2(33)SCC2"
},
{
"status": "affected",
"version": "12.2(33)SCC6"
},
{
"status": "affected",
"version": "12.2(33)SCC7"
},
{
"status": "affected",
"version": "12.2(33)SCC5"
},
{
"status": "affected",
"version": "12.2(33)SCC4"
},
{
"status": "affected",
"version": "12.2(33)SCC3"
},
{
"status": "affected",
"version": "12.2(33)SCC1"
},
{
"status": "affected",
"version": "12.2(33)SCD5"
},
{
"status": "affected",
"version": "12.2(33)SCD1"
},
{
"status": "affected",
"version": "12.2(33)SCD7"
},
{
"status": "affected",
"version": "12.2(33)SCD4"
},
{
"status": "affected",
"version": "12.2(33)SCD"
},
{
"status": "affected",
"version": "12.2(33)SCD6"
},
{
"status": "affected",
"version": "12.2(33)SCD3"
},
{
"status": "affected",
"version": "12.2(33)SCD2"
},
{
"status": "affected",
"version": "12.2(33)SCD8"
},
{
"status": "affected",
"version": "12.3(8)JED"
},
{
"status": "affected",
"version": "12.3(8)JED1"
},
{
"status": "affected",
"version": "12.4(24)YG3"
},
{
"status": "affected",
"version": "12.4(24)YG4"
},
{
"status": "affected",
"version": "12.4(24)YG1"
},
{
"status": "affected",
"version": "12.4(24)YG2"
},
{
"status": "affected",
"version": "12.4(24)YG"
},
{
"status": "affected",
"version": "15.0(1)M1"
},
{
"status": "affected",
"version": "15.0(1)M5"
},
{
"status": "affected",
"version": "15.0(1)M4"
},
{
"status": "affected",
"version": "15.0(1)M3"
},
{
"status": "affected",
"version": "15.0(1)M2"
},
{
"status": "affected",
"version": "15.0(1)M6"
},
{
"status": "affected",
"version": "15.0(1)M"
},
{
"status": "affected",
"version": "15.0(1)M7"
},
{
"status": "affected",
"version": "15.0(1)M10"
},
{
"status": "affected",
"version": "15.0(1)M9"
},
{
"status": "affected",
"version": "15.0(1)M8"
},
{
"status": "affected",
"version": "15.0(1)XA2"
},
{
"status": "affected",
"version": "15.0(1)XA4"
},
{
"status": "affected",
"version": "15.0(1)XA1"
},
{
"status": "affected",
"version": "15.0(1)XA3"
},
{
"status": "affected",
"version": "15.0(1)XA"
},
{
"status": "affected",
"version": "15.0(1)XA5"
},
{
"status": "affected",
"version": "15.1(2)T"
},
{
"status": "affected",
"version": "15.1(1)T4"
},
{
"status": "affected",
"version": "15.1(3)T2"
},
{
"status": "affected",
"version": "15.1(1)T1"
},
{
"status": "affected",
"version": "15.1(2)T0a"
},
{
"status": "affected",
"version": "15.1(3)T3"
},
{
"status": "affected",
"version": "15.1(1)T3"
},
{
"status": "affected",
"version": "15.1(2)T3"
},
{
"status": "affected",
"version": "15.1(2)T4"
},
{
"status": "affected",
"version": "15.1(1)T2"
},
{
"status": "affected",
"version": "15.1(3)T"
},
{
"status": "affected",
"version": "15.1(2)T2a"
},
{
"status": "affected",
"version": "15.1(3)T1"
},
{
"status": "affected",
"version": "15.1(1)T"
},
{
"status": "affected",
"version": "15.1(2)T2"
},
{
"status": "affected",
"version": "15.1(2)T1"
},
{
"status": "affected",
"version": "15.1(2)T5"
},
{
"status": "affected",
"version": "15.1(3)T4"
},
{
"status": "affected",
"version": "15.1(1)T5"
},
{
"status": "affected",
"version": "15.1(1)XB"
},
{
"status": "affected",
"version": "12.2(33)SRE1"
},
{
"status": "affected",
"version": "12.2(33)SRE2"
},
{
"status": "affected",
"version": "12.2(33)SRE3"
},
{
"status": "affected",
"version": "12.2(33)SRE4"
},
{
"status": "affected",
"version": "12.2(33)SRE"
},
{
"status": "affected",
"version": "12.2(33)SRE0a"
},
{
"status": "affected",
"version": "12.2(33)SRE5"
},
{
"status": "affected",
"version": "12.2(33)SRE6"
},
{
"status": "affected",
"version": "12.2(33)SRE8"
},
{
"status": "affected",
"version": "12.2(33)SRE7"
},
{
"status": "affected",
"version": "12.2(33)SRE9"
},
{
"status": "affected",
"version": "12.2(33)SRE7a"
},
{
"status": "affected",
"version": "12.2(33)SRE10"
},
{
"status": "affected",
"version": "12.2(33)SRE11"
},
{
"status": "affected",
"version": "12.2(33)SRE9a"
},
{
"status": "affected",
"version": "12.2(33)SRE12"
},
{
"status": "affected",
"version": "12.2(33)SRE13"
},
{
"status": "affected",
"version": "12.2(33)SRE14"
},
{
"status": "affected",
"version": "12.2(33)SRE15"
},
{
"status": "affected",
"version": "12.2(33)SRE15a"
},
{
"status": "affected",
"version": "15.0(1)XO1"
},
{
"status": "affected",
"version": "15.0(1)XO"
},
{
"status": "affected",
"version": "15.0(2)XO"
},
{
"status": "affected",
"version": "15.0(1)S2"
},
{
"status": "affected",
"version": "15.0(1)S1"
},
{
"status": "affected",
"version": "15.0(1)S"
},
{
"status": "affected",
"version": "15.0(1)S3a"
},
{
"status": "affected",
"version": "15.0(1)S4"
},
{
"status": "affected",
"version": "15.0(1)S5"
},
{
"status": "affected",
"version": "15.0(1)S4a"
},
{
"status": "affected",
"version": "15.0(1)S6"
},
{
"status": "affected",
"version": "12.2(33)IRD"
},
{
"status": "affected",
"version": "12.2(33)IRE"
},
{
"status": "affected",
"version": "12.2(33)IRE2"
},
{
"status": "affected",
"version": "12.2(33)IRE1"
},
{
"status": "affected",
"version": "12.2(33)MRA"
},
{
"status": "affected",
"version": "12.2(33)MRB5"
},
{
"status": "affected",
"version": "12.2(33)MRB2"
},
{
"status": "affected",
"version": "12.2(33)MRB1"
},
{
"status": "affected",
"version": "12.2(33)MRB4"
},
{
"status": "affected",
"version": "12.2(33)MRB"
},
{
"status": "affected",
"version": "12.2(33)MRB3"
},
{
"status": "affected",
"version": "12.2(33)MRB6"
},
{
"status": "affected",
"version": "12.4(21a)JHA"
},
{
"status": "affected",
"version": "15.2(1)S"
},
{
"status": "affected",
"version": "15.2(2)S"
},
{
"status": "affected",
"version": "15.2(1)S1"
},
{
"status": "affected",
"version": "15.2(4)S"
},
{
"status": "affected",
"version": "15.2(1)S2"
},
{
"status": "affected",
"version": "15.2(2)S1"
},
{
"status": "affected",
"version": "15.2(2)S2"
},
{
"status": "affected",
"version": "15.2(2)S0a"
},
{
"status": "affected",
"version": "15.2(2)S0c"
},
{
"status": "affected",
"version": "15.2(4)S1"
},
{
"status": "affected",
"version": "15.2(4)S4"
},
{
"status": "affected",
"version": "15.2(4)S6"
},
{
"status": "affected",
"version": "15.2(4)S2"
},
{
"status": "affected",
"version": "15.2(4)S5"
},
{
"status": "affected",
"version": "15.2(4)S3"
},
{
"status": "affected",
"version": "15.2(4)S3a"
},
{
"status": "affected",
"version": "15.2(4)S4a"
},
{
"status": "affected",
"version": "15.2(4)S7"
},
{
"status": "affected",
"version": "15.3(1)T"
},
{
"status": "affected",
"version": "15.3(2)T"
},
{
"status": "affected",
"version": "15.3(1)T1"
},
{
"status": "affected",
"version": "15.3(1)T2"
},
{
"status": "affected",
"version": "15.3(1)T3"
},
{
"status": "affected",
"version": "15.3(1)T4"
},
{
"status": "affected",
"version": "15.3(2)T1"
},
{
"status": "affected",
"version": "15.3(2)T2"
},
{
"status": "affected",
"version": "15.3(2)T3"
},
{
"status": "affected",
"version": "15.3(2)T4"
},
{
"status": "affected",
"version": "12.4(10b)JDE"
},
{
"status": "affected",
"version": "15.0(1)EY"
},
{
"status": "affected",
"version": "15.0(1)EY1"
},
{
"status": "affected",
"version": "15.0(1)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY"
},
{
"status": "affected",
"version": "15.0(2)EY1"
},
{
"status": "affected",
"version": "15.0(2)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY3"
},
{
"status": "affected",
"version": "12.4(20)MRB"
},
{
"status": "affected",
"version": "12.4(20)MRB1"
},
{
"status": "affected",
"version": "12.3(8)JEE"
},
{
"status": "affected",
"version": "12.2(54)WO"
},
{
"status": "affected",
"version": "15.1(2)S"
},
{
"status": "affected",
"version": "15.1(1)S"
},
{
"status": "affected",
"version": "15.1(1)S1"
},
{
"status": "affected",
"version": "15.1(3)S"
},
{
"status": "affected",
"version": "15.1(1)S2"
},
{
"status": "affected",
"version": "15.1(2)S1"
},
{
"status": "affected",
"version": "15.1(2)S2"
},
{
"status": "affected",
"version": "15.1(3)S1"
},
{
"status": "affected",
"version": "15.1(3)S0a"
},
{
"status": "affected",
"version": "15.1(3)S2"
},
{
"status": "affected",
"version": "15.1(3)S4"
},
{
"status": "affected",
"version": "15.1(3)S3"
},
{
"status": "affected",
"version": "15.1(3)S5"
},
{
"status": "affected",
"version": "15.1(3)S6"
},
{
"status": "affected",
"version": "15.1(3)S5a"
},
{
"status": "affected",
"version": "15.1(4)M3"
},
{
"status": "affected",
"version": "15.1(4)M"
},
{
"status": "affected",
"version": "15.1(4)M1"
},
{
"status": "affected",
"version": "15.1(4)M2"
},
{
"status": "affected",
"version": "15.1(4)M6"
},
{
"status": "affected",
"version": "15.1(4)M5"
},
{
"status": "affected",
"version": "15.1(4)M4"
},
{
"status": "affected",
"version": "15.1(4)M7"
},
{
"status": "affected",
"version": "15.1(4)M3a"
},
{
"status": "affected",
"version": "15.1(4)M10"
},
{
"status": "affected",
"version": "15.1(4)M8"
},
{
"status": "affected",
"version": "15.1(4)M9"
},
{
"status": "affected",
"version": "12.2(33)IRF"
},
{
"status": "affected",
"version": "12.4(3g)JMC1"
},
{
"status": "affected",
"version": "12.4(3g)JMC"
},
{
"status": "affected",
"version": "12.4(3g)JMC2"
},
{
"status": "affected",
"version": "15.0(1)SE"
},
{
"status": "affected",
"version": "15.0(2)SE"
},
{
"status": "affected",
"version": "15.0(1)SE1"
},
{
"status": "affected",
"version": "15.0(1)SE2"
},
{
"status": "affected",
"version": "15.0(1)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE1"
},
{
"status": "affected",
"version": "15.0(2)SE2"
},
{
"status": "affected",
"version": "15.0(2)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE4"
},
{
"status": "affected",
"version": "15.0(2)SE5"
},
{
"status": "affected",
"version": "15.0(2)SE6"
},
{
"status": "affected",
"version": "15.0(2)SE7"
},
{
"status": "affected",
"version": "15.0(2)SE8"
},
{
"status": "affected",
"version": "15.0(2)SE9"
},
{
"status": "affected",
"version": "15.0(2)SE10"
},
{
"status": "affected",
"version": "15.0(2)SE11"
},
{
"status": "affected",
"version": "15.0(2)SE10a"
},
{
"status": "affected",
"version": "15.0(2)SE12"
},
{
"status": "affected",
"version": "15.0(2)SE13"
},
{
"status": "affected",
"version": "15.1(2)GC"
},
{
"status": "affected",
"version": "15.1(2)GC1"
},
{
"status": "affected",
"version": "15.1(2)GC2"
},
{
"status": "affected",
"version": "15.1(4)GC"
},
{
"status": "affected",
"version": "15.1(4)GC1"
},
{
"status": "affected",
"version": "15.1(4)GC2"
},
{
"status": "affected",
"version": "15.0(1)SY"
},
{
"status": "affected",
"version": "15.0(1)SY1"
},
{
"status": "affected",
"version": "15.0(1)SY2"
},
{
"status": "affected",
"version": "15.0(1)SY3"
},
{
"status": "affected",
"version": "15.0(1)SY4"
},
{
"status": "affected",
"version": "15.0(1)SY5"
},
{
"status": "affected",
"version": "15.0(1)SY6"
},
{
"status": "affected",
"version": "15.0(1)SY7"
},
{
"status": "affected",
"version": "15.0(1)SY8"
},
{
"status": "affected",
"version": "15.0(1)SY7a"
},
{
"status": "affected",
"version": "15.0(1)SY9"
},
{
"status": "affected",
"version": "15.0(1)SY10"
},
{
"status": "affected",
"version": "12.2(33)SXJ"
},
{
"status": "affected",
"version": "12.2(33)SXJ1"
},
{
"status": "affected",
"version": "12.2(33)SXJ2"
},
{
"status": "affected",
"version": "12.2(33)SXJ3"
},
{
"status": "affected",
"version": "12.2(33)SXJ4"
},
{
"status": "affected",
"version": "12.2(33)SXJ5"
},
{
"status": "affected",
"version": "12.2(33)SXJ6"
},
{
"status": "affected",
"version": "12.2(33)SXJ7"
},
{
"status": "affected",
"version": "12.2(33)SXJ8"
},
{
"status": "affected",
"version": "12.2(33)SXJ9"
},
{
"status": "affected",
"version": "12.2(33)SXJ10"
},
{
"status": "affected",
"version": "15.1(1)SG"
},
{
"status": "affected",
"version": "15.1(2)SG"
},
{
"status": "affected",
"version": "15.1(1)SG1"
},
{
"status": "affected",
"version": "15.1(1)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG1"
},
{
"status": "affected",
"version": "15.1(2)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG3"
},
{
"status": "affected",
"version": "15.1(2)SG4"
},
{
"status": "affected",
"version": "15.1(2)SG5"
},
{
"status": "affected",
"version": "15.1(2)SG6"
},
{
"status": "affected",
"version": "15.1(2)SG7"
},
{
"status": "affected",
"version": "15.1(2)SG8"
},
{
"status": "affected",
"version": "15.0(1)MR"
},
{
"status": "affected",
"version": "15.0(2)MR"
},
{
"status": "affected",
"version": "12.2(33)SCF"
},
{
"status": "affected",
"version": "12.2(33)SCF1"
},
{
"status": "affected",
"version": "12.2(33)SCF2"
},
{
"status": "affected",
"version": "12.2(33)SCF3"
},
{
"status": "affected",
"version": "12.2(33)SCF4"
},
{
"status": "affected",
"version": "12.2(33)SCF5"
},
{
"status": "affected",
"version": "15.2(4)M"
},
{
"status": "affected",
"version": "15.2(4)M1"
},
{
"status": "affected",
"version": "15.2(4)M2"
},
{
"status": "affected",
"version": "15.2(4)M4"
},
{
"status": "affected",
"version": "15.2(4)M3"
},
{
"status": "affected",
"version": "15.2(4)M5"
},
{
"status": "affected",
"version": "15.2(4)M8"
},
{
"status": "affected",
"version": "15.2(4)M10"
},
{
"status": "affected",
"version": "15.2(4)M7"
},
{
"status": "affected",
"version": "15.2(4)M6"
},
{
"status": "affected",
"version": "15.2(4)M9"
},
{
"status": "affected",
"version": "15.2(4)M6a"
},
{
"status": "affected",
"version": "15.2(4)M11"
},
{
"status": "affected",
"version": "12.2(33)SCE"
},
{
"status": "affected",
"version": "12.2(33)SCE1"
},
{
"status": "affected",
"version": "12.2(33)SCE2"
},
{
"status": "affected",
"version": "12.2(33)SCE3"
},
{
"status": "affected",
"version": "12.2(33)SCE4"
},
{
"status": "affected",
"version": "12.2(33)SCE5"
},
{
"status": "affected",
"version": "12.2(33)SCE6"
},
{
"status": "affected",
"version": "15.0(2)SG"
},
{
"status": "affected",
"version": "15.0(2)SG1"
},
{
"status": "affected",
"version": "15.0(2)SG2"
},
{
"status": "affected",
"version": "15.0(2)SG3"
},
{
"status": "affected",
"version": "15.0(2)SG4"
},
{
"status": "affected",
"version": "15.0(2)SG5"
},
{
"status": "affected",
"version": "15.0(2)SG6"
},
{
"status": "affected",
"version": "15.0(2)SG7"
},
{
"status": "affected",
"version": "15.0(2)SG8"
},
{
"status": "affected",
"version": "15.0(2)SG9"
},
{
"status": "affected",
"version": "15.0(2)SG10"
},
{
"status": "affected",
"version": "15.0(2)SG11"
},
{
"status": "affected",
"version": "12.4(24)MDB"
},
{
"status": "affected",
"version": "12.4(24)MDB1"
},
{
"status": "affected",
"version": "12.4(24)MDB3"
},
{
"status": "affected",
"version": "12.4(24)MDB4"
},
{
"status": "affected",
"version": "12.4(24)MDB5"
},
{
"status": "affected",
"version": "12.4(24)MDB6"
},
{
"status": "affected",
"version": "12.4(24)MDB7"
},
{
"status": "affected",
"version": "12.4(24)MDB5a"
},
{
"status": "affected",
"version": "12.4(24)MDB8"
},
{
"status": "affected",
"version": "12.4(24)MDB9"
},
{
"status": "affected",
"version": "12.4(24)MDB10"
},
{
"status": "affected",
"version": "12.4(24)MDB11"
},
{
"status": "affected",
"version": "12.4(24)MDB12"
},
{
"status": "affected",
"version": "12.4(24)MDB13"
},
{
"status": "affected",
"version": "12.4(24)MDB14"
},
{
"status": "affected",
"version": "12.4(24)MDB15"
},
{
"status": "affected",
"version": "12.4(24)MDB16"
},
{
"status": "affected",
"version": "12.4(24)MDB17"
},
{
"status": "affected",
"version": "12.4(24)MDB18"
},
{
"status": "affected",
"version": "12.4(24)MDB19"
},
{
"status": "affected",
"version": "12.2(33)IRG"
},
{
"status": "affected",
"version": "12.2(33)IRG1"
},
{
"status": "affected",
"version": "12.4(21a)JHC"
},
{
"status": "affected",
"version": "15.0(1)EX"
},
{
"status": "affected",
"version": "15.0(2)EX"
},
{
"status": "affected",
"version": "15.0(2)EX1"
},
{
"status": "affected",
"version": "15.0(2)EX2"
},
{
"status": "affected",
"version": "15.0(2)EX3"
},
{
"status": "affected",
"version": "15.0(2)EX4"
},
{
"status": "affected",
"version": "15.0(2)EX5"
},
{
"status": "affected",
"version": "15.0(2)EX8"
},
{
"status": "affected",
"version": "15.0(2a)EX5"
},
{
"status": "affected",
"version": "15.0(2)EX10"
},
{
"status": "affected",
"version": "15.0(2)EX11"
},
{
"status": "affected",
"version": "15.0(2)EX13"
},
{
"status": "affected",
"version": "15.0(2)EX12"
},
{
"status": "affected",
"version": "15.2(1)GC"
},
{
"status": "affected",
"version": "15.2(1)GC1"
},
{
"status": "affected",
"version": "15.2(1)GC2"
},
{
"status": "affected",
"version": "15.2(2)GC"
},
{
"status": "affected",
"version": "15.2(3)GC"
},
{
"status": "affected",
"version": "15.2(3)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC"
},
{
"status": "affected",
"version": "15.2(4)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC2"
},
{
"status": "affected",
"version": "15.2(4)GC3"
},
{
"status": "affected",
"version": "12.2(33)SCG"
},
{
"status": "affected",
"version": "12.2(33)SCG1"
},
{
"status": "affected",
"version": "12.2(33)SCG2"
},
{
"status": "affected",
"version": "12.2(33)SCG3"
},
{
"status": "affected",
"version": "12.2(33)SCG4"
},
{
"status": "affected",
"version": "12.2(33)SCG5"
},
{
"status": "affected",
"version": "12.2(33)SCG6"
},
{
"status": "affected",
"version": "12.2(33)SCG7"
},
{
"status": "affected",
"version": "12.2(33)IRH"
},
{
"status": "affected",
"version": "12.2(33)IRH1"
},
{
"status": "affected",
"version": "15.1(1)SY"
},
{
"status": "affected",
"version": "15.1(1)SY1"
},
{
"status": "affected",
"version": "15.1(2)SY"
},
{
"status": "affected",
"version": "15.1(2)SY1"
},
{
"status": "affected",
"version": "15.1(2)SY2"
},
{
"status": "affected",
"version": "15.1(1)SY2"
},
{
"status": "affected",
"version": "15.1(1)SY3"
},
{
"status": "affected",
"version": "15.1(2)SY3"
},
{
"status": "affected",
"version": "15.1(1)SY4"
},
{
"status": "affected",
"version": "15.1(2)SY4"
},
{
"status": "affected",
"version": "15.1(1)SY5"
},
{
"status": "affected",
"version": "15.1(2)SY5"
},
{
"status": "affected",
"version": "15.1(2)SY4a"
},
{
"status": "affected",
"version": "15.1(1)SY6"
},
{
"status": "affected",
"version": "15.1(2)SY6"
},
{
"status": "affected",
"version": "15.1(2)SY7"
},
{
"status": "affected",
"version": "15.1(2)SY8"
},
{
"status": "affected",
"version": "15.1(2)SY9"
},
{
"status": "affected",
"version": "15.1(2)SY10"
},
{
"status": "affected",
"version": "15.1(2)SY11"
},
{
"status": "affected",
"version": "15.1(2)SY12"
},
{
"status": "affected",
"version": "15.1(2)SY13"
},
{
"status": "affected",
"version": "15.1(2)SY14"
},
{
"status": "affected",
"version": "15.1(2)SY15"
},
{
"status": "affected",
"version": "15.1(2)SY16"
},
{
"status": "affected",
"version": "15.3(1)S"
},
{
"status": "affected",
"version": "15.3(2)S"
},
{
"status": "affected",
"version": "15.3(3)S"
},
{
"status": "affected",
"version": "15.3(1)S2"
},
{
"status": "affected",
"version": "15.3(1)S1"
},
{
"status": "affected",
"version": "15.3(2)S2"
},
{
"status": "affected",
"version": "15.3(2)S1"
},
{
"status": "affected",
"version": "15.3(3)S1"
},
{
"status": "affected",
"version": "15.3(3)S2"
},
{
"status": "affected",
"version": "15.3(3)S3"
},
{
"status": "affected",
"version": "15.3(3)S6"
},
{
"status": "affected",
"version": "15.3(3)S4"
},
{
"status": "affected",
"version": "15.3(3)S1a"
},
{
"status": "affected",
"version": "15.3(3)S5"
},
{
"status": "affected",
"version": "15.3(3)S7"
},
{
"status": "affected",
"version": "15.3(3)S8"
},
{
"status": "affected",
"version": "15.3(3)S9"
},
{
"status": "affected",
"version": "15.3(3)S10"
},
{
"status": "affected",
"version": "15.3(3)S8a"
},
{
"status": "affected",
"version": "15.4(1)T"
},
{
"status": "affected",
"version": "15.4(2)T"
},
{
"status": "affected",
"version": "15.4(1)T2"
},
{
"status": "affected",
"version": "15.4(1)T1"
},
{
"status": "affected",
"version": "15.4(1)T3"
},
{
"status": "affected",
"version": "15.4(2)T1"
},
{
"status": "affected",
"version": "15.4(2)T3"
},
{
"status": "affected",
"version": "15.4(2)T2"
},
{
"status": "affected",
"version": "15.4(1)T4"
},
{
"status": "affected",
"version": "15.4(2)T4"
},
{
"status": "affected",
"version": "12.2(33)SCH"
},
{
"status": "affected",
"version": "12.2(33)SCH1"
},
{
"status": "affected",
"version": "12.2(33)SCH2"
},
{
"status": "affected",
"version": "12.2(33)SCH0a"
},
{
"status": "affected",
"version": "12.2(33)SCH3"
},
{
"status": "affected",
"version": "12.2(33)SCH2a"
},
{
"status": "affected",
"version": "12.2(33)SCH4"
},
{
"status": "affected",
"version": "12.2(33)SCH5"
},
{
"status": "affected",
"version": "12.2(33)SCH6"
},
{
"status": "affected",
"version": "12.4(25e)JAL"
},
{
"status": "affected",
"version": "12.4(25e)JAL2"
},
{
"status": "affected",
"version": "15.0(2)EA"
},
{
"status": "affected",
"version": "15.0(2)EA1"
},
{
"status": "affected",
"version": "15.2(1)E"
},
{
"status": "affected",
"version": "15.2(2)E"
},
{
"status": "affected",
"version": "15.2(1)E1"
},
{
"status": "affected",
"version": "15.2(3)E"
},
{
"status": "affected",
"version": "15.2(1)E2"
},
{
"status": "affected",
"version": "15.2(1)E3"
},
{
"status": "affected",
"version": "15.2(2)E1"
},
{
"status": "affected",
"version": "15.2(4)E"
},
{
"status": "affected",
"version": "15.2(3)E1"
},
{
"status": "affected",
"version": "15.2(2)E2"
},
{
"status": "affected",
"version": "15.2(2a)E1"
},
{
"status": "affected",
"version": "15.2(2)E3"
},
{
"status": "affected",
"version": "15.2(2a)E2"
},
{
"status": "affected",
"version": "15.2(3)E2"
},
{
"status": "affected",
"version": "15.2(3a)E"
},
{
"status": "affected",
"version": "15.2(3)E3"
},
{
"status": "affected",
"version": "15.2(4)E1"
},
{
"status": "affected",
"version": "15.2(2)E4"
},
{
"status": "affected",
"version": "15.2(2)E5"
},
{
"status": "affected",
"version": "15.2(4)E2"
},
{
"status": "affected",
"version": "15.2(3)E4"
},
{
"status": "affected",
"version": "15.2(5)E"
},
{
"status": "affected",
"version": "15.2(4)E3"
},
{
"status": "affected",
"version": "15.2(2)E6"
},
{
"status": "affected",
"version": "15.2(5a)E"
},
{
"status": "affected",
"version": "15.2(5)E1"
},
{
"status": "affected",
"version": "15.2(5b)E"
},
{
"status": "affected",
"version": "15.2(2)E5a"
},
{
"status": "affected",
"version": "15.2(5c)E"
},
{
"status": "affected",
"version": "15.2(2)E5b"
},
{
"status": "affected",
"version": "15.2(5a)E1"
},
{
"status": "affected",
"version": "15.2(4)E4"
},
{
"status": "affected",
"version": "15.2(2)E7"
},
{
"status": "affected",
"version": "15.2(5)E2"
},
{
"status": "affected",
"version": "15.2(6)E"
},
{
"status": "affected",
"version": "15.2(4)E5"
},
{
"status": "affected",
"version": "15.2(5)E2c"
},
{
"status": "affected",
"version": "15.2(2)E8"
},
{
"status": "affected",
"version": "15.2(6)E0a"
},
{
"status": "affected",
"version": "15.2(6)E1"
},
{
"status": "affected",
"version": "15.2(6)E0c"
},
{
"status": "affected",
"version": "15.2(4)E6"
},
{
"status": "affected",
"version": "15.2(6)E2"
},
{
"status": "affected",
"version": "15.2(2)E9"
},
{
"status": "affected",
"version": "15.2(4)E7"
},
{
"status": "affected",
"version": "15.2(7)E"
},
{
"status": "affected",
"version": "15.2(2)E10"
},
{
"status": "affected",
"version": "15.2(4)E8"
},
{
"status": "affected",
"version": "15.2(6)E2a"
},
{
"status": "affected",
"version": "15.2(6)E2b"
},
{
"status": "affected",
"version": "15.2(7)E1"
},
{
"status": "affected",
"version": "15.2(7)E0a"
},
{
"status": "affected",
"version": "15.2(7)E0b"
},
{
"status": "affected",
"version": "15.2(7)E0s"
},
{
"status": "affected",
"version": "15.2(6)E3"
},
{
"status": "affected",
"version": "15.2(4)E9"
},
{
"status": "affected",
"version": "15.2(7)E2"
},
{
"status": "affected",
"version": "15.2(7a)E0b"
},
{
"status": "affected",
"version": "15.2(4)E10"
},
{
"status": "affected",
"version": "15.2(7)E3"
},
{
"status": "affected",
"version": "15.2(7)E1a"
},
{
"status": "affected",
"version": "15.2(7b)E0b"
},
{
"status": "affected",
"version": "15.2(7)E2a"
},
{
"status": "affected",
"version": "15.2(4)E10a"
},
{
"status": "affected",
"version": "15.2(7)E4"
},
{
"status": "affected",
"version": "15.2(7)E3k"
},
{
"status": "affected",
"version": "15.2(8)E"
},
{
"status": "affected",
"version": "15.2(8)E1"
},
{
"status": "affected",
"version": "15.2(7)E5"
},
{
"status": "affected",
"version": "15.2(7)E6"
},
{
"status": "affected",
"version": "15.2(8)E2"
},
{
"status": "affected",
"version": "15.2(4)E10d"
},
{
"status": "affected",
"version": "15.2(7)E7"
},
{
"status": "affected",
"version": "15.2(8)E3"
},
{
"status": "affected",
"version": "15.2(7)E8"
},
{
"status": "affected",
"version": "15.2(8)E4"
},
{
"status": "affected",
"version": "15.2(7)E9"
},
{
"status": "affected",
"version": "15.2(8)E5"
},
{
"status": "affected",
"version": "15.2(8)E6"
},
{
"status": "affected",
"version": "15.2(7)E10"
},
{
"status": "affected",
"version": "15.2(7)E11"
},
{
"status": "affected",
"version": "15.2(8)E7"
},
{
"status": "affected",
"version": "15.2(7)E12"
},
{
"status": "affected",
"version": "15.1(3)MRA"
},
{
"status": "affected",
"version": "15.1(3)MRA1"
},
{
"status": "affected",
"version": "15.1(3)MRA2"
},
{
"status": "affected",
"version": "15.1(3)MRA3"
},
{
"status": "affected",
"version": "15.1(3)MRA4"
},
{
"status": "affected",
"version": "15.1(3)SVB1"
},
{
"status": "affected",
"version": "15.1(3)SVB2"
},
{
"status": "affected",
"version": "15.2(4)JB5h"
},
{
"status": "affected",
"version": "15.4(1)S"
},
{
"status": "affected",
"version": "15.4(2)S"
},
{
"status": "affected",
"version": "15.4(3)S"
},
{
"status": "affected",
"version": "15.4(1)S1"
},
{
"status": "affected",
"version": "15.4(1)S2"
},
{
"status": "affected",
"version": "15.4(2)S1"
},
{
"status": "affected",
"version": "15.4(1)S3"
},
{
"status": "affected",
"version": "15.4(3)S1"
},
{
"status": "affected",
"version": "15.4(2)S2"
},
{
"status": "affected",
"version": "15.4(3)S2"
},
{
"status": "affected",
"version": "15.4(3)S3"
},
{
"status": "affected",
"version": "15.4(1)S4"
},
{
"status": "affected",
"version": "15.4(2)S3"
},
{
"status": "affected",
"version": "15.4(2)S4"
},
{
"status": "affected",
"version": "15.4(3)S4"
},
{
"status": "affected",
"version": "15.4(3)S5"
},
{
"status": "affected",
"version": "15.4(3)S6"
},
{
"status": "affected",
"version": "15.4(3)S7"
},
{
"status": "affected",
"version": "15.4(3)S6a"
},
{
"status": "affected",
"version": "15.4(3)S8"
},
{
"status": "affected",
"version": "15.4(3)S9"
},
{
"status": "affected",
"version": "15.4(3)S10"
},
{
"status": "affected",
"version": "15.3(3)M"
},
{
"status": "affected",
"version": "15.3(3)M1"
},
{
"status": "affected",
"version": "15.3(3)M2"
},
{
"status": "affected",
"version": "15.3(3)M3"
},
{
"status": "affected",
"version": "15.3(3)M5"
},
{
"status": "affected",
"version": "15.3(3)M4"
},
{
"status": "affected",
"version": "15.3(3)M6"
},
{
"status": "affected",
"version": "15.3(3)M7"
},
{
"status": "affected",
"version": "15.3(3)M8"
},
{
"status": "affected",
"version": "15.3(3)M9"
},
{
"status": "affected",
"version": "15.3(3)M10"
},
{
"status": "affected",
"version": "15.3(3)M8a"
},
{
"status": "affected",
"version": "15.0(2)EZ"
},
{
"status": "affected",
"version": "15.1(3)SVD"
},
{
"status": "affected",
"version": "15.1(3)SVD1"
},
{
"status": "affected",
"version": "15.1(3)SVD2"
},
{
"status": "affected",
"version": "15.2(1)EY"
},
{
"status": "affected",
"version": "15.0(2)EJ"
},
{
"status": "affected",
"version": "15.0(2)EJ1"
},
{
"status": "affected",
"version": "15.2(1)SY"
},
{
"status": "affected",
"version": "15.2(1)SY1"
},
{
"status": "affected",
"version": "15.2(1)SY0a"
},
{
"status": "affected",
"version": "15.2(1)SY2"
},
{
"status": "affected",
"version": "15.2(2)SY"
},
{
"status": "affected",
"version": "15.2(1)SY1a"
},
{
"status": "affected",
"version": "15.2(2)SY1"
},
{
"status": "affected",
"version": "15.2(2)SY2"
},
{
"status": "affected",
"version": "15.2(1)SY3"
},
{
"status": "affected",
"version": "15.2(1)SY4"
},
{
"status": "affected",
"version": "15.2(2)SY3"
},
{
"status": "affected",
"version": "15.2(1)SY5"
},
{
"status": "affected",
"version": "15.2(1)SY6"
},
{
"status": "affected",
"version": "15.2(1)SY7"
},
{
"status": "affected",
"version": "15.2(1)SY8"
},
{
"status": "affected",
"version": "15.2(5)EX"
},
{
"status": "affected",
"version": "15.1(3)SVF"
},
{
"status": "affected",
"version": "15.1(3)SVF1"
},
{
"status": "affected",
"version": "15.1(3)SVE"
},
{
"status": "affected",
"version": "15.0(2)EK"
},
{
"status": "affected",
"version": "15.0(2)EK1"
},
{
"status": "affected",
"version": "15.4(1)CG"
},
{
"status": "affected",
"version": "15.4(1)CG1"
},
{
"status": "affected",
"version": "15.4(2)CG"
},
{
"status": "affected",
"version": "15.5(1)S"
},
{
"status": "affected",
"version": "15.5(2)S"
},
{
"status": "affected",
"version": "15.5(1)S1"
},
{
"status": "affected",
"version": "15.5(3)S"
},
{
"status": "affected",
"version": "15.5(1)S2"
},
{
"status": "affected",
"version": "15.5(1)S3"
},
{
"status": "affected",
"version": "15.5(2)S1"
},
{
"status": "affected",
"version": "15.5(2)S2"
},
{
"status": "affected",
"version": "15.5(3)S1"
},
{
"status": "affected",
"version": "15.5(3)S1a"
},
{
"status": "affected",
"version": "15.5(2)S3"
},
{
"status": "affected",
"version": "15.5(3)S2"
},
{
"status": "affected",
"version": "15.5(3)S0a"
},
{
"status": "affected",
"version": "15.5(3)S3"
},
{
"status": "affected",
"version": "15.5(1)S4"
},
{
"status": "affected",
"version": "15.5(2)S4"
},
{
"status": "affected",
"version": "15.5(3)S4"
},
{
"status": "affected",
"version": "15.5(3)S5"
},
{
"status": "affected",
"version": "15.5(3)S6"
},
{
"status": "affected",
"version": "15.5(3)S6a"
},
{
"status": "affected",
"version": "15.5(3)S7"
},
{
"status": "affected",
"version": "15.5(3)S6b"
},
{
"status": "affected",
"version": "15.5(3)S8"
},
{
"status": "affected",
"version": "15.5(3)S9"
},
{
"status": "affected",
"version": "15.5(3)S10"
},
{
"status": "affected",
"version": "15.5(3)S9a"
},
{
"status": "affected",
"version": "15.1(3)SVG"
},
{
"status": "affected",
"version": "15.2(2)EB"
},
{
"status": "affected",
"version": "15.2(2)EB1"
},
{
"status": "affected",
"version": "15.2(2)EB2"
},
{
"status": "affected",
"version": "15.2(6)EB"
},
{
"status": "affected",
"version": "15.5(1)T"
},
{
"status": "affected",
"version": "15.5(1)T1"
},
{
"status": "affected",
"version": "15.5(2)T"
},
{
"status": "affected",
"version": "15.5(1)T2"
},
{
"status": "affected",
"version": "15.5(1)T3"
},
{
"status": "affected",
"version": "15.5(2)T1"
},
{
"status": "affected",
"version": "15.5(2)T2"
},
{
"status": "affected",
"version": "15.5(2)T3"
},
{
"status": "affected",
"version": "15.5(2)T4"
},
{
"status": "affected",
"version": "15.5(1)T4"
},
{
"status": "affected",
"version": "15.2(2)EA"
},
{
"status": "affected",
"version": "15.2(2)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA2"
},
{
"status": "affected",
"version": "15.2(3)EA"
},
{
"status": "affected",
"version": "15.2(4)EA"
},
{
"status": "affected",
"version": "15.2(4)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA3"
},
{
"status": "affected",
"version": "15.2(4)EA3"
},
{
"status": "affected",
"version": "15.2(5)EA"
},
{
"status": "affected",
"version": "15.2(4)EA4"
},
{
"status": "affected",
"version": "15.2(4)EA5"
},
{
"status": "affected",
"version": "15.2(4)EA6"
},
{
"status": "affected",
"version": "15.2(4)EA7"
},
{
"status": "affected",
"version": "15.2(4)EA8"
},
{
"status": "affected",
"version": "15.2(4)EA9"
},
{
"status": "affected",
"version": "15.2(4)EA9a"
},
{
"status": "affected",
"version": "15.5(3)M"
},
{
"status": "affected",
"version": "15.5(3)M1"
},
{
"status": "affected",
"version": "15.5(3)M0a"
},
{
"status": "affected",
"version": "15.5(3)M2"
},
{
"status": "affected",
"version": "15.5(3)M3"
},
{
"status": "affected",
"version": "15.5(3)M4"
},
{
"status": "affected",
"version": "15.5(3)M4a"
},
{
"status": "affected",
"version": "15.5(3)M5"
},
{
"status": "affected",
"version": "15.5(3)M6"
},
{
"status": "affected",
"version": "15.5(3)M7"
},
{
"status": "affected",
"version": "15.5(3)M6a"
},
{
"status": "affected",
"version": "15.5(3)M8"
},
{
"status": "affected",
"version": "15.5(3)M9"
},
{
"status": "affected",
"version": "15.5(3)M10"
},
{
"status": "affected",
"version": "12.2(33)SCI"
},
{
"status": "affected",
"version": "12.2(33)SCI1"
},
{
"status": "affected",
"version": "12.2(33)SCI1a"
},
{
"status": "affected",
"version": "12.2(33)SCI2"
},
{
"status": "affected",
"version": "12.2(33)SCI3"
},
{
"status": "affected",
"version": "12.2(33)SCI2a"
},
{
"status": "affected",
"version": "15.5(3)SN"
},
{
"status": "affected",
"version": "15.0(2)SQD"
},
{
"status": "affected",
"version": "15.0(2)SQD1"
},
{
"status": "affected",
"version": "15.0(2)SQD2"
},
{
"status": "affected",
"version": "15.0(2)SQD3"
},
{
"status": "affected",
"version": "15.0(2)SQD4"
},
{
"status": "affected",
"version": "15.0(2)SQD5"
},
{
"status": "affected",
"version": "15.0(2)SQD6"
},
{
"status": "affected",
"version": "15.0(2)SQD7"
},
{
"status": "affected",
"version": "15.0(2)SQD8"
},
{
"status": "affected",
"version": "15.6(1)S"
},
{
"status": "affected",
"version": "15.6(2)S"
},
{
"status": "affected",
"version": "15.6(2)S1"
},
{
"status": "affected",
"version": "15.6(1)S1"
},
{
"status": "affected",
"version": "15.6(1)S2"
},
{
"status": "affected",
"version": "15.6(2)S2"
},
{
"status": "affected",
"version": "15.6(1)S3"
},
{
"status": "affected",
"version": "15.6(2)S3"
},
{
"status": "affected",
"version": "15.6(1)S4"
},
{
"status": "affected",
"version": "15.6(2)S4"
},
{
"status": "affected",
"version": "15.6(1)T"
},
{
"status": "affected",
"version": "15.6(2)T"
},
{
"status": "affected",
"version": "15.6(1)T0a"
},
{
"status": "affected",
"version": "15.6(1)T1"
},
{
"status": "affected",
"version": "15.6(2)T1"
},
{
"status": "affected",
"version": "15.6(1)T2"
},
{
"status": "affected",
"version": "15.6(2)T2"
},
{
"status": "affected",
"version": "15.6(1)T3"
},
{
"status": "affected",
"version": "15.6(2)T3"
},
{
"status": "affected",
"version": "15.3(1)SY"
},
{
"status": "affected",
"version": "15.3(1)SY1"
},
{
"status": "affected",
"version": "15.3(1)SY2"
},
{
"status": "affected",
"version": "15.3(3)JNC2"
},
{
"status": "affected",
"version": "15.3(3)JNC3"
},
{
"status": "affected",
"version": "12.2(33)SCJ"
},
{
"status": "affected",
"version": "12.2(33)SCJ1a"
},
{
"status": "affected",
"version": "12.2(33)SCJ2"
},
{
"status": "affected",
"version": "12.2(33)SCJ2a"
},
{
"status": "affected",
"version": "12.2(33)SCJ2b"
},
{
"status": "affected",
"version": "12.2(33)SCJ2c"
},
{
"status": "affected",
"version": "12.2(33)SCJ3"
},
{
"status": "affected",
"version": "12.2(33)SCJ4"
},
{
"status": "affected",
"version": "15.6(2)SP"
},
{
"status": "affected",
"version": "15.6(2)SP1"
},
{
"status": "affected",
"version": "15.6(2)SP2"
},
{
"status": "affected",
"version": "15.6(2)SP3"
},
{
"status": "affected",
"version": "15.6(2)SP4"
},
{
"status": "affected",
"version": "15.6(2)SP5"
},
{
"status": "affected",
"version": "15.6(2)SP6"
},
{
"status": "affected",
"version": "15.6(2)SP7"
},
{
"status": "affected",
"version": "15.6(2)SP8"
},
{
"status": "affected",
"version": "15.6(2)SP9"
},
{
"status": "affected",
"version": "15.6(2)SN"
},
{
"status": "affected",
"version": "15.6(3)M"
},
{
"status": "affected",
"version": "15.6(3)M1"
},
{
"status": "affected",
"version": "15.6(3)M0a"
},
{
"status": "affected",
"version": "15.6(3)M1b"
},
{
"status": "affected",
"version": "15.6(3)M2"
},
{
"status": "affected",
"version": "15.6(3)M2a"
},
{
"status": "affected",
"version": "15.6(3)M3"
},
{
"status": "affected",
"version": "15.6(3)M3a"
},
{
"status": "affected",
"version": "15.6(3)M4"
},
{
"status": "affected",
"version": "15.6(3)M5"
},
{
"status": "affected",
"version": "15.6(3)M6"
},
{
"status": "affected",
"version": "15.6(3)M7"
},
{
"status": "affected",
"version": "15.6(3)M6a"
},
{
"status": "affected",
"version": "15.6(3)M6b"
},
{
"status": "affected",
"version": "15.6(3)M8"
},
{
"status": "affected",
"version": "15.6(3)M9"
},
{
"status": "affected",
"version": "15.1(3)SVJ2"
},
{
"status": "affected",
"version": "15.2(4)EC1"
},
{
"status": "affected",
"version": "15.2(4)EC2"
},
{
"status": "affected",
"version": "15.3(3)JPC100"
},
{
"status": "affected",
"version": "15.4(1)SY"
},
{
"status": "affected",
"version": "15.4(1)SY1"
},
{
"status": "affected",
"version": "15.4(1)SY2"
},
{
"status": "affected",
"version": "15.4(1)SY3"
},
{
"status": "affected",
"version": "15.4(1)SY4"
},
{
"status": "affected",
"version": "15.5(1)SY"
},
{
"status": "affected",
"version": "15.5(1)SY1"
},
{
"status": "affected",
"version": "15.5(1)SY2"
},
{
"status": "affected",
"version": "15.5(1)SY3"
},
{
"status": "affected",
"version": "15.5(1)SY4"
},
{
"status": "affected",
"version": "15.5(1)SY5"
},
{
"status": "affected",
"version": "15.5(1)SY6"
},
{
"status": "affected",
"version": "15.5(1)SY7"
},
{
"status": "affected",
"version": "15.5(1)SY8"
},
{
"status": "affected",
"version": "15.5(1)SY9"
},
{
"status": "affected",
"version": "15.5(1)SY10"
},
{
"status": "affected",
"version": "15.5(1)SY11"
},
{
"status": "affected",
"version": "15.5(1)SY12"
},
{
"status": "affected",
"version": "15.5(1)SY13"
},
{
"status": "affected",
"version": "15.5(1)SY14"
},
{
"status": "affected",
"version": "15.5(1)SY15"
},
{
"status": "affected",
"version": "15.7(3)M"
},
{
"status": "affected",
"version": "15.7(3)M1"
},
{
"status": "affected",
"version": "15.7(3)M0a"
},
{
"status": "affected",
"version": "15.7(3)M3"
},
{
"status": "affected",
"version": "15.7(3)M2"
},
{
"status": "affected",
"version": "15.7(3)M4"
},
{
"status": "affected",
"version": "15.7(3)M5"
},
{
"status": "affected",
"version": "15.7(3)M4a"
},
{
"status": "affected",
"version": "15.7(3)M4b"
},
{
"status": "affected",
"version": "15.7(3)M6"
},
{
"status": "affected",
"version": "15.7(3)M7"
},
{
"status": "affected",
"version": "15.7(3)M8"
},
{
"status": "affected",
"version": "15.7(3)M9"
},
{
"status": "affected",
"version": "15.8(3)M"
},
{
"status": "affected",
"version": "15.8(3)M1"
},
{
"status": "affected",
"version": "15.8(3)M0a"
},
{
"status": "affected",
"version": "15.8(3)M0b"
},
{
"status": "affected",
"version": "15.8(3)M2"
},
{
"status": "affected",
"version": "15.8(3)M1a"
},
{
"status": "affected",
"version": "15.8(3)M3"
},
{
"status": "affected",
"version": "15.8(3)M2a"
},
{
"status": "affected",
"version": "15.8(3)M4"
},
{
"status": "affected",
"version": "15.8(3)M3a"
},
{
"status": "affected",
"version": "15.8(3)M3b"
},
{
"status": "affected",
"version": "15.8(3)M5"
},
{
"status": "affected",
"version": "15.8(3)M6"
},
{
"status": "affected",
"version": "15.8(3)M7"
},
{
"status": "affected",
"version": "15.8(3)M8"
},
{
"status": "affected",
"version": "15.8(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M"
},
{
"status": "affected",
"version": "15.9(3)M1"
},
{
"status": "affected",
"version": "15.9(3)M0a"
},
{
"status": "affected",
"version": "15.9(3)M2"
},
{
"status": "affected",
"version": "15.9(3)M3"
},
{
"status": "affected",
"version": "15.9(3)M2a"
},
{
"status": "affected",
"version": "15.9(3)M3a"
},
{
"status": "affected",
"version": "15.9(3)M4"
},
{
"status": "affected",
"version": "15.9(3)M3b"
},
{
"status": "affected",
"version": "15.9(3)M5"
},
{
"status": "affected",
"version": "15.9(3)M4a"
},
{
"status": "affected",
"version": "15.9(3)M6"
},
{
"status": "affected",
"version": "15.9(3)M7"
},
{
"status": "affected",
"version": "15.9(3)M6a"
},
{
"status": "affected",
"version": "15.9(3)M6b"
},
{
"status": "affected",
"version": "15.9(3)M8"
},
{
"status": "affected",
"version": "15.9(3)M7a"
},
{
"status": "affected",
"version": "15.9(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M8b"
},
{
"status": "affected",
"version": "15.9(3)M10"
},
{
"status": "affected",
"version": "15.9(3)M11"
}
]
},
{
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "6.9.2"
}
]
},
{
"product": "Cisco Adaptive Security Appliance (ASA) Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "9.8.1"
},
{
"status": "affected",
"version": "9.8.1.5"
},
{
"status": "affected",
"version": "9.8.1.7"
},
{
"status": "affected",
"version": "9.8.2"
},
{
"status": "affected",
"version": "9.8.2.8"
},
{
"status": "affected",
"version": "9.8.2.14"
},
{
"status": "affected",
"version": "9.8.2.15"
},
{
"status": "affected",
"version": "9.8.2.17"
},
{
"status": "affected",
"version": "9.8.2.20"
},
{
"status": "affected",
"version": "9.8.2.24"
},
{
"status": "affected",
"version": "9.8.2.26"
},
{
"status": "affected",
"version": "9.8.2.28"
},
{
"status": "affected",
"version": "9.8.2.33"
},
{
"status": "affected",
"version": "9.8.2.35"
},
{
"status": "affected",
"version": "9.8.2.38"
},
{
"status": "affected",
"version": "9.8.3.8"
},
{
"status": "affected",
"version": "9.8.3.11"
},
{
"status": "affected",
"version": "9.8.3.14"
},
{
"status": "affected",
"version": "9.8.3.16"
},
{
"status": "affected",
"version": "9.8.3.18"
},
{
"status": "affected",
"version": "9.8.3.21"
},
{
"status": "affected",
"version": "9.8.3"
},
{
"status": "affected",
"version": "9.8.3.26"
},
{
"status": "affected",
"version": "9.8.3.29"
},
{
"status": "affected",
"version": "9.8.4"
},
{
"status": "affected",
"version": "9.8.4.3"
},
{
"status": "affected",
"version": "9.8.4.7"
},
{
"status": "affected",
"version": "9.8.4.8"
},
{
"status": "affected",
"version": "9.8.4.10"
},
{
"status": "affected",
"version": "9.8.4.12"
},
{
"status": "affected",
"version": "9.8.4.15"
},
{
"status": "affected",
"version": "9.8.4.17"
},
{
"status": "affected",
"version": "9.8.2.45"
},
{
"status": "affected",
"version": "9.8.4.25"
},
{
"status": "affected",
"version": "9.8.4.20"
},
{
"status": "affected",
"version": "9.8.4.22"
},
{
"status": "affected",
"version": "9.8.4.26"
},
{
"status": "affected",
"version": "9.8.4.29"
},
{
"status": "affected",
"version": "9.8.4.32"
},
{
"status": "affected",
"version": "9.8.4.33"
},
{
"status": "affected",
"version": "9.8.4.34"
},
{
"status": "affected",
"version": "9.8.4.35"
},
{
"status": "affected",
"version": "9.8.4.39"
},
{
"status": "affected",
"version": "9.8.4.40"
},
{
"status": "affected",
"version": "9.8.4.41"
},
{
"status": "affected",
"version": "9.8.4.43"
},
{
"status": "affected",
"version": "9.8.4.44"
},
{
"status": "affected",
"version": "9.8.4.45"
},
{
"status": "affected",
"version": "9.8.4.46"
},
{
"status": "affected",
"version": "9.8.4.48"
},
{
"status": "affected",
"version": "9.12.1"
},
{
"status": "affected",
"version": "9.12.1.2"
},
{
"status": "affected",
"version": "9.12.1.3"
},
{
"status": "affected",
"version": "9.12.2"
},
{
"status": "affected",
"version": "9.12.2.4"
},
{
"status": "affected",
"version": "9.12.2.5"
},
{
"status": "affected",
"version": "9.12.2.9"
},
{
"status": "affected",
"version": "9.12.3"
},
{
"status": "affected",
"version": "9.12.3.2"
},
{
"status": "affected",
"version": "9.12.3.7"
},
{
"status": "affected",
"version": "9.12.4"
},
{
"status": "affected",
"version": "9.12.3.12"
},
{
"status": "affected",
"version": "9.12.3.9"
},
{
"status": "affected",
"version": "9.12.2.1"
},
{
"status": "affected",
"version": "9.12.4.2"
},
{
"status": "affected",
"version": "9.12.4.4"
},
{
"status": "affected",
"version": "9.12.4.7"
},
{
"status": "affected",
"version": "9.12.4.10"
},
{
"status": "affected",
"version": "9.12.4.13"
},
{
"status": "affected",
"version": "9.12.4.8"
},
{
"status": "affected",
"version": "9.12.4.18"
},
{
"status": "affected",
"version": "9.12.4.24"
},
{
"status": "affected",
"version": "9.12.4.26"
},
{
"status": "affected",
"version": "9.12.4.29"
},
{
"status": "affected",
"version": "9.12.4.30"
},
{
"status": "affected",
"version": "9.12.4.35"
},
{
"status": "affected",
"version": "9.12.4.37"
},
{
"status": "affected",
"version": "9.12.4.38"
},
{
"status": "affected",
"version": "9.12.4.39"
},
{
"status": "affected",
"version": "9.12.4.40"
},
{
"status": "affected",
"version": "9.12.4.41"
},
{
"status": "affected",
"version": "9.12.4.47"
},
{
"status": "affected",
"version": "9.12.4.48"
},
{
"status": "affected",
"version": "9.12.4.50"
},
{
"status": "affected",
"version": "9.12.4.52"
},
{
"status": "affected",
"version": "9.12.4.54"
},
{
"status": "affected",
"version": "9.12.4.55"
},
{
"status": "affected",
"version": "9.12.4.56"
},
{
"status": "affected",
"version": "9.12.4.58"
},
{
"status": "affected",
"version": "9.12.4.62"
},
{
"status": "affected",
"version": "9.12.4.65"
},
{
"status": "affected",
"version": "9.12.4.67"
},
{
"status": "affected",
"version": "9.14.1"
},
{
"status": "affected",
"version": "9.14.1.10"
},
{
"status": "affected",
"version": "9.14.1.6"
},
{
"status": "affected",
"version": "9.14.1.15"
},
{
"status": "affected",
"version": "9.14.1.19"
},
{
"status": "affected",
"version": "9.14.1.30"
},
{
"status": "affected",
"version": "9.14.2"
},
{
"status": "affected",
"version": "9.14.2.4"
},
{
"status": "affected",
"version": "9.14.2.8"
},
{
"status": "affected",
"version": "9.14.2.13"
},
{
"status": "affected",
"version": "9.14.2.15"
},
{
"status": "affected",
"version": "9.14.3"
},
{
"status": "affected",
"version": "9.14.3.1"
},
{
"status": "affected",
"version": "9.14.3.9"
},
{
"status": "affected",
"version": "9.14.3.11"
},
{
"status": "affected",
"version": "9.14.3.13"
},
{
"status": "affected",
"version": "9.14.3.18"
},
{
"status": "affected",
"version": "9.14.3.15"
},
{
"status": "affected",
"version": "9.14.4"
},
{
"status": "affected",
"version": "9.14.4.6"
},
{
"status": "affected",
"version": "9.14.4.7"
},
{
"status": "affected",
"version": "9.14.4.12"
},
{
"status": "affected",
"version": "9.14.4.13"
},
{
"status": "affected",
"version": "9.14.4.14"
},
{
"status": "affected",
"version": "9.14.4.15"
},
{
"status": "affected",
"version": "9.14.4.17"
},
{
"status": "affected",
"version": "9.14.4.22"
},
{
"status": "affected",
"version": "9.14.4.23"
},
{
"status": "affected",
"version": "9.14.4.24"
},
{
"status": "affected",
"version": "9.16.1"
},
{
"status": "affected",
"version": "9.16.1.28"
},
{
"status": "affected",
"version": "9.16.2"
},
{
"status": "affected",
"version": "9.16.2.3"
},
{
"status": "affected",
"version": "9.16.2.7"
},
{
"status": "affected",
"version": "9.16.2.11"
},
{
"status": "affected",
"version": "9.16.2.13"
},
{
"status": "affected",
"version": "9.16.2.14"
},
{
"status": "affected",
"version": "9.16.3"
},
{
"status": "affected",
"version": "9.16.3.3"
},
{
"status": "affected",
"version": "9.16.3.14"
},
{
"status": "affected",
"version": "9.16.3.15"
},
{
"status": "affected",
"version": "9.16.3.19"
},
{
"status": "affected",
"version": "9.16.3.23"
},
{
"status": "affected",
"version": "9.16.4"
},
{
"status": "affected",
"version": "9.16.4.9"
},
{
"status": "affected",
"version": "9.16.4.14"
},
{
"status": "affected",
"version": "9.16.4.18"
},
{
"status": "affected",
"version": "9.16.4.19"
},
{
"status": "affected",
"version": "9.16.4.27"
},
{
"status": "affected",
"version": "9.16.4.38"
},
{
"status": "affected",
"version": "9.16.4.39"
},
{
"status": "affected",
"version": "9.16.4.42"
},
{
"status": "affected",
"version": "9.16.4.48"
},
{
"status": "affected",
"version": "9.16.4.55"
},
{
"status": "affected",
"version": "9.16.4.57"
},
{
"status": "affected",
"version": "9.16.4.61"
},
{
"status": "affected",
"version": "9.16.4.62"
},
{
"status": "affected",
"version": "9.16.4.67"
},
{
"status": "affected",
"version": "9.16.4.70"
},
{
"status": "affected",
"version": "9.16.4.71"
},
{
"status": "affected",
"version": "9.16.4.76"
},
{
"status": "affected",
"version": "9.16.4.82"
},
{
"status": "affected",
"version": "9.17.1"
},
{
"status": "affected",
"version": "9.17.1.7"
},
{
"status": "affected",
"version": "9.17.1.9"
},
{
"status": "affected",
"version": "9.17.1.10"
},
{
"status": "affected",
"version": "9.17.1.11"
},
{
"status": "affected",
"version": "9.17.1.13"
},
{
"status": "affected",
"version": "9.17.1.15"
},
{
"status": "affected",
"version": "9.17.1.20"
},
{
"status": "affected",
"version": "9.17.1.30"
},
{
"status": "affected",
"version": "9.17.1.33"
},
{
"status": "affected",
"version": "9.17.1.39"
},
{
"status": "affected",
"version": "9.17.1.45"
},
{
"status": "affected",
"version": "9.17.1.46"
},
{
"status": "affected",
"version": "9.18.1"
},
{
"status": "affected",
"version": "9.18.1.3"
},
{
"status": "affected",
"version": "9.18.2"
},
{
"status": "affected",
"version": "9.18.2.5"
},
{
"status": "affected",
"version": "9.18.2.7"
},
{
"status": "affected",
"version": "9.18.2.8"
},
{
"status": "affected",
"version": "9.18.3"
},
{
"status": "affected",
"version": "9.18.3.39"
},
{
"status": "affected",
"version": "9.18.3.46"
},
{
"status": "affected",
"version": "9.18.3.53"
},
{
"status": "affected",
"version": "9.18.3.55"
},
{
"status": "affected",
"version": "9.18.3.56"
},
{
"status": "affected",
"version": "9.18.4"
},
{
"status": "affected",
"version": "9.18.4.5"
},
{
"status": "affected",
"version": "9.18.4.8"
},
{
"status": "affected",
"version": "9.18.4.22"
},
{
"status": "affected",
"version": "9.18.4.24"
},
{
"status": "affected",
"version": "9.18.4.29"
},
{
"status": "affected",
"version": "9.18.4.34"
},
{
"status": "affected",
"version": "9.18.4.40"
},
{
"status": "affected",
"version": "9.18.4.47"
},
{
"status": "affected",
"version": "9.18.4.50"
},
{
"status": "affected",
"version": "9.18.4.52"
},
{
"status": "affected",
"version": "9.18.4.53"
},
{
"status": "affected",
"version": "9.19.1"
},
{
"status": "affected",
"version": "9.19.1.5"
},
{
"status": "affected",
"version": "9.19.1.9"
},
{
"status": "affected",
"version": "9.19.1.12"
},
{
"status": "affected",
"version": "9.19.1.18"
},
{
"status": "affected",
"version": "9.19.1.22"
},
{
"status": "affected",
"version": "9.19.1.24"
},
{
"status": "affected",
"version": "9.19.1.27"
},
{
"status": "affected",
"version": "9.19.1.28"
},
{
"status": "affected",
"version": "9.19.1.31"
},
{
"status": "affected",
"version": "9.19.1.37"
},
{
"status": "affected",
"version": "9.19.1.38"
},
{
"status": "affected",
"version": "9.20.1"
},
{
"status": "affected",
"version": "9.20.1.5"
},
{
"status": "affected",
"version": "9.20.2"
},
{
"status": "affected",
"version": "9.20.2.10"
},
{
"status": "affected",
"version": "9.20.2.21"
},
{
"status": "affected",
"version": "9.20.2.22"
},
{
"status": "affected",
"version": "9.20.3"
},
{
"status": "affected",
"version": "9.20.3.4"
},
{
"status": "affected",
"version": "9.20.3.7"
},
{
"status": "affected",
"version": "9.20.3.9"
},
{
"status": "affected",
"version": "9.20.3.10"
},
{
"status": "affected",
"version": "9.20.3.13"
},
{
"status": "affected",
"version": "9.22.1.1"
},
{
"status": "affected",
"version": "9.22.1.3"
},
{
"status": "affected",
"version": "9.22.1.2"
},
{
"status": "affected",
"version": "9.22.1.6"
},
{
"status": "affected",
"version": "9.23.1"
}
]
},
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.2.0SG"
},
{
"status": "affected",
"version": "3.2.1SG"
},
{
"status": "affected",
"version": "3.2.2SG"
},
{
"status": "affected",
"version": "3.2.3SG"
},
{
"status": "affected",
"version": "3.2.4SG"
},
{
"status": "affected",
"version": "3.2.5SG"
},
{
"status": "affected",
"version": "3.2.6SG"
},
{
"status": "affected",
"version": "3.2.7SG"
},
{
"status": "affected",
"version": "3.2.8SG"
},
{
"status": "affected",
"version": "3.2.9SG"
},
{
"status": "affected",
"version": "3.2.10SG"
},
{
"status": "affected",
"version": "3.2.11SG"
},
{
"status": "affected",
"version": "3.7.0S"
},
{
"status": "affected",
"version": "3.7.1S"
},
{
"status": "affected",
"version": "3.7.2S"
},
{
"status": "affected",
"version": "3.7.3S"
},
{
"status": "affected",
"version": "3.7.4S"
},
{
"status": "affected",
"version": "3.7.5S"
},
{
"status": "affected",
"version": "3.7.6S"
},
{
"status": "affected",
"version": "3.7.7S"
},
{
"status": "affected",
"version": "3.7.4aS"
},
{
"status": "affected",
"version": "3.7.2tS"
},
{
"status": "affected",
"version": "3.7.0bS"
},
{
"status": "affected",
"version": "3.7.1aS"
},
{
"status": "affected",
"version": "3.3.0SG"
},
{
"status": "affected",
"version": "3.3.2SG"
},
{
"status": "affected",
"version": "3.3.1SG"
},
{
"status": "affected",
"version": "3.8.0S"
},
{
"status": "affected",
"version": "3.8.1S"
},
{
"status": "affected",
"version": "3.8.2S"
},
{
"status": "affected",
"version": "3.9.1S"
},
{
"status": "affected",
"version": "3.9.0S"
},
{
"status": "affected",
"version": "3.9.2S"
},
{
"status": "affected",
"version": "3.9.1aS"
},
{
"status": "affected",
"version": "3.9.0aS"
},
{
"status": "affected",
"version": "3.2.0SE"
},
{
"status": "affected",
"version": "3.2.1SE"
},
{
"status": "affected",
"version": "3.2.2SE"
},
{
"status": "affected",
"version": "3.2.3SE"
},
{
"status": "affected",
"version": "3.3.0SE"
},
{
"status": "affected",
"version": "3.3.1SE"
},
{
"status": "affected",
"version": "3.3.2SE"
},
{
"status": "affected",
"version": "3.3.3SE"
},
{
"status": "affected",
"version": "3.3.4SE"
},
{
"status": "affected",
"version": "3.3.5SE"
},
{
"status": "affected",
"version": "3.4.0SG"
},
{
"status": "affected",
"version": "3.4.2SG"
},
{
"status": "affected",
"version": "3.4.1SG"
},
{
"status": "affected",
"version": "3.4.3SG"
},
{
"status": "affected",
"version": "3.4.4SG"
},
{
"status": "affected",
"version": "3.4.5SG"
},
{
"status": "affected",
"version": "3.4.6SG"
},
{
"status": "affected",
"version": "3.4.7SG"
},
{
"status": "affected",
"version": "3.4.8SG"
},
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.11.1S"
},
{
"status": "affected",
"version": "3.11.2S"
},
{
"status": "affected",
"version": "3.11.0S"
},
{
"status": "affected",
"version": "3.11.3S"
},
{
"status": "affected",
"version": "3.11.4S"
},
{
"status": "affected",
"version": "3.12.0S"
},
{
"status": "affected",
"version": "3.12.1S"
},
{
"status": "affected",
"version": "3.12.2S"
},
{
"status": "affected",
"version": "3.12.3S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.12.4S"
},
{
"status": "affected",
"version": "3.13.0S"
},
{
"status": "affected",
"version": "3.13.1S"
},
{
"status": "affected",
"version": "3.13.2S"
},
{
"status": "affected",
"version": "3.13.3S"
},
{
"status": "affected",
"version": "3.13.4S"
},
{
"status": "affected",
"version": "3.13.5S"
},
{
"status": "affected",
"version": "3.13.2aS"
},
{
"status": "affected",
"version": "3.13.0aS"
},
{
"status": "affected",
"version": "3.13.5aS"
},
{
"status": "affected",
"version": "3.13.6S"
},
{
"status": "affected",
"version": "3.13.7S"
},
{
"status": "affected",
"version": "3.13.6aS"
},
{
"status": "affected",
"version": "3.13.7aS"
},
{
"status": "affected",
"version": "3.13.8S"
},
{
"status": "affected",
"version": "3.13.9S"
},
{
"status": "affected",
"version": "3.13.10S"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.5bE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.3.0SQ"
},
{
"status": "affected",
"version": "3.3.1SQ"
},
{
"status": "affected",
"version": "3.4.0SQ"
},
{
"status": "affected",
"version": "3.4.1SQ"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.2aS"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.3aS"
},
{
"status": "affected",
"version": "3.16.4S"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.16.6S"
},
{
"status": "affected",
"version": "3.16.7S"
},
{
"status": "affected",
"version": "3.16.6bS"
},
{
"status": "affected",
"version": "3.16.7aS"
},
{
"status": "affected",
"version": "3.16.7bS"
},
{
"status": "affected",
"version": "3.16.8S"
},
{
"status": "affected",
"version": "3.16.9S"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "3.17.4S"
},
{
"status": "affected",
"version": "16.1.1"
},
{
"status": "affected",
"version": "16.1.2"
},
{
"status": "affected",
"version": "16.1.3"
},
{
"status": "affected",
"version": "16.2.1"
},
{
"status": "affected",
"version": "16.2.2"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.8.8E"
},
{
"status": "affected",
"version": "3.8.9E"
},
{
"status": "affected",
"version": "3.8.10E"
},
{
"status": "affected",
"version": "16.3.1"
},
{
"status": "affected",
"version": "16.3.2"
},
{
"status": "affected",
"version": "16.3.3"
},
{
"status": "affected",
"version": "16.3.1a"
},
{
"status": "affected",
"version": "16.3.4"
},
{
"status": "affected",
"version": "16.3.5"
},
{
"status": "affected",
"version": "16.3.5b"
},
{
"status": "affected",
"version": "16.3.6"
},
{
"status": "affected",
"version": "16.3.7"
},
{
"status": "affected",
"version": "16.3.8"
},
{
"status": "affected",
"version": "16.3.9"
},
{
"status": "affected",
"version": "16.3.10"
},
{
"status": "affected",
"version": "16.3.11"
},
{
"status": "affected",
"version": "16.4.1"
},
{
"status": "affected",
"version": "16.4.2"
},
{
"status": "affected",
"version": "16.4.3"
},
{
"status": "affected",
"version": "16.5.1"
},
{
"status": "affected",
"version": "16.5.1a"
},
{
"status": "affected",
"version": "16.5.1b"
},
{
"status": "affected",
"version": "16.5.2"
},
{
"status": "affected",
"version": "16.5.3"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.2S"
},
{
"status": "affected",
"version": "3.18.3S"
},
{
"status": "affected",
"version": "3.18.4S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.1bSP"
},
{
"status": "affected",
"version": "3.18.1cSP"
},
{
"status": "affected",
"version": "3.18.2SP"
},
{
"status": "affected",
"version": "3.18.2aSP"
},
{
"status": "affected",
"version": "3.18.3SP"
},
{
"status": "affected",
"version": "3.18.4SP"
},
{
"status": "affected",
"version": "3.18.3aSP"
},
{
"status": "affected",
"version": "3.18.3bSP"
},
{
"status": "affected",
"version": "3.18.5SP"
},
{
"status": "affected",
"version": "3.18.6SP"
},
{
"status": "affected",
"version": "3.18.7SP"
},
{
"status": "affected",
"version": "3.18.8aSP"
},
{
"status": "affected",
"version": "3.18.9SP"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.5f"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.2E"
},
{
"status": "affected",
"version": "3.10.3E"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "16.12.13"
},
{
"status": "affected",
"version": "3.11.0E"
},
{
"status": "affected",
"version": "3.11.1E"
},
{
"status": "affected",
"version": "3.11.2E"
},
{
"status": "affected",
"version": "3.11.3E"
},
{
"status": "affected",
"version": "3.11.1aE"
},
{
"status": "affected",
"version": "3.11.4E"
},
{
"status": "affected",
"version": "3.11.3aE"
},
{
"status": "affected",
"version": "3.11.5E"
},
{
"status": "affected",
"version": "3.11.6E"
},
{
"status": "affected",
"version": "3.11.7E"
},
{
"status": "affected",
"version": "3.11.8E"
},
{
"status": "affected",
"version": "3.11.9E"
},
{
"status": "affected",
"version": "3.11.10E"
},
{
"status": "affected",
"version": "3.11.11E"
},
{
"status": "affected",
"version": "3.11.12E"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.7"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.9.5f"
},
{
"status": "affected",
"version": "17.9.7b"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.12.5"
},
{
"status": "affected",
"version": "17.12.4b"
},
{
"status": "affected",
"version": "17.12.1z3"
},
{
"status": "affected",
"version": "17.12.5a"
},
{
"status": "affected",
"version": "17.12.1z4"
},
{
"status": "affected",
"version": "17.12.5c"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.11.99SW"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.15.1z"
},
{
"status": "affected",
"version": "17.15.3"
},
{
"status": "affected",
"version": "17.15.2c"
},
{
"status": "affected",
"version": "17.15.2a"
},
{
"status": "affected",
"version": "17.15.1y"
},
{
"status": "affected",
"version": "17.15.2b"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
},
{
"status": "affected",
"version": "17.17.1"
}
]
},
{
"product": "Cisco Firepower Threat Defense Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.2.3"
},
{
"status": "affected",
"version": "6.2.3.1"
},
{
"status": "affected",
"version": "6.2.3.2"
},
{
"status": "affected",
"version": "6.2.3.3"
},
{
"status": "affected",
"version": "6.2.3.4"
},
{
"status": "affected",
"version": "6.2.3.5"
},
{
"status": "affected",
"version": "6.2.3.6"
},
{
"status": "affected",
"version": "6.2.3.7"
},
{
"status": "affected",
"version": "6.2.3.8"
},
{
"status": "affected",
"version": "6.2.3.10"
},
{
"status": "affected",
"version": "6.2.3.11"
},
{
"status": "affected",
"version": "6.2.3.9"
},
{
"status": "affected",
"version": "6.2.3.12"
},
{
"status": "affected",
"version": "6.2.3.13"
},
{
"status": "affected",
"version": "6.2.3.14"
},
{
"status": "affected",
"version": "6.2.3.15"
},
{
"status": "affected",
"version": "6.2.3.16"
},
{
"status": "affected",
"version": "6.2.3.17"
},
{
"status": "affected",
"version": "6.2.3.18"
},
{
"status": "affected",
"version": "6.6.0"
},
{
"status": "affected",
"version": "6.6.0.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "6.6.5"
},
{
"status": "affected",
"version": "6.6.5.1"
},
{
"status": "affected",
"version": "6.6.5.2"
},
{
"status": "affected",
"version": "6.6.7"
},
{
"status": "affected",
"version": "6.6.7.1"
},
{
"status": "affected",
"version": "6.6.7.2"
},
{
"status": "affected",
"version": "6.4.0"
},
{
"status": "affected",
"version": "6.4.0.1"
},
{
"status": "affected",
"version": "6.4.0.3"
},
{
"status": "affected",
"version": "6.4.0.2"
},
{
"status": "affected",
"version": "6.4.0.4"
},
{
"status": "affected",
"version": "6.4.0.5"
},
{
"status": "affected",
"version": "6.4.0.6"
},
{
"status": "affected",
"version": "6.4.0.7"
},
{
"status": "affected",
"version": "6.4.0.8"
},
{
"status": "affected",
"version": "6.4.0.9"
},
{
"status": "affected",
"version": "6.4.0.10"
},
{
"status": "affected",
"version": "6.4.0.11"
},
{
"status": "affected",
"version": "6.4.0.12"
},
{
"status": "affected",
"version": "6.4.0.13"
},
{
"status": "affected",
"version": "6.4.0.14"
},
{
"status": "affected",
"version": "6.4.0.15"
},
{
"status": "affected",
"version": "6.4.0.16"
},
{
"status": "affected",
"version": "6.4.0.17"
},
{
"status": "affected",
"version": "6.4.0.18"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.0.1"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.0.1.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.0.2.1"
},
{
"status": "affected",
"version": "7.0.3"
},
{
"status": "affected",
"version": "7.0.4"
},
{
"status": "affected",
"version": "7.0.5"
},
{
"status": "affected",
"version": "7.0.6"
},
{
"status": "affected",
"version": "7.0.6.1"
},
{
"status": "affected",
"version": "7.0.6.2"
},
{
"status": "affected",
"version": "7.0.6.3"
},
{
"status": "affected",
"version": "7.0.7"
},
{
"status": "affected",
"version": "7.1.0"
},
{
"status": "affected",
"version": "7.1.0.1"
},
{
"status": "affected",
"version": "7.1.0.2"
},
{
"status": "affected",
"version": "7.1.0.3"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.0.1"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.2.3"
},
{
"status": "affected",
"version": "7.2.4"
},
{
"status": "affected",
"version": "7.2.4.1"
},
{
"status": "affected",
"version": "7.2.5"
},
{
"status": "affected",
"version": "7.2.5.1"
},
{
"status": "affected",
"version": "7.2.6"
},
{
"status": "affected",
"version": "7.2.7"
},
{
"status": "affected",
"version": "7.2.5.2"
},
{
"status": "affected",
"version": "7.2.8"
},
{
"status": "affected",
"version": "7.2.8.1"
},
{
"status": "affected",
"version": "7.2.9"
},
{
"status": "affected",
"version": "7.3.0"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.3.1.1"
},
{
"status": "affected",
"version": "7.3.1.2"
},
{
"status": "affected",
"version": "7.4.0"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.4.1.1"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.4.2.1"
},
{
"status": "affected",
"version": "7.4.2.2"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device. \r\n\r This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device after obtaining additional information about the system, overcoming exploit mitigations, or both. A successful exploit could allow the attacker to execute arbitrary code as root, which may lead to the complete compromise of the affected device.\r\n\r For more information about this vulnerability, see the Details [\"#details\"] section of this advisory."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "Heap-based Buffer Overflow",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-25T16:12:55.674Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-http-code-exec-WmfP3h3O",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O"
}
],
"source": {
"advisory": "cisco-sa-http-code-exec-WmfP3h3O",
"defects": [
"CSCwo18850",
"CSCwo49562",
"CSCwo35704",
"CSCwo35779"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20363",
"datePublished": "2025-09-25T16:12:55.674Z",
"dateReserved": "2024-10-10T19:15:13.258Z",
"dateUpdated": "2026-02-26T17:47:56.711Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-20340 (GCVE-0-2025-20340)
Vulnerability from cvelistv5
Published
2025-09-10 16:06
Modified
2025-09-10 18:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
A vulnerability in the Address Resolution Protocol (ARP) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a broadcast storm, leading to a denial of service (DoS) condition on an affected device.
This vulnerability is due to how Cisco IOS XR Software processes a high, sustained rate of ARP traffic hitting the management interface. Under certain conditions, an attacker could exploit this vulnerability by sending an excessive amount of traffic to the management interface of an affected device, overwhelming its ARP processing capabilities. A successful exploit could result in degraded device performance, loss of management connectivity, and complete unresponsiveness of the system, leading to a DoS condition.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.8.12 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.5.52 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 24.4.10 Version: 6.5.35 Version: 25.1.1 Version: 24.4.2 Version: 24.3.20 Version: 24.4.15 Version: 6.5.351 Version: 24.3.30 Version: 6.5.352 Version: 24.4.30 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20340",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-10T18:30:55.478853Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-10T18:31:00.589Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.5.52"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.10"
},
{
"status": "affected",
"version": "6.5.35"
},
{
"status": "affected",
"version": "25.1.1"
},
{
"status": "affected",
"version": "24.4.2"
},
{
"status": "affected",
"version": "24.3.20"
},
{
"status": "affected",
"version": "24.4.15"
},
{
"status": "affected",
"version": "6.5.351"
},
{
"status": "affected",
"version": "24.3.30"
},
{
"status": "affected",
"version": "6.5.352"
},
{
"status": "affected",
"version": "24.4.30"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Address Resolution Protocol (ARP) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a broadcast storm, leading to a denial of service (DoS) condition on an affected device.\u0026nbsp;\r\n\r\nThis vulnerability is due to how Cisco IOS XR Software processes a high, sustained rate of ARP traffic hitting the management interface. Under certain conditions, an attacker could exploit this vulnerability by sending an excessive amount of traffic to the management interface of an affected device, overwhelming its ARP processing capabilities. A successful exploit could result in degraded device performance, loss of management connectivity, and complete unresponsiveness of the system, leading to a DoS condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "Uncontrolled Resource Consumption",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-10T16:06:58.467Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-arp-storm-EjUU55yM",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-arp-storm-EjUU55yM"
}
],
"source": {
"advisory": "cisco-sa-iosxr-arp-storm-EjUU55yM",
"defects": [
"CSCwm86399"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Address Resolution Protocol Broadcast Storm Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20340",
"datePublished": "2025-09-10T16:06:58.467Z",
"dateReserved": "2024-10-10T19:15:13.255Z",
"dateUpdated": "2025-09-10T18:31:00.589Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20159 (GCVE-0-2025-20159)
Vulnerability from cvelistv5
Published
2025-09-10 16:06
Modified
2025-09-10 18:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features.
This vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.6.1 Version: 6.5.3 Version: 7.0.1 Version: 6.6.11 Version: 6.5.1 Version: 6.5.2 Version: 6.6.2 Version: 6.6.12 Version: 6.6.25 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 7.0.2 Version: 7.1.2 Version: 7.2.1 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.4.1 Version: 7.2.2 Version: 7.3.15 Version: 7.3.16 Version: 7.4.15 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.8.12 Version: 7.3.4 Version: 7.3.3 Version: 7.4.2 Version: 7.7.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.10.2 Version: 24.1.1 Version: 7.3.6 Version: 7.5.52 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 25.1.1 Version: 24.4.2 Version: 24.3.20 Version: 25.1.2 Version: 24.3.30 Version: 24.4.30 Version: 24.2.21 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20159",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-10T18:20:15.573247Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-10T18:20:28.931Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.5.52"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "25.1.1"
},
{
"status": "affected",
"version": "24.4.2"
},
{
"status": "affected",
"version": "24.3.20"
},
{
"status": "affected",
"version": "25.1.2"
},
{
"status": "affected",
"version": "24.3.30"
},
{
"status": "affected",
"version": "24.4.30"
},
{
"status": "affected",
"version": "24.2.21"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features.\r\n\r\nThis vulnerability exists because management interface ACLs have not been supported on Cisco IOS XR Software Packet I/O infrastructure platforms for Linux-handled features such as SSH, NetConf, or gRPC. An attacker could exploit this vulnerability by attempting to send traffic to an affected device. A successful exploit could allow the attacker to bypass an ingress ACL that is applied on the management interface of the affected device."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "Improper Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-10T16:06:49.862Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-acl-packetio-Swjhhbtz",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-acl-packetio-Swjhhbtz"
}
],
"source": {
"advisory": "cisco-sa-acl-packetio-Swjhhbtz",
"defects": [
"CSCwb70861"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Management Interface ACL Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20159",
"datePublished": "2025-09-10T16:06:49.862Z",
"dateReserved": "2024-10-10T19:15:13.217Z",
"dateUpdated": "2025-09-10T18:20:28.931Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20248 (GCVE-0-2025-20248)
Vulnerability from cvelistv5
Published
2025-09-10 16:06
Modified
2026-02-26 17:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Summary
A vulnerability in the installation process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR Software image signature verification and load unsigned software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.
This vulnerability is due to incomplete validation of files during the installation of an .iso file. An attacker could exploit this vulnerability by modifying contents of the .iso image and then installing and activating it on the device. A successful exploit could allow the attacker to load an unsigned file as part of the image activation process.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.1.25 Version: 6.6.4 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.5.31 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.6.15 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.8.1 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.10.1 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 7.6.3 Version: 24.1.1 Version: 7.3.6 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 24.4.10 Version: 6.5.35 Version: 24.4.15 Version: 6.5.351 Version: 6.5.352 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20248",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-11T03:56:26.903508Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:48:42.697Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.10"
},
{
"status": "affected",
"version": "6.5.35"
},
{
"status": "affected",
"version": "24.4.15"
},
{
"status": "affected",
"version": "6.5.351"
},
{
"status": "affected",
"version": "6.5.352"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the installation process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR Software image signature verification and load unsigned software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.\r\n\r\nThis vulnerability is due to incomplete validation of files during the installation of an .iso file. An attacker could exploit this vulnerability by modifying contents of the .iso image and then installing and activating it on the device. A successful exploit could allow the attacker to load an unsigned file as part of the image activation process."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-10T16:06:49.860Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-xrsig-UY4zRUCG",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrsig-UY4zRUCG"
}
],
"source": {
"advisory": "cisco-sa-xrsig-UY4zRUCG",
"defects": [
"CSCwm03455"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Image Verification Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20248",
"datePublished": "2025-09-10T16:06:49.860Z",
"dateReserved": "2024-10-10T19:15:13.238Z",
"dateUpdated": "2026-02-26T17:48:42.697Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-20154 (GCVE-0-2025-20154)
Vulnerability from cvelistv5
Published
2025-05-07 17:18
Modified
2025-05-07 19:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server process to reload unexpectedly if debugs are enabled.
This vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Note: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows: Security Impact Rating (SIR): Low CVSS Base Score: 3.7 CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 6.5.35 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20154",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-07T18:56:59.795728Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T19:46:08.963Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "6.5.35"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server\u0026nbsp;process to reload unexpectedly if debugs are enabled.\r\n\r\nThis vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\nNote: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows:\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Security Impact Rating (SIR): Low\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;CVSS Base Score: 3.7\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T17:18:50.666Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-twamp-kV4FHugn",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-twamp-kV4FHugn"
}
],
"source": {
"advisory": "cisco-sa-twamp-kV4FHugn",
"defects": [
"CSCwk80897"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS, IOS XE and IOS XR Software TWAMP Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20154",
"datePublished": "2025-05-07T17:18:50.666Z",
"dateReserved": "2024-10-10T19:15:13.216Z",
"dateUpdated": "2025-05-07T19:46:08.963Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20209 (GCVE-0-2025-20209)
Vulnerability from cvelistv5
Published
2025-03-12 16:13
Modified
2025-03-12 17:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.
This vulnerability is due to improper handling of malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to prevent the affected device from processing any control plane UDP packets, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.6.1 Version: 6.5.2 Version: 6.6.2 Version: 6.5.1 Version: 7.0.1 Version: 6.6.25 Version: 7.0.0 Version: 7.1.1 Version: 6.6.3 Version: 7.0.2 Version: 7.2.0 Version: 7.1.2 Version: 7.2.1 Version: 7.3.1 Version: 7.4.1 Version: 7.2.2 Version: 7.3.2 Version: 7.5.1 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.7.1 Version: 7.4.2 Version: 7.6.2 Version: 7.8.1 Version: 7.7.2 Version: 7.9.1 Version: 7.8.2 Version: 7.8.22 Version: 7.10.1 Version: 7.7.21 Version: 7.9.2 Version: 7.11.1 Version: 7.10.2 Version: 24.1.1 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20209",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-12T17:50:42.688446Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T17:51:32.083Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.\u0026nbsp;\r\n\r\nThis vulnerability is due to improper handling of malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to prevent the affected device from processing any control plane UDP packets, resulting in a denial of service (DoS) condition.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:13:12.340Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-xrike-9wYGpRGq",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrike-9wYGpRGq"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-xrike-9wYGpRGq",
"defects": [
"CSCwk64612"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20209",
"datePublished": "2025-03-12T16:13:12.340Z",
"dateReserved": "2024-10-10T19:15:13.231Z",
"dateUpdated": "2025-03-12T17:51:32.083Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20177 (GCVE-0-2025-20177)
Vulnerability from cvelistv5
Published
2025-03-12 16:13
Modified
2026-02-26 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-274 - Improper Handling of Insufficient Privileges
Summary
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.
This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.
Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.0.1 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 7.8.23 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20177",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-13T03:55:23.530580Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:35.194Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "7.8.23"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.\r\n\r\nThis vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.\r\nNote: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-274",
"description": "Improper Handling of Insufficient Privileges",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:13:04.362Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ios-xr-verii-bypass-HhPwQRvx",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-ios-xr-verii-bypass-HhPwQRvx",
"defects": [
"CSCwk67262"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Image Verification Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20177",
"datePublished": "2025-03-12T16:13:04.362Z",
"dateReserved": "2024-10-10T19:15:13.220Z",
"dateUpdated": "2026-02-26T19:09:35.194Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-20146 (GCVE-0-2025-20146)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2025-03-21 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.
This vulnerability is due to the incorrect handling of malformed IPv4 multicast packets that are received on line cards where the interface has either an IPv4 access control list (ACL) or a QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 multicast packets through an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset. Traffic over that line card would be lost while the line card reloads.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.3.1 Version: 24.2.2 Version: 7.11.21 Version: 24.3.2 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20146",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T20:27:17.763797Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T20:27:39.497Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.3.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the incorrect handling of malformed IPv4 multicast packets that are received on line cards where the interface has either an IPv4 access control list (ACL) or a QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 multicast packets through an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset. Traffic over that line card would be lost while the line card reloads."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:56.245Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-multicast-ERMrSvq7",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multicast-ERMrSvq7"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-multicast-ERMrSvq7",
"defects": [
"CSCwm45759"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Routing Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20146",
"datePublished": "2025-03-12T16:12:56.245Z",
"dateReserved": "2024-10-10T19:15:13.215Z",
"dateUpdated": "2025-03-21T20:27:39.497Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20145 (GCVE-0-2025-20145)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2025-03-21 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-264 - Permissions, Privileges, and Access Control
Summary
A vulnerability in the access control list (ACL) processing in the egress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability exists because certain packets are handled incorrectly when they are received on an ingress interface on one line card and destined out of an egress interface on another line card where the egress ACL is configured. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an egress ACL on the affected device.
For more information about this vulnerability, see the section of this advisory.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.2 Version: 6.5.92 Version: 6.5.1 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.6.1 Version: 6.5.93 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 7.0.2 Version: 7.2.1 Version: 7.1.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.4.1 Version: 7.2.2 Version: 7.3.15 Version: 7.3.16 Version: 7.3.2 Version: 7.5.1 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.5.12 Version: 7.7.1 Version: 7.3.3 Version: 7.4.2 Version: 7.3.4 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.10.2 Version: 24.1.1 Version: 7.3.6 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.4.1 Version: 24.2.2 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20145",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T20:32:16.967308Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T20:32:32.526Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.4.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the access control list (ACL) processing in the egress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability exists because certain packets are handled incorrectly when they are received on an ingress interface on one line card and destined out of an egress interface on another line card where the egress ACL is configured. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an egress ACL on the affected device.\r\nFor more information about this vulnerability, see the section of this advisory.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-264",
"description": "Permissions, Privileges, and Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:48.668Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-modular-ACL-u5MEPXMm",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-modular-ACL-u5MEPXMm"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-modular-ACL-u5MEPXMm",
"defects": [
"CSCwk63613"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Access Control List Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20145",
"datePublished": "2025-03-12T16:12:48.668Z",
"dateReserved": "2024-10-10T19:15:13.215Z",
"dateUpdated": "2025-03-21T20:32:32.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20144 (GCVE-0-2025-20144)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2025-03-21 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
A vulnerability in the hybrid access control list (ACL) processing of IPv4 packets in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to incorrect handling of packets when a specific configuration of the hybrid ACL exists. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass a configured ACL on the affected device.
For more information, see the section of this advisory.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.2 Version: 6.5.92 Version: 6.5.1 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.6.1 Version: 6.5.93 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 7.0.2 Version: 7.2.1 Version: 7.1.2 Version: 6.6.4 Version: 7.3.1 Version: 7.4.1 Version: 7.2.2 Version: 7.3.2 Version: 7.5.1 Version: 7.6.1 Version: 7.5.2 Version: 7.7.1 Version: 7.3.3 Version: 7.4.2 Version: 7.3.4 Version: 7.6.2 Version: 7.8.1 Version: 7.5.3 Version: 7.7.2 Version: 7.9.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.10.1 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.10.2 Version: 7.3.6 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20144",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T20:33:04.758400Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T20:33:28.254Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "7.3.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the hybrid access control list (ACL) processing of IPv4 packets in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability is due to incorrect handling of packets when a specific configuration of the hybrid ACL exists. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass a configured ACL on the affected device.\r\nFor more information, see the section of this advisory.\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "Improper Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:39.882Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ncs-hybridacl-crMZFfKQ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs-hybridacl-crMZFfKQ"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-ncs-hybridacl-crMZFfKQ",
"defects": [
"CSCwi49569"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Access Control List Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20144",
"datePublished": "2025-03-12T16:12:39.882Z",
"dateReserved": "2024-10-10T19:15:13.215Z",
"dateUpdated": "2025-03-21T20:33:28.254Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20143 (GCVE-0-2025-20143)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2026-02-26 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Summary
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.
This vulnerability is due to insufficient verification of modules in the software load process. An attacker could exploit this vulnerability by manipulating the loaded binaries to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.
Note: This vulnerability affects Cisco IOS XR Software, not the Secure Boot feature.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.2 Version: 6.5.92 Version: 6.5.1 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.6.1 Version: 6.6.11 Version: 6.5.93 Version: 6.6.12 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.1.25 Version: 6.6.4 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.8.1 Version: 7.4.15 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.6.15 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.4.2 Version: 7.3.4 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.8.1 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.7.21 Version: 7.3.5 Version: 7.5.5 Version: 7.3.6 Version: 7.8.23 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20143",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-13T03:55:22.156936Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:35.340Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.8.23"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.\r\n\r\nThis vulnerability is due to insufficient verification of modules in the software load process. An attacker could exploit this vulnerability by manipulating the loaded binaries to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.\r\nNote: This vulnerability affects Cisco IOS XR Software, not the Secure Boot feature.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:31.135Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-sb-lkm-zNErZjbZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-lkm-zNErZjbZ"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-sb-lkm-zNErZjbZ",
"defects": [
"CSCvx66790"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Secure Boot Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20143",
"datePublished": "2025-03-12T16:12:31.135Z",
"dateReserved": "2024-10-10T19:15:13.215Z",
"dateUpdated": "2026-02-26T19:09:35.340Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-20142 (GCVE-0-2025-20142)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2025-03-21 20:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the IPv4 access control list (ACL) feature and quality of service (QoS) policy feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.
This vulnerability is due to the incorrect handling of malformed IPv4 packets that are received on line cards where the interface has either an IPv4 ACL or QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to cause network processor errors, resulting in a reset or shutdown of the network process. Traffic over that line card would be lost while the line card reloads.
Note: This vulnerability has predominantly been observed in Layer 2 VPN (L2VPN) environments where an IPv4 ACL or QoS policy has been applied to the bridge virtual interface. Layer 3 configurations where the interface has either an IPv4 ACL or QoS policy applied are also affected, though the vulnerability has not been observed.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.1.15 Version: 7.1.2 Version: 6.7.2 Version: 7.1.25 Version: 7.1.3 Version: 6.7.3 Version: 7.3.1 Version: 7.4.1 Version: 6.8.1 Version: 7.3.2 Version: 7.5.1 Version: 7.6.1 Version: 7.5.2 Version: 7.3.3 Version: 6.8.2 Version: 7.7.1 Version: 7.4.2 Version: 7.3.4 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.8.1 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.10.1 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.8.23 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20142",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T20:34:14.309604Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T20:34:33.919Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.8.23"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IPv4 access control list (ACL) feature and quality of service (QoS) policy feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the incorrect handling of malformed IPv4 packets that are received on line cards where the interface has either an IPv4 ACL or QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to cause network processor errors, resulting in a reset or shutdown of the network process. Traffic over that line card would be lost while the line card reloads.\r\nNote: This vulnerability has predominantly been observed in Layer 2 VPN (L2VPN) environments where an IPv4 ACL or QoS policy has been applied to the bridge virtual interface. Layer 3 configurations where the interface has either an IPv4 ACL or QoS policy applied are also affected, though the vulnerability has not been observed."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:23.126Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ipv4uni-LfM3cfBu",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv4uni-LfM3cfBu"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-ipv4uni-LfM3cfBu",
"defects": [
"CSCwf56155"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software for ASR 9000 Series Routers L2VPN Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20142",
"datePublished": "2025-03-12T16:12:23.126Z",
"dateReserved": "2024-10-10T19:15:13.215Z",
"dateUpdated": "2025-03-21T20:34:33.919Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20141 (GCVE-0-2025-20141)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2025-03-21 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms.
This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.9.2 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20141",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T20:35:07.856911Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T20:35:20.642Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.9.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms.\u0026nbsp;\r\n\r\nThis vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:15.494Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-xr792-bWfVDPY",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr792-bWfVDPY"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-xr792-bWfVDPY",
"defects": [
"CSCwf89955"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerabillity"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20141",
"datePublished": "2025-03-12T16:12:15.494Z",
"dateReserved": "2024-10-10T19:15:13.214Z",
"dateUpdated": "2025-03-21T20:35:20.642Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20138 (GCVE-0-2025-20138)
Vulnerability from cvelistv5
Published
2025-03-12 16:12
Modified
2026-02-26 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 7.0.11 Version: 7.0.12 Version: 6.7.2 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.8.12 Version: 7.3.3 Version: 7.7.1 Version: 7.3.4 Version: 7.4.2 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.5.52 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 24.3.2 Version: 24.4.10 Version: 6.5.35 Version: 24.3.20 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20138",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-13T03:55:20.825665Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:35.478Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.5.52"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.10"
},
{
"status": "affected",
"version": "6.5.35"
},
{
"status": "affected",
"version": "24.3.20"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:12:06.736Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-priv-esc-GFQjxvOF",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-priv-esc-GFQjxvOF"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-iosxr-priv-esc-GFQjxvOF",
"defects": [
"CSCwj33398"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software CLI Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20138",
"datePublished": "2025-03-12T16:12:06.736Z",
"dateReserved": "2024-10-10T19:15:13.213Z",
"dateUpdated": "2026-02-26T19:09:35.478Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-20115 (GCVE-0-2025-20115)
Vulnerability from cvelistv5
Published
2025-03-12 16:11
Modified
2025-03-21 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to a memory corruption that occurs when a BGP update is created with an AS_CONFED_SEQUENCE attribute that has 255 autonomous system numbers (AS numbers). An attacker could exploit this vulnerability by sending a crafted BGP update message, or the network could be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more. A successful exploit could allow the attacker to cause memory corruption, which may cause the BGP process to restart, resulting in a DoS condition. To exploit this vulnerability, an attacker must control a BGP confederation speaker within the same autonomous system as the victim, or the network must be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.8.12 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.5.52 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.2.2 Version: 7.8.23 Version: 7.11.21 Version: 24.2.20 Version: 6.5.35 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20115",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-21T20:35:39.499211Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-21T20:35:55.101Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.5.52"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "7.8.23"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "6.5.35"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in confederation implementation for the Border Gateway Protocol (BGP)\u0026nbsp;in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to a memory corruption that occurs when a BGP update is created with an AS_CONFED_SEQUENCE attribute that has 255 autonomous system numbers (AS numbers). An attacker could exploit this vulnerability by sending a crafted BGP update message, or the network could be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more. A successful exploit could allow the attacker to cause memory corruption, which may cause the BGP process to restart, resulting in a DoS condition. To exploit this vulnerability, an attacker must control a BGP confederation speaker within the same autonomous system as the victim, or the network must be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is aware of a public announcement about this issue. This announcement is not specific to Cisco IOS XR Software and can be found at .\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T16:11:58.731Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-bgp-dos-O7stePhX",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bgp-dos-O7stePhX"
},
{
"name": "Crafting endless AS-PATHS in BGP",
"url": "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/"
}
],
"source": {
"advisory": "cisco-sa-iosxr-bgp-dos-O7stePhX",
"defects": [
"CSCwk15887"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20115",
"datePublished": "2025-03-12T16:11:58.731Z",
"dateReserved": "2024-10-10T19:15:13.210Z",
"dateUpdated": "2025-03-21T20:35:55.101Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-20172 (GCVE-0-2025-20172)
Vulnerability from cvelistv5
Published
2025-02-05 16:37
Modified
2025-03-13 12:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | IOS |
Version: 12.2(33)SRE1 Version: 12.2(33)SRE2 Version: 12.2(33)SRE3 Version: 12.2(33)SRE4 Version: 12.2(33)SRE Version: 12.2(33)SRE0a Version: 12.2(33)SRE5 Version: 12.2(33)SRE6 Version: 12.2(33)SRE8 Version: 12.2(33)SRE7 Version: 12.2(33)SRE9 Version: 12.2(33)SRE7a Version: 12.2(33)SRE10 Version: 12.2(33)SRE11 Version: 12.2(33)SRE9a Version: 12.2(33)SRE12 Version: 12.2(33)SRE13 Version: 12.2(33)SRE14 Version: 12.2(33)SRE15 Version: 12.2(33)SRE15a Version: 15.0(1)S2 Version: 15.0(1)S1 Version: 15.0(1)S Version: 15.0(1)S3a Version: 15.0(1)S4 Version: 15.0(1)S5 Version: 15.0(1)S4a Version: 15.0(1)S6 Version: 15.2(1)S Version: 15.2(2)S Version: 15.2(1)S1 Version: 15.2(4)S Version: 15.2(1)S2 Version: 15.2(2)S1 Version: 15.2(2)S2 Version: 15.2(2)S0a Version: 15.2(2)S0c Version: 15.2(4)S1 Version: 15.2(4)S4 Version: 15.2(4)S6 Version: 15.2(4)S2 Version: 15.2(4)S5 Version: 15.2(4)S3 Version: 15.2(4)S3a Version: 15.2(4)S4a Version: 15.2(4)S7 Version: 15.3(1)T Version: 15.3(2)T Version: 15.3(1)T1 Version: 15.3(1)T2 Version: 15.3(1)T3 Version: 15.3(1)T4 Version: 15.3(2)T1 Version: 15.3(2)T2 Version: 15.3(2)T3 Version: 15.3(2)T4 Version: 15.0(2)EY Version: 15.0(2)EY1 Version: 15.0(2)EY2 Version: 15.0(2)EY3 Version: 15.1(2)S Version: 15.1(1)S Version: 15.1(1)S1 Version: 15.1(3)S Version: 15.1(1)S2 Version: 15.1(2)S1 Version: 15.1(2)S2 Version: 15.1(3)S1 Version: 15.1(3)S0a Version: 15.1(3)S2 Version: 15.1(3)S4 Version: 15.1(3)S3 Version: 15.1(3)S5 Version: 15.1(3)S6 Version: 15.1(3)S5a Version: 15.0(2)SE Version: 15.0(2)SE1 Version: 15.0(2)SE2 Version: 15.0(2)SE3 Version: 15.0(2)SE4 Version: 15.0(2)SE5 Version: 15.0(2)SE6 Version: 15.0(2)SE7 Version: 15.0(2)SE8 Version: 15.0(2)SE9 Version: 15.0(2)SE10 Version: 15.0(2)SE11 Version: 15.0(2)SE10a Version: 15.0(2)SE12 Version: 15.0(2)SE13 Version: 15.1(1)SG Version: 15.1(2)SG Version: 15.1(1)SG1 Version: 15.1(1)SG2 Version: 15.1(2)SG1 Version: 15.1(2)SG2 Version: 15.1(2)SG3 Version: 15.1(2)SG4 Version: 15.1(2)SG5 Version: 15.1(2)SG6 Version: 15.1(2)SG7 Version: 15.1(2)SG8 Version: 15.0(1)MR Version: 15.0(2)MR Version: 15.2(4)M Version: 15.2(4)M1 Version: 15.2(4)M2 Version: 15.2(4)M4 Version: 15.2(4)M3 Version: 15.2(4)M5 Version: 15.2(4)M8 Version: 15.2(4)M10 Version: 15.2(4)M7 Version: 15.2(4)M6 Version: 15.2(4)M9 Version: 15.2(4)M6a Version: 15.2(4)M11 Version: 15.0(1)EX Version: 15.0(2)EX Version: 15.0(2)EX1 Version: 15.0(2)EX2 Version: 15.0(2)EX3 Version: 15.0(2)EX4 Version: 15.0(2)EX5 Version: 15.0(2)EX8 Version: 15.0(2a)EX5 Version: 15.0(2)EX10 Version: 15.0(2)EX11 Version: 15.0(2)EX13 Version: 15.0(2)EX12 Version: 15.2(4)GC Version: 15.2(4)GC1 Version: 15.2(4)GC2 Version: 15.2(4)GC3 Version: 15.3(1)S Version: 15.3(2)S Version: 15.3(3)S Version: 15.3(1)S2 Version: 15.3(1)S1 Version: 15.3(2)S2 Version: 15.3(2)S1 Version: 15.3(3)S1 Version: 15.3(3)S2 Version: 15.3(3)S3 Version: 15.3(3)S6 Version: 15.3(3)S4 Version: 15.3(3)S1a Version: 15.3(3)S5 Version: 15.3(3)S7 Version: 15.3(3)S8 Version: 15.3(3)S9 Version: 15.3(3)S10 Version: 15.3(3)S8a Version: 15.4(1)T Version: 15.4(2)T Version: 15.4(1)T2 Version: 15.4(1)T1 Version: 15.4(1)T3 Version: 15.4(2)T1 Version: 15.4(2)T3 Version: 15.4(2)T2 Version: 15.4(1)T4 Version: 15.4(2)T4 Version: 15.0(2)EA Version: 15.0(2)EA1 Version: 15.2(1)E Version: 15.2(2)E Version: 15.2(1)E1 Version: 15.2(3)E Version: 15.2(1)E2 Version: 15.2(1)E3 Version: 15.2(2)E1 Version: 15.2(4)E Version: 15.2(3)E1 Version: 15.2(2)E2 Version: 15.2(2a)E1 Version: 15.2(2)E3 Version: 15.2(2a)E2 Version: 15.2(3)E2 Version: 15.2(3a)E Version: 15.2(3)E3 Version: 15.2(4)E1 Version: 15.2(2)E4 Version: 15.2(2)E5 Version: 15.2(4)E2 Version: 15.2(3)E4 Version: 15.2(5)E Version: 15.2(4)E3 Version: 15.2(2)E6 Version: 15.2(5a)E Version: 15.2(5)E1 Version: 15.2(5b)E Version: 15.2(2)E5a Version: 15.2(5c)E Version: 15.2(2)E5b Version: 15.2(5a)E1 Version: 15.2(4)E4 Version: 15.2(2)E7 Version: 15.2(5)E2 Version: 15.2(6)E Version: 15.2(4)E5 Version: 15.2(5)E2c Version: 15.2(2)E8 Version: 15.2(6)E0a Version: 15.2(6)E1 Version: 15.2(6)E0c Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(2)E9 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(2)E10 Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(6)E2b Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(7)E2a Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(7)E3k Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(7)E11 Version: 15.2(8)E7 Version: 15.1(3)MRA Version: 15.1(3)MRA1 Version: 15.1(3)MRA2 Version: 15.1(3)MRA3 Version: 15.1(3)MRA4 Version: 15.1(3)SVB1 Version: 15.1(3)SVB2 Version: 15.2(4)JB Version: 15.2(4)JB1 Version: 15.2(4)JB2 Version: 15.2(4)JB3 Version: 15.2(4)JB3a Version: 15.2(4)JB4 Version: 15.2(4)JB3h Version: 15.2(4)JB3b Version: 15.2(4)JB3s Version: 15.2(4)JB5h Version: 15.2(4)JB5 Version: 15.2(4)JB5m Version: 15.2(4)JB6 Version: 15.4(1)S Version: 15.4(2)S Version: 15.4(3)S Version: 15.4(1)S1 Version: 15.4(1)S2 Version: 15.4(2)S1 Version: 15.4(1)S3 Version: 15.4(3)S1 Version: 15.4(2)S2 Version: 15.4(3)S2 Version: 15.4(3)S3 Version: 15.4(1)S4 Version: 15.4(2)S3 Version: 15.4(2)S4 Version: 15.4(3)S4 Version: 15.4(3)S5 Version: 15.4(3)S6 Version: 15.4(3)S7 Version: 15.4(3)S6a Version: 15.4(3)S8 Version: 15.4(3)S9 Version: 15.4(3)S10 Version: 15.3(3)M Version: 15.3(3)M1 Version: 15.3(3)M2 Version: 15.3(3)M3 Version: 15.3(3)M5 Version: 15.3(3)M4 Version: 15.3(3)M6 Version: 15.3(3)M7 Version: 15.3(3)M8 Version: 15.3(3)M9 Version: 15.3(3)M10 Version: 15.3(3)M8a Version: 15.2(4)JN Version: 15.0(2)EZ Version: 15.1(3)SVD Version: 15.1(3)SVD1 Version: 15.1(3)SVD2 Version: 15.2(1)EY Version: 15.0(2)EJ Version: 15.0(2)EJ1 Version: 15.2(5)EX Version: 15.1(3)SVF Version: 15.1(3)SVF1 Version: 15.1(3)SVE Version: 15.0(2)EK Version: 15.0(2)EK1 Version: 15.4(1)CG Version: 15.4(1)CG1 Version: 15.4(2)CG Version: 15.5(1)S Version: 15.5(2)S Version: 15.5(1)S1 Version: 15.5(3)S Version: 15.5(1)S2 Version: 15.5(1)S3 Version: 15.5(2)S1 Version: 15.5(2)S2 Version: 15.5(3)S1 Version: 15.5(3)S1a Version: 15.5(2)S3 Version: 15.5(3)S2 Version: 15.5(3)S0a Version: 15.5(3)S3 Version: 15.5(1)S4 Version: 15.5(2)S4 Version: 15.5(3)S4 Version: 15.5(3)S5 Version: 15.5(3)S6 Version: 15.5(3)S6a Version: 15.5(3)S7 Version: 15.5(3)S6b Version: 15.5(3)S8 Version: 15.5(3)S9 Version: 15.5(3)S10 Version: 15.5(3)S9a Version: 15.1(3)SVG Version: 15.2(2)EB Version: 15.2(2)EB1 Version: 15.2(2)EB2 Version: 15.2(6)EB Version: 15.5(1)T Version: 15.5(1)T1 Version: 15.5(2)T Version: 15.5(1)T2 Version: 15.5(1)T3 Version: 15.5(2)T1 Version: 15.5(2)T2 Version: 15.5(2)T3 Version: 15.5(2)T4 Version: 15.5(1)T4 Version: 15.2(2)EA Version: 15.2(2)EA1 Version: 15.2(2)EA2 Version: 15.2(3)EA Version: 15.2(4)EA Version: 15.2(4)EA1 Version: 15.2(2)EA3 Version: 15.2(4)EA3 Version: 15.2(5)EA Version: 15.2(4)EA4 Version: 15.2(4)EA5 Version: 15.2(4)EA6 Version: 15.2(4)EA7 Version: 15.2(4)EA8 Version: 15.2(4)EA9 Version: 15.2(4)EA9a Version: 15.3(3)JN3 Version: 15.3(3)JN4 Version: 15.3(3)JN7 Version: 15.3(3)JN8 Version: 15.3(3)JN9 Version: 15.5(3)M Version: 15.5(3)M1 Version: 15.5(3)M0a Version: 15.5(3)M2 Version: 15.5(3)M3 Version: 15.5(3)M4 Version: 15.5(3)M4a Version: 15.5(3)M5 Version: 15.5(3)M6 Version: 15.5(3)M7 Version: 15.5(3)M6a Version: 15.5(3)M8 Version: 15.5(3)M9 Version: 15.5(3)M10 Version: 15.3(3)JA Version: 15.3(3)JA1m Version: 15.3(3)JA1 Version: 15.3(3)JA4 Version: 15.3(3)JA5 Version: 15.3(3)JA6 Version: 15.3(3)JA7 Version: 15.3(3)JA8 Version: 15.3(3)JA10 Version: 15.3(3)JA11 Version: 15.3(3)JA12 Version: 15.3(3)JAA Version: 15.3(3)JAA11 Version: 15.3(3)JAA12 Version: 15.3(3)JAB Version: 15.3(3)JB Version: 15.5(3)SN Version: 15.6(1)S Version: 15.6(2)S Version: 15.6(2)S1 Version: 15.6(1)S1 Version: 15.6(1)S2 Version: 15.6(2)S2 Version: 15.6(1)S3 Version: 15.6(2)S3 Version: 15.6(1)S4 Version: 15.6(2)S4 Version: 15.6(1)T Version: 15.6(2)T Version: 15.6(1)T0a Version: 15.6(1)T1 Version: 15.6(2)T1 Version: 15.6(1)T2 Version: 15.6(2)T2 Version: 15.6(1)T3 Version: 15.6(2)T3 Version: 15.3(3)JNB Version: 15.3(3)JNB1 Version: 15.3(3)JNB2 Version: 15.3(3)JNB3 Version: 15.3(3)JNB4 Version: 15.3(3)JNB6 Version: 15.3(3)JNB5 Version: 15.3(3)JAX Version: 15.3(3)JAX1 Version: 15.3(3)JAX2 Version: 15.3(3)JBB Version: 15.3(3)JBB1 Version: 15.3(3)JBB2 Version: 15.3(3)JBB4 Version: 15.3(3)JBB5 Version: 15.3(3)JBB6 Version: 15.3(3)JBB8 Version: 15.3(3)JBB6a Version: 15.3(3)JC Version: 15.3(3)JC1 Version: 15.3(3)JC2 Version: 15.3(3)JC3 Version: 15.3(3)JC4 Version: 15.3(3)JC5 Version: 15.3(3)JC6 Version: 15.3(3)JC8 Version: 15.3(3)JC9 Version: 15.3(3)JC14 Version: 15.3(3)JNC Version: 15.3(3)JNC1 Version: 15.3(3)JNC2 Version: 15.3(3)JNC3 Version: 15.3(3)JNC4 Version: 15.3(3)JNP Version: 15.3(3)JNP1 Version: 15.3(3)JNP3 Version: 15.6(2)SP Version: 15.6(2)SP1 Version: 15.6(2)SP2 Version: 15.6(2)SP3 Version: 15.6(2)SP4 Version: 15.6(2)SP5 Version: 15.6(2)SP6 Version: 15.6(2)SP7 Version: 15.6(2)SP8 Version: 15.6(2)SP9 Version: 15.6(2)SN Version: 15.3(3)JPB Version: 15.3(3)JPB1 Version: 15.3(3)JD Version: 15.3(3)JD2 Version: 15.3(3)JD3 Version: 15.3(3)JD4 Version: 15.3(3)JD5 Version: 15.3(3)JD6 Version: 15.3(3)JD7 Version: 15.3(3)JD8 Version: 15.3(3)JD9 Version: 15.3(3)JD11 Version: 15.3(3)JD13 Version: 15.3(3)JD14 Version: 15.3(3)JD16 Version: 15.3(3)JD17 Version: 15.6(3)M Version: 15.6(3)M1 Version: 15.6(3)M0a Version: 15.6(3)M1b Version: 15.6(3)M2 Version: 15.6(3)M2a Version: 15.6(3)M3 Version: 15.6(3)M3a Version: 15.6(3)M4 Version: 15.6(3)M5 Version: 15.6(3)M6 Version: 15.6(3)M7 Version: 15.6(3)M6a Version: 15.6(3)M6b Version: 15.6(3)M8 Version: 15.6(3)M9 Version: 15.1(3)SVJ2 Version: 15.2(4)EC1 Version: 15.2(4)EC2 Version: 15.3(3)JPC Version: 15.3(3)JPC1 Version: 15.3(3)JPC2 Version: 15.3(3)JPC3 Version: 15.3(3)JPC100 Version: 15.3(3)JPC5 Version: 15.3(3)JND Version: 15.3(3)JND1 Version: 15.3(3)JND2 Version: 15.3(3)JND3 Version: 15.3(3)JE Version: 15.3(3)JPD Version: 15.3(3)JDA7 Version: 15.3(3)JDA8 Version: 15.3(3)JDA9 Version: 15.3(3)JDA11 Version: 15.3(3)JDA13 Version: 15.3(3)JDA14 Version: 15.3(3)JDA16 Version: 15.3(3)JDA17 Version: 15.3(3)JF Version: 15.3(3)JF1 Version: 15.3(3)JF2 Version: 15.3(3)JF4 Version: 15.3(3)JF5 Version: 15.3(3)JF6 Version: 15.3(3)JF7 Version: 15.3(3)JF8 Version: 15.3(3)JF9 Version: 15.3(3)JF10 Version: 15.3(3)JF11 Version: 15.3(3)JF12 Version: 15.3(3)JF12i Version: 15.3(3)JF14 Version: 15.3(3)JF14i Version: 15.3(3)JF15 Version: 15.3(3)JCA7 Version: 15.3(3)JCA8 Version: 15.3(3)JCA9 Version: 15.7(3)M Version: 15.7(3)M1 Version: 15.7(3)M0a Version: 15.7(3)M3 Version: 15.7(3)M2 Version: 15.7(3)M4 Version: 15.7(3)M5 Version: 15.7(3)M4a Version: 15.7(3)M4b Version: 15.7(3)M6 Version: 15.7(3)M7 Version: 15.7(3)M8 Version: 15.7(3)M9 Version: 15.3(3)JG Version: 15.3(3)JG1 Version: 15.3(3)JH Version: 15.3(3)JH1 Version: 15.3(3)JI1 Version: 15.3(3)JI3 Version: 15.3(3)JI4 Version: 15.3(3)JI5 Version: 15.3(3)JI6 Version: 15.8(3)M Version: 15.8(3)M1 Version: 15.8(3)M0a Version: 15.8(3)M0b Version: 15.8(3)M2 Version: 15.8(3)M1a Version: 15.8(3)M3 Version: 15.8(3)M2a Version: 15.8(3)M4 Version: 15.8(3)M3a Version: 15.8(3)M3b Version: 15.8(3)M5 Version: 15.8(3)M6 Version: 15.8(3)M7 Version: 15.8(3)M8 Version: 15.8(3)M9 Version: 15.9(3)M Version: 15.9(3)M1 Version: 15.9(3)M0a Version: 15.9(3)M2 Version: 15.9(3)M3 Version: 15.9(3)M2a Version: 15.9(3)M3a Version: 15.9(3)M4 Version: 15.9(3)M3b Version: 15.9(3)M5 Version: 15.9(3)M4a Version: 15.9(3)M6 Version: 15.9(3)M7 Version: 15.9(3)M6a Version: 15.9(3)M6b Version: 15.9(3)M8 Version: 15.9(3)M7a Version: 15.9(3)M9 Version: 15.9(3)M8b Version: 15.9(3)M10 Version: 15.3(3)JK Version: 15.3(3)JK1 Version: 15.3(3)JK2 Version: 15.3(3)JK3 Version: 15.3(3)JK2a Version: 15.3(3)JK1t Version: 15.3(3)JK4 Version: 15.3(3)JK5 Version: 15.3(3)JK6 Version: 15.3(3)JK7 Version: 15.3(3)JK8 Version: 15.3(3)JK8a Version: 15.3(3)JK8b Version: 15.3(3)JK9 Version: 15.3(3)JK10 Version: 15.3(3)JK11 Version: 15.3(3)JJ Version: 15.3(3)JJ1 Version: 15.3(3)JPI1 Version: 15.3(3)JPI4 Version: 15.3(3)JPI1t Version: 15.3(3)JPI5 Version: 15.3(3)JPI7 Version: 15.3(3)JPI6a Version: 15.3(3)JPI8a Version: 15.3(3)JPI9 Version: 15.3(3)JPI10 Version: 15.3(3)JPJ2 Version: 15.3(3)JPJ3 Version: 15.3(3)JPJ2t Version: 15.3(3)JPJ3a Version: 15.3(3)JPJ4 Version: 15.3(3)JPJ5 Version: 15.3(3)JPJ6 Version: 15.3(3)JPJ7 Version: 15.3(3)JPJ7c Version: 15.3(3)JPJ8a Version: 15.3(3)JPJ9 Version: 15.3(3)JPJ10 Version: 15.3(3)JPJ11 Version: 15.3(3)JPK Version: 15.3(3)JPK1 Version: 15.3(3)JPK2 Version: 15.3(3)JPK3 Version: 15.3(3)JPK4 Version: 15.3(3)JPK5 Version: 15.3(3)JPK6 Version: 15.3(3)JPK7 Version: 15.3(3)JPK8 Version: 15.3(3)JPK9 Version: 15.3(3)JPL Version: 15.3(3)JPM Version: 15.3(3)JPN Version: 15.3(3)JPN1 Version: 15.3(3)JPN2 Version: 15.3(3)JPN3 Version: 15.3(3)JPN4 Version: 15.3(3)JPN5 Version: 15.3(3)JPO Version: 15.3(3)JPP Version: 15.3(3)JPQ Version: 15.3(3)JPQ1 Version: 15.3(3)JPQ2 Version: 15.3(3)JPQ3 Version: 15.3(3)JPQ4 Version: 15.3(3)JPR Version: 15.3(3)JPS Version: 15.3(3)JPT Version: 15.3(3)JPT1 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20172",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-05T17:02:19.789311Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-248",
"description": "CWE-248 Uncaught Exception",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T12:58:43.080Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "12.2(33)SRE1"
},
{
"status": "affected",
"version": "12.2(33)SRE2"
},
{
"status": "affected",
"version": "12.2(33)SRE3"
},
{
"status": "affected",
"version": "12.2(33)SRE4"
},
{
"status": "affected",
"version": "12.2(33)SRE"
},
{
"status": "affected",
"version": "12.2(33)SRE0a"
},
{
"status": "affected",
"version": "12.2(33)SRE5"
},
{
"status": "affected",
"version": "12.2(33)SRE6"
},
{
"status": "affected",
"version": "12.2(33)SRE8"
},
{
"status": "affected",
"version": "12.2(33)SRE7"
},
{
"status": "affected",
"version": "12.2(33)SRE9"
},
{
"status": "affected",
"version": "12.2(33)SRE7a"
},
{
"status": "affected",
"version": "12.2(33)SRE10"
},
{
"status": "affected",
"version": "12.2(33)SRE11"
},
{
"status": "affected",
"version": "12.2(33)SRE9a"
},
{
"status": "affected",
"version": "12.2(33)SRE12"
},
{
"status": "affected",
"version": "12.2(33)SRE13"
},
{
"status": "affected",
"version": "12.2(33)SRE14"
},
{
"status": "affected",
"version": "12.2(33)SRE15"
},
{
"status": "affected",
"version": "12.2(33)SRE15a"
},
{
"status": "affected",
"version": "15.0(1)S2"
},
{
"status": "affected",
"version": "15.0(1)S1"
},
{
"status": "affected",
"version": "15.0(1)S"
},
{
"status": "affected",
"version": "15.0(1)S3a"
},
{
"status": "affected",
"version": "15.0(1)S4"
},
{
"status": "affected",
"version": "15.0(1)S5"
},
{
"status": "affected",
"version": "15.0(1)S4a"
},
{
"status": "affected",
"version": "15.0(1)S6"
},
{
"status": "affected",
"version": "15.2(1)S"
},
{
"status": "affected",
"version": "15.2(2)S"
},
{
"status": "affected",
"version": "15.2(1)S1"
},
{
"status": "affected",
"version": "15.2(4)S"
},
{
"status": "affected",
"version": "15.2(1)S2"
},
{
"status": "affected",
"version": "15.2(2)S1"
},
{
"status": "affected",
"version": "15.2(2)S2"
},
{
"status": "affected",
"version": "15.2(2)S0a"
},
{
"status": "affected",
"version": "15.2(2)S0c"
},
{
"status": "affected",
"version": "15.2(4)S1"
},
{
"status": "affected",
"version": "15.2(4)S4"
},
{
"status": "affected",
"version": "15.2(4)S6"
},
{
"status": "affected",
"version": "15.2(4)S2"
},
{
"status": "affected",
"version": "15.2(4)S5"
},
{
"status": "affected",
"version": "15.2(4)S3"
},
{
"status": "affected",
"version": "15.2(4)S3a"
},
{
"status": "affected",
"version": "15.2(4)S4a"
},
{
"status": "affected",
"version": "15.2(4)S7"
},
{
"status": "affected",
"version": "15.3(1)T"
},
{
"status": "affected",
"version": "15.3(2)T"
},
{
"status": "affected",
"version": "15.3(1)T1"
},
{
"status": "affected",
"version": "15.3(1)T2"
},
{
"status": "affected",
"version": "15.3(1)T3"
},
{
"status": "affected",
"version": "15.3(1)T4"
},
{
"status": "affected",
"version": "15.3(2)T1"
},
{
"status": "affected",
"version": "15.3(2)T2"
},
{
"status": "affected",
"version": "15.3(2)T3"
},
{
"status": "affected",
"version": "15.3(2)T4"
},
{
"status": "affected",
"version": "15.0(2)EY"
},
{
"status": "affected",
"version": "15.0(2)EY1"
},
{
"status": "affected",
"version": "15.0(2)EY2"
},
{
"status": "affected",
"version": "15.0(2)EY3"
},
{
"status": "affected",
"version": "15.1(2)S"
},
{
"status": "affected",
"version": "15.1(1)S"
},
{
"status": "affected",
"version": "15.1(1)S1"
},
{
"status": "affected",
"version": "15.1(3)S"
},
{
"status": "affected",
"version": "15.1(1)S2"
},
{
"status": "affected",
"version": "15.1(2)S1"
},
{
"status": "affected",
"version": "15.1(2)S2"
},
{
"status": "affected",
"version": "15.1(3)S1"
},
{
"status": "affected",
"version": "15.1(3)S0a"
},
{
"status": "affected",
"version": "15.1(3)S2"
},
{
"status": "affected",
"version": "15.1(3)S4"
},
{
"status": "affected",
"version": "15.1(3)S3"
},
{
"status": "affected",
"version": "15.1(3)S5"
},
{
"status": "affected",
"version": "15.1(3)S6"
},
{
"status": "affected",
"version": "15.1(3)S5a"
},
{
"status": "affected",
"version": "15.0(2)SE"
},
{
"status": "affected",
"version": "15.0(2)SE1"
},
{
"status": "affected",
"version": "15.0(2)SE2"
},
{
"status": "affected",
"version": "15.0(2)SE3"
},
{
"status": "affected",
"version": "15.0(2)SE4"
},
{
"status": "affected",
"version": "15.0(2)SE5"
},
{
"status": "affected",
"version": "15.0(2)SE6"
},
{
"status": "affected",
"version": "15.0(2)SE7"
},
{
"status": "affected",
"version": "15.0(2)SE8"
},
{
"status": "affected",
"version": "15.0(2)SE9"
},
{
"status": "affected",
"version": "15.0(2)SE10"
},
{
"status": "affected",
"version": "15.0(2)SE11"
},
{
"status": "affected",
"version": "15.0(2)SE10a"
},
{
"status": "affected",
"version": "15.0(2)SE12"
},
{
"status": "affected",
"version": "15.0(2)SE13"
},
{
"status": "affected",
"version": "15.1(1)SG"
},
{
"status": "affected",
"version": "15.1(2)SG"
},
{
"status": "affected",
"version": "15.1(1)SG1"
},
{
"status": "affected",
"version": "15.1(1)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG1"
},
{
"status": "affected",
"version": "15.1(2)SG2"
},
{
"status": "affected",
"version": "15.1(2)SG3"
},
{
"status": "affected",
"version": "15.1(2)SG4"
},
{
"status": "affected",
"version": "15.1(2)SG5"
},
{
"status": "affected",
"version": "15.1(2)SG6"
},
{
"status": "affected",
"version": "15.1(2)SG7"
},
{
"status": "affected",
"version": "15.1(2)SG8"
},
{
"status": "affected",
"version": "15.0(1)MR"
},
{
"status": "affected",
"version": "15.0(2)MR"
},
{
"status": "affected",
"version": "15.2(4)M"
},
{
"status": "affected",
"version": "15.2(4)M1"
},
{
"status": "affected",
"version": "15.2(4)M2"
},
{
"status": "affected",
"version": "15.2(4)M4"
},
{
"status": "affected",
"version": "15.2(4)M3"
},
{
"status": "affected",
"version": "15.2(4)M5"
},
{
"status": "affected",
"version": "15.2(4)M8"
},
{
"status": "affected",
"version": "15.2(4)M10"
},
{
"status": "affected",
"version": "15.2(4)M7"
},
{
"status": "affected",
"version": "15.2(4)M6"
},
{
"status": "affected",
"version": "15.2(4)M9"
},
{
"status": "affected",
"version": "15.2(4)M6a"
},
{
"status": "affected",
"version": "15.2(4)M11"
},
{
"status": "affected",
"version": "15.0(1)EX"
},
{
"status": "affected",
"version": "15.0(2)EX"
},
{
"status": "affected",
"version": "15.0(2)EX1"
},
{
"status": "affected",
"version": "15.0(2)EX2"
},
{
"status": "affected",
"version": "15.0(2)EX3"
},
{
"status": "affected",
"version": "15.0(2)EX4"
},
{
"status": "affected",
"version": "15.0(2)EX5"
},
{
"status": "affected",
"version": "15.0(2)EX8"
},
{
"status": "affected",
"version": "15.0(2a)EX5"
},
{
"status": "affected",
"version": "15.0(2)EX10"
},
{
"status": "affected",
"version": "15.0(2)EX11"
},
{
"status": "affected",
"version": "15.0(2)EX13"
},
{
"status": "affected",
"version": "15.0(2)EX12"
},
{
"status": "affected",
"version": "15.2(4)GC"
},
{
"status": "affected",
"version": "15.2(4)GC1"
},
{
"status": "affected",
"version": "15.2(4)GC2"
},
{
"status": "affected",
"version": "15.2(4)GC3"
},
{
"status": "affected",
"version": "15.3(1)S"
},
{
"status": "affected",
"version": "15.3(2)S"
},
{
"status": "affected",
"version": "15.3(3)S"
},
{
"status": "affected",
"version": "15.3(1)S2"
},
{
"status": "affected",
"version": "15.3(1)S1"
},
{
"status": "affected",
"version": "15.3(2)S2"
},
{
"status": "affected",
"version": "15.3(2)S1"
},
{
"status": "affected",
"version": "15.3(3)S1"
},
{
"status": "affected",
"version": "15.3(3)S2"
},
{
"status": "affected",
"version": "15.3(3)S3"
},
{
"status": "affected",
"version": "15.3(3)S6"
},
{
"status": "affected",
"version": "15.3(3)S4"
},
{
"status": "affected",
"version": "15.3(3)S1a"
},
{
"status": "affected",
"version": "15.3(3)S5"
},
{
"status": "affected",
"version": "15.3(3)S7"
},
{
"status": "affected",
"version": "15.3(3)S8"
},
{
"status": "affected",
"version": "15.3(3)S9"
},
{
"status": "affected",
"version": "15.3(3)S10"
},
{
"status": "affected",
"version": "15.3(3)S8a"
},
{
"status": "affected",
"version": "15.4(1)T"
},
{
"status": "affected",
"version": "15.4(2)T"
},
{
"status": "affected",
"version": "15.4(1)T2"
},
{
"status": "affected",
"version": "15.4(1)T1"
},
{
"status": "affected",
"version": "15.4(1)T3"
},
{
"status": "affected",
"version": "15.4(2)T1"
},
{
"status": "affected",
"version": "15.4(2)T3"
},
{
"status": "affected",
"version": "15.4(2)T2"
},
{
"status": "affected",
"version": "15.4(1)T4"
},
{
"status": "affected",
"version": "15.4(2)T4"
},
{
"status": "affected",
"version": "15.0(2)EA"
},
{
"status": "affected",
"version": "15.0(2)EA1"
},
{
"status": "affected",
"version": "15.2(1)E"
},
{
"status": "affected",
"version": "15.2(2)E"
},
{
"status": "affected",
"version": "15.2(1)E1"
},
{
"status": "affected",
"version": "15.2(3)E"
},
{
"status": "affected",
"version": "15.2(1)E2"
},
{
"status": "affected",
"version": "15.2(1)E3"
},
{
"status": "affected",
"version": "15.2(2)E1"
},
{
"status": "affected",
"version": "15.2(4)E"
},
{
"status": "affected",
"version": "15.2(3)E1"
},
{
"status": "affected",
"version": "15.2(2)E2"
},
{
"status": "affected",
"version": "15.2(2a)E1"
},
{
"status": "affected",
"version": "15.2(2)E3"
},
{
"status": "affected",
"version": "15.2(2a)E2"
},
{
"status": "affected",
"version": "15.2(3)E2"
},
{
"status": "affected",
"version": "15.2(3a)E"
},
{
"status": "affected",
"version": "15.2(3)E3"
},
{
"status": "affected",
"version": "15.2(4)E1"
},
{
"status": "affected",
"version": "15.2(2)E4"
},
{
"status": "affected",
"version": "15.2(2)E5"
},
{
"status": "affected",
"version": "15.2(4)E2"
},
{
"status": "affected",
"version": "15.2(3)E4"
},
{
"status": "affected",
"version": "15.2(5)E"
},
{
"status": "affected",
"version": "15.2(4)E3"
},
{
"status": "affected",
"version": "15.2(2)E6"
},
{
"status": "affected",
"version": "15.2(5a)E"
},
{
"status": "affected",
"version": "15.2(5)E1"
},
{
"status": "affected",
"version": "15.2(5b)E"
},
{
"status": "affected",
"version": "15.2(2)E5a"
},
{
"status": "affected",
"version": "15.2(5c)E"
},
{
"status": "affected",
"version": "15.2(2)E5b"
},
{
"status": "affected",
"version": "15.2(5a)E1"
},
{
"status": "affected",
"version": "15.2(4)E4"
},
{
"status": "affected",
"version": "15.2(2)E7"
},
{
"status": "affected",
"version": "15.2(5)E2"
},
{
"status": "affected",
"version": "15.2(6)E"
},
{
"status": "affected",
"version": "15.2(4)E5"
},
{
"status": "affected",
"version": "15.2(5)E2c"
},
{
"status": "affected",
"version": "15.2(2)E8"
},
{
"status": "affected",
"version": "15.2(6)E0a"
},
{
"status": "affected",
"version": "15.2(6)E1"
},
{
"status": "affected",
"version": "15.2(6)E0c"
},
{
"status": "affected",
"version": "15.2(4)E6"
},
{
"status": "affected",
"version": "15.2(6)E2"
},
{
"status": "affected",
"version": "15.2(2)E9"
},
{
"status": "affected",
"version": "15.2(4)E7"
},
{
"status": "affected",
"version": "15.2(7)E"
},
{
"status": "affected",
"version": "15.2(2)E10"
},
{
"status": "affected",
"version": "15.2(4)E8"
},
{
"status": "affected",
"version": "15.2(6)E2a"
},
{
"status": "affected",
"version": "15.2(6)E2b"
},
{
"status": "affected",
"version": "15.2(7)E1"
},
{
"status": "affected",
"version": "15.2(7)E0a"
},
{
"status": "affected",
"version": "15.2(7)E0b"
},
{
"status": "affected",
"version": "15.2(7)E0s"
},
{
"status": "affected",
"version": "15.2(6)E3"
},
{
"status": "affected",
"version": "15.2(4)E9"
},
{
"status": "affected",
"version": "15.2(7)E2"
},
{
"status": "affected",
"version": "15.2(7a)E0b"
},
{
"status": "affected",
"version": "15.2(4)E10"
},
{
"status": "affected",
"version": "15.2(7)E3"
},
{
"status": "affected",
"version": "15.2(7)E1a"
},
{
"status": "affected",
"version": "15.2(7b)E0b"
},
{
"status": "affected",
"version": "15.2(7)E2a"
},
{
"status": "affected",
"version": "15.2(4)E10a"
},
{
"status": "affected",
"version": "15.2(7)E4"
},
{
"status": "affected",
"version": "15.2(7)E3k"
},
{
"status": "affected",
"version": "15.2(8)E"
},
{
"status": "affected",
"version": "15.2(8)E1"
},
{
"status": "affected",
"version": "15.2(7)E5"
},
{
"status": "affected",
"version": "15.2(7)E6"
},
{
"status": "affected",
"version": "15.2(8)E2"
},
{
"status": "affected",
"version": "15.2(4)E10d"
},
{
"status": "affected",
"version": "15.2(7)E7"
},
{
"status": "affected",
"version": "15.2(8)E3"
},
{
"status": "affected",
"version": "15.2(7)E8"
},
{
"status": "affected",
"version": "15.2(8)E4"
},
{
"status": "affected",
"version": "15.2(7)E9"
},
{
"status": "affected",
"version": "15.2(8)E5"
},
{
"status": "affected",
"version": "15.2(8)E6"
},
{
"status": "affected",
"version": "15.2(7)E10"
},
{
"status": "affected",
"version": "15.2(7)E11"
},
{
"status": "affected",
"version": "15.2(8)E7"
},
{
"status": "affected",
"version": "15.1(3)MRA"
},
{
"status": "affected",
"version": "15.1(3)MRA1"
},
{
"status": "affected",
"version": "15.1(3)MRA2"
},
{
"status": "affected",
"version": "15.1(3)MRA3"
},
{
"status": "affected",
"version": "15.1(3)MRA4"
},
{
"status": "affected",
"version": "15.1(3)SVB1"
},
{
"status": "affected",
"version": "15.1(3)SVB2"
},
{
"status": "affected",
"version": "15.2(4)JB"
},
{
"status": "affected",
"version": "15.2(4)JB1"
},
{
"status": "affected",
"version": "15.2(4)JB2"
},
{
"status": "affected",
"version": "15.2(4)JB3"
},
{
"status": "affected",
"version": "15.2(4)JB3a"
},
{
"status": "affected",
"version": "15.2(4)JB4"
},
{
"status": "affected",
"version": "15.2(4)JB3h"
},
{
"status": "affected",
"version": "15.2(4)JB3b"
},
{
"status": "affected",
"version": "15.2(4)JB3s"
},
{
"status": "affected",
"version": "15.2(4)JB5h"
},
{
"status": "affected",
"version": "15.2(4)JB5"
},
{
"status": "affected",
"version": "15.2(4)JB5m"
},
{
"status": "affected",
"version": "15.2(4)JB6"
},
{
"status": "affected",
"version": "15.4(1)S"
},
{
"status": "affected",
"version": "15.4(2)S"
},
{
"status": "affected",
"version": "15.4(3)S"
},
{
"status": "affected",
"version": "15.4(1)S1"
},
{
"status": "affected",
"version": "15.4(1)S2"
},
{
"status": "affected",
"version": "15.4(2)S1"
},
{
"status": "affected",
"version": "15.4(1)S3"
},
{
"status": "affected",
"version": "15.4(3)S1"
},
{
"status": "affected",
"version": "15.4(2)S2"
},
{
"status": "affected",
"version": "15.4(3)S2"
},
{
"status": "affected",
"version": "15.4(3)S3"
},
{
"status": "affected",
"version": "15.4(1)S4"
},
{
"status": "affected",
"version": "15.4(2)S3"
},
{
"status": "affected",
"version": "15.4(2)S4"
},
{
"status": "affected",
"version": "15.4(3)S4"
},
{
"status": "affected",
"version": "15.4(3)S5"
},
{
"status": "affected",
"version": "15.4(3)S6"
},
{
"status": "affected",
"version": "15.4(3)S7"
},
{
"status": "affected",
"version": "15.4(3)S6a"
},
{
"status": "affected",
"version": "15.4(3)S8"
},
{
"status": "affected",
"version": "15.4(3)S9"
},
{
"status": "affected",
"version": "15.4(3)S10"
},
{
"status": "affected",
"version": "15.3(3)M"
},
{
"status": "affected",
"version": "15.3(3)M1"
},
{
"status": "affected",
"version": "15.3(3)M2"
},
{
"status": "affected",
"version": "15.3(3)M3"
},
{
"status": "affected",
"version": "15.3(3)M5"
},
{
"status": "affected",
"version": "15.3(3)M4"
},
{
"status": "affected",
"version": "15.3(3)M6"
},
{
"status": "affected",
"version": "15.3(3)M7"
},
{
"status": "affected",
"version": "15.3(3)M8"
},
{
"status": "affected",
"version": "15.3(3)M9"
},
{
"status": "affected",
"version": "15.3(3)M10"
},
{
"status": "affected",
"version": "15.3(3)M8a"
},
{
"status": "affected",
"version": "15.2(4)JN"
},
{
"status": "affected",
"version": "15.0(2)EZ"
},
{
"status": "affected",
"version": "15.1(3)SVD"
},
{
"status": "affected",
"version": "15.1(3)SVD1"
},
{
"status": "affected",
"version": "15.1(3)SVD2"
},
{
"status": "affected",
"version": "15.2(1)EY"
},
{
"status": "affected",
"version": "15.0(2)EJ"
},
{
"status": "affected",
"version": "15.0(2)EJ1"
},
{
"status": "affected",
"version": "15.2(5)EX"
},
{
"status": "affected",
"version": "15.1(3)SVF"
},
{
"status": "affected",
"version": "15.1(3)SVF1"
},
{
"status": "affected",
"version": "15.1(3)SVE"
},
{
"status": "affected",
"version": "15.0(2)EK"
},
{
"status": "affected",
"version": "15.0(2)EK1"
},
{
"status": "affected",
"version": "15.4(1)CG"
},
{
"status": "affected",
"version": "15.4(1)CG1"
},
{
"status": "affected",
"version": "15.4(2)CG"
},
{
"status": "affected",
"version": "15.5(1)S"
},
{
"status": "affected",
"version": "15.5(2)S"
},
{
"status": "affected",
"version": "15.5(1)S1"
},
{
"status": "affected",
"version": "15.5(3)S"
},
{
"status": "affected",
"version": "15.5(1)S2"
},
{
"status": "affected",
"version": "15.5(1)S3"
},
{
"status": "affected",
"version": "15.5(2)S1"
},
{
"status": "affected",
"version": "15.5(2)S2"
},
{
"status": "affected",
"version": "15.5(3)S1"
},
{
"status": "affected",
"version": "15.5(3)S1a"
},
{
"status": "affected",
"version": "15.5(2)S3"
},
{
"status": "affected",
"version": "15.5(3)S2"
},
{
"status": "affected",
"version": "15.5(3)S0a"
},
{
"status": "affected",
"version": "15.5(3)S3"
},
{
"status": "affected",
"version": "15.5(1)S4"
},
{
"status": "affected",
"version": "15.5(2)S4"
},
{
"status": "affected",
"version": "15.5(3)S4"
},
{
"status": "affected",
"version": "15.5(3)S5"
},
{
"status": "affected",
"version": "15.5(3)S6"
},
{
"status": "affected",
"version": "15.5(3)S6a"
},
{
"status": "affected",
"version": "15.5(3)S7"
},
{
"status": "affected",
"version": "15.5(3)S6b"
},
{
"status": "affected",
"version": "15.5(3)S8"
},
{
"status": "affected",
"version": "15.5(3)S9"
},
{
"status": "affected",
"version": "15.5(3)S10"
},
{
"status": "affected",
"version": "15.5(3)S9a"
},
{
"status": "affected",
"version": "15.1(3)SVG"
},
{
"status": "affected",
"version": "15.2(2)EB"
},
{
"status": "affected",
"version": "15.2(2)EB1"
},
{
"status": "affected",
"version": "15.2(2)EB2"
},
{
"status": "affected",
"version": "15.2(6)EB"
},
{
"status": "affected",
"version": "15.5(1)T"
},
{
"status": "affected",
"version": "15.5(1)T1"
},
{
"status": "affected",
"version": "15.5(2)T"
},
{
"status": "affected",
"version": "15.5(1)T2"
},
{
"status": "affected",
"version": "15.5(1)T3"
},
{
"status": "affected",
"version": "15.5(2)T1"
},
{
"status": "affected",
"version": "15.5(2)T2"
},
{
"status": "affected",
"version": "15.5(2)T3"
},
{
"status": "affected",
"version": "15.5(2)T4"
},
{
"status": "affected",
"version": "15.5(1)T4"
},
{
"status": "affected",
"version": "15.2(2)EA"
},
{
"status": "affected",
"version": "15.2(2)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA2"
},
{
"status": "affected",
"version": "15.2(3)EA"
},
{
"status": "affected",
"version": "15.2(4)EA"
},
{
"status": "affected",
"version": "15.2(4)EA1"
},
{
"status": "affected",
"version": "15.2(2)EA3"
},
{
"status": "affected",
"version": "15.2(4)EA3"
},
{
"status": "affected",
"version": "15.2(5)EA"
},
{
"status": "affected",
"version": "15.2(4)EA4"
},
{
"status": "affected",
"version": "15.2(4)EA5"
},
{
"status": "affected",
"version": "15.2(4)EA6"
},
{
"status": "affected",
"version": "15.2(4)EA7"
},
{
"status": "affected",
"version": "15.2(4)EA8"
},
{
"status": "affected",
"version": "15.2(4)EA9"
},
{
"status": "affected",
"version": "15.2(4)EA9a"
},
{
"status": "affected",
"version": "15.3(3)JN3"
},
{
"status": "affected",
"version": "15.3(3)JN4"
},
{
"status": "affected",
"version": "15.3(3)JN7"
},
{
"status": "affected",
"version": "15.3(3)JN8"
},
{
"status": "affected",
"version": "15.3(3)JN9"
},
{
"status": "affected",
"version": "15.5(3)M"
},
{
"status": "affected",
"version": "15.5(3)M1"
},
{
"status": "affected",
"version": "15.5(3)M0a"
},
{
"status": "affected",
"version": "15.5(3)M2"
},
{
"status": "affected",
"version": "15.5(3)M3"
},
{
"status": "affected",
"version": "15.5(3)M4"
},
{
"status": "affected",
"version": "15.5(3)M4a"
},
{
"status": "affected",
"version": "15.5(3)M5"
},
{
"status": "affected",
"version": "15.5(3)M6"
},
{
"status": "affected",
"version": "15.5(3)M7"
},
{
"status": "affected",
"version": "15.5(3)M6a"
},
{
"status": "affected",
"version": "15.5(3)M8"
},
{
"status": "affected",
"version": "15.5(3)M9"
},
{
"status": "affected",
"version": "15.5(3)M10"
},
{
"status": "affected",
"version": "15.3(3)JA"
},
{
"status": "affected",
"version": "15.3(3)JA1m"
},
{
"status": "affected",
"version": "15.3(3)JA1"
},
{
"status": "affected",
"version": "15.3(3)JA4"
},
{
"status": "affected",
"version": "15.3(3)JA5"
},
{
"status": "affected",
"version": "15.3(3)JA6"
},
{
"status": "affected",
"version": "15.3(3)JA7"
},
{
"status": "affected",
"version": "15.3(3)JA8"
},
{
"status": "affected",
"version": "15.3(3)JA10"
},
{
"status": "affected",
"version": "15.3(3)JA11"
},
{
"status": "affected",
"version": "15.3(3)JA12"
},
{
"status": "affected",
"version": "15.3(3)JAA"
},
{
"status": "affected",
"version": "15.3(3)JAA11"
},
{
"status": "affected",
"version": "15.3(3)JAA12"
},
{
"status": "affected",
"version": "15.3(3)JAB"
},
{
"status": "affected",
"version": "15.3(3)JB"
},
{
"status": "affected",
"version": "15.5(3)SN"
},
{
"status": "affected",
"version": "15.6(1)S"
},
{
"status": "affected",
"version": "15.6(2)S"
},
{
"status": "affected",
"version": "15.6(2)S1"
},
{
"status": "affected",
"version": "15.6(1)S1"
},
{
"status": "affected",
"version": "15.6(1)S2"
},
{
"status": "affected",
"version": "15.6(2)S2"
},
{
"status": "affected",
"version": "15.6(1)S3"
},
{
"status": "affected",
"version": "15.6(2)S3"
},
{
"status": "affected",
"version": "15.6(1)S4"
},
{
"status": "affected",
"version": "15.6(2)S4"
},
{
"status": "affected",
"version": "15.6(1)T"
},
{
"status": "affected",
"version": "15.6(2)T"
},
{
"status": "affected",
"version": "15.6(1)T0a"
},
{
"status": "affected",
"version": "15.6(1)T1"
},
{
"status": "affected",
"version": "15.6(2)T1"
},
{
"status": "affected",
"version": "15.6(1)T2"
},
{
"status": "affected",
"version": "15.6(2)T2"
},
{
"status": "affected",
"version": "15.6(1)T3"
},
{
"status": "affected",
"version": "15.6(2)T3"
},
{
"status": "affected",
"version": "15.3(3)JNB"
},
{
"status": "affected",
"version": "15.3(3)JNB1"
},
{
"status": "affected",
"version": "15.3(3)JNB2"
},
{
"status": "affected",
"version": "15.3(3)JNB3"
},
{
"status": "affected",
"version": "15.3(3)JNB4"
},
{
"status": "affected",
"version": "15.3(3)JNB6"
},
{
"status": "affected",
"version": "15.3(3)JNB5"
},
{
"status": "affected",
"version": "15.3(3)JAX"
},
{
"status": "affected",
"version": "15.3(3)JAX1"
},
{
"status": "affected",
"version": "15.3(3)JAX2"
},
{
"status": "affected",
"version": "15.3(3)JBB"
},
{
"status": "affected",
"version": "15.3(3)JBB1"
},
{
"status": "affected",
"version": "15.3(3)JBB2"
},
{
"status": "affected",
"version": "15.3(3)JBB4"
},
{
"status": "affected",
"version": "15.3(3)JBB5"
},
{
"status": "affected",
"version": "15.3(3)JBB6"
},
{
"status": "affected",
"version": "15.3(3)JBB8"
},
{
"status": "affected",
"version": "15.3(3)JBB6a"
},
{
"status": "affected",
"version": "15.3(3)JC"
},
{
"status": "affected",
"version": "15.3(3)JC1"
},
{
"status": "affected",
"version": "15.3(3)JC2"
},
{
"status": "affected",
"version": "15.3(3)JC3"
},
{
"status": "affected",
"version": "15.3(3)JC4"
},
{
"status": "affected",
"version": "15.3(3)JC5"
},
{
"status": "affected",
"version": "15.3(3)JC6"
},
{
"status": "affected",
"version": "15.3(3)JC8"
},
{
"status": "affected",
"version": "15.3(3)JC9"
},
{
"status": "affected",
"version": "15.3(3)JC14"
},
{
"status": "affected",
"version": "15.3(3)JNC"
},
{
"status": "affected",
"version": "15.3(3)JNC1"
},
{
"status": "affected",
"version": "15.3(3)JNC2"
},
{
"status": "affected",
"version": "15.3(3)JNC3"
},
{
"status": "affected",
"version": "15.3(3)JNC4"
},
{
"status": "affected",
"version": "15.3(3)JNP"
},
{
"status": "affected",
"version": "15.3(3)JNP1"
},
{
"status": "affected",
"version": "15.3(3)JNP3"
},
{
"status": "affected",
"version": "15.6(2)SP"
},
{
"status": "affected",
"version": "15.6(2)SP1"
},
{
"status": "affected",
"version": "15.6(2)SP2"
},
{
"status": "affected",
"version": "15.6(2)SP3"
},
{
"status": "affected",
"version": "15.6(2)SP4"
},
{
"status": "affected",
"version": "15.6(2)SP5"
},
{
"status": "affected",
"version": "15.6(2)SP6"
},
{
"status": "affected",
"version": "15.6(2)SP7"
},
{
"status": "affected",
"version": "15.6(2)SP8"
},
{
"status": "affected",
"version": "15.6(2)SP9"
},
{
"status": "affected",
"version": "15.6(2)SN"
},
{
"status": "affected",
"version": "15.3(3)JPB"
},
{
"status": "affected",
"version": "15.3(3)JPB1"
},
{
"status": "affected",
"version": "15.3(3)JD"
},
{
"status": "affected",
"version": "15.3(3)JD2"
},
{
"status": "affected",
"version": "15.3(3)JD3"
},
{
"status": "affected",
"version": "15.3(3)JD4"
},
{
"status": "affected",
"version": "15.3(3)JD5"
},
{
"status": "affected",
"version": "15.3(3)JD6"
},
{
"status": "affected",
"version": "15.3(3)JD7"
},
{
"status": "affected",
"version": "15.3(3)JD8"
},
{
"status": "affected",
"version": "15.3(3)JD9"
},
{
"status": "affected",
"version": "15.3(3)JD11"
},
{
"status": "affected",
"version": "15.3(3)JD13"
},
{
"status": "affected",
"version": "15.3(3)JD14"
},
{
"status": "affected",
"version": "15.3(3)JD16"
},
{
"status": "affected",
"version": "15.3(3)JD17"
},
{
"status": "affected",
"version": "15.6(3)M"
},
{
"status": "affected",
"version": "15.6(3)M1"
},
{
"status": "affected",
"version": "15.6(3)M0a"
},
{
"status": "affected",
"version": "15.6(3)M1b"
},
{
"status": "affected",
"version": "15.6(3)M2"
},
{
"status": "affected",
"version": "15.6(3)M2a"
},
{
"status": "affected",
"version": "15.6(3)M3"
},
{
"status": "affected",
"version": "15.6(3)M3a"
},
{
"status": "affected",
"version": "15.6(3)M4"
},
{
"status": "affected",
"version": "15.6(3)M5"
},
{
"status": "affected",
"version": "15.6(3)M6"
},
{
"status": "affected",
"version": "15.6(3)M7"
},
{
"status": "affected",
"version": "15.6(3)M6a"
},
{
"status": "affected",
"version": "15.6(3)M6b"
},
{
"status": "affected",
"version": "15.6(3)M8"
},
{
"status": "affected",
"version": "15.6(3)M9"
},
{
"status": "affected",
"version": "15.1(3)SVJ2"
},
{
"status": "affected",
"version": "15.2(4)EC1"
},
{
"status": "affected",
"version": "15.2(4)EC2"
},
{
"status": "affected",
"version": "15.3(3)JPC"
},
{
"status": "affected",
"version": "15.3(3)JPC1"
},
{
"status": "affected",
"version": "15.3(3)JPC2"
},
{
"status": "affected",
"version": "15.3(3)JPC3"
},
{
"status": "affected",
"version": "15.3(3)JPC100"
},
{
"status": "affected",
"version": "15.3(3)JPC5"
},
{
"status": "affected",
"version": "15.3(3)JND"
},
{
"status": "affected",
"version": "15.3(3)JND1"
},
{
"status": "affected",
"version": "15.3(3)JND2"
},
{
"status": "affected",
"version": "15.3(3)JND3"
},
{
"status": "affected",
"version": "15.3(3)JE"
},
{
"status": "affected",
"version": "15.3(3)JPD"
},
{
"status": "affected",
"version": "15.3(3)JDA7"
},
{
"status": "affected",
"version": "15.3(3)JDA8"
},
{
"status": "affected",
"version": "15.3(3)JDA9"
},
{
"status": "affected",
"version": "15.3(3)JDA11"
},
{
"status": "affected",
"version": "15.3(3)JDA13"
},
{
"status": "affected",
"version": "15.3(3)JDA14"
},
{
"status": "affected",
"version": "15.3(3)JDA16"
},
{
"status": "affected",
"version": "15.3(3)JDA17"
},
{
"status": "affected",
"version": "15.3(3)JF"
},
{
"status": "affected",
"version": "15.3(3)JF1"
},
{
"status": "affected",
"version": "15.3(3)JF2"
},
{
"status": "affected",
"version": "15.3(3)JF4"
},
{
"status": "affected",
"version": "15.3(3)JF5"
},
{
"status": "affected",
"version": "15.3(3)JF6"
},
{
"status": "affected",
"version": "15.3(3)JF7"
},
{
"status": "affected",
"version": "15.3(3)JF8"
},
{
"status": "affected",
"version": "15.3(3)JF9"
},
{
"status": "affected",
"version": "15.3(3)JF10"
},
{
"status": "affected",
"version": "15.3(3)JF11"
},
{
"status": "affected",
"version": "15.3(3)JF12"
},
{
"status": "affected",
"version": "15.3(3)JF12i"
},
{
"status": "affected",
"version": "15.3(3)JF14"
},
{
"status": "affected",
"version": "15.3(3)JF14i"
},
{
"status": "affected",
"version": "15.3(3)JF15"
},
{
"status": "affected",
"version": "15.3(3)JCA7"
},
{
"status": "affected",
"version": "15.3(3)JCA8"
},
{
"status": "affected",
"version": "15.3(3)JCA9"
},
{
"status": "affected",
"version": "15.7(3)M"
},
{
"status": "affected",
"version": "15.7(3)M1"
},
{
"status": "affected",
"version": "15.7(3)M0a"
},
{
"status": "affected",
"version": "15.7(3)M3"
},
{
"status": "affected",
"version": "15.7(3)M2"
},
{
"status": "affected",
"version": "15.7(3)M4"
},
{
"status": "affected",
"version": "15.7(3)M5"
},
{
"status": "affected",
"version": "15.7(3)M4a"
},
{
"status": "affected",
"version": "15.7(3)M4b"
},
{
"status": "affected",
"version": "15.7(3)M6"
},
{
"status": "affected",
"version": "15.7(3)M7"
},
{
"status": "affected",
"version": "15.7(3)M8"
},
{
"status": "affected",
"version": "15.7(3)M9"
},
{
"status": "affected",
"version": "15.3(3)JG"
},
{
"status": "affected",
"version": "15.3(3)JG1"
},
{
"status": "affected",
"version": "15.3(3)JH"
},
{
"status": "affected",
"version": "15.3(3)JH1"
},
{
"status": "affected",
"version": "15.3(3)JI1"
},
{
"status": "affected",
"version": "15.3(3)JI3"
},
{
"status": "affected",
"version": "15.3(3)JI4"
},
{
"status": "affected",
"version": "15.3(3)JI5"
},
{
"status": "affected",
"version": "15.3(3)JI6"
},
{
"status": "affected",
"version": "15.8(3)M"
},
{
"status": "affected",
"version": "15.8(3)M1"
},
{
"status": "affected",
"version": "15.8(3)M0a"
},
{
"status": "affected",
"version": "15.8(3)M0b"
},
{
"status": "affected",
"version": "15.8(3)M2"
},
{
"status": "affected",
"version": "15.8(3)M1a"
},
{
"status": "affected",
"version": "15.8(3)M3"
},
{
"status": "affected",
"version": "15.8(3)M2a"
},
{
"status": "affected",
"version": "15.8(3)M4"
},
{
"status": "affected",
"version": "15.8(3)M3a"
},
{
"status": "affected",
"version": "15.8(3)M3b"
},
{
"status": "affected",
"version": "15.8(3)M5"
},
{
"status": "affected",
"version": "15.8(3)M6"
},
{
"status": "affected",
"version": "15.8(3)M7"
},
{
"status": "affected",
"version": "15.8(3)M8"
},
{
"status": "affected",
"version": "15.8(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M"
},
{
"status": "affected",
"version": "15.9(3)M1"
},
{
"status": "affected",
"version": "15.9(3)M0a"
},
{
"status": "affected",
"version": "15.9(3)M2"
},
{
"status": "affected",
"version": "15.9(3)M3"
},
{
"status": "affected",
"version": "15.9(3)M2a"
},
{
"status": "affected",
"version": "15.9(3)M3a"
},
{
"status": "affected",
"version": "15.9(3)M4"
},
{
"status": "affected",
"version": "15.9(3)M3b"
},
{
"status": "affected",
"version": "15.9(3)M5"
},
{
"status": "affected",
"version": "15.9(3)M4a"
},
{
"status": "affected",
"version": "15.9(3)M6"
},
{
"status": "affected",
"version": "15.9(3)M7"
},
{
"status": "affected",
"version": "15.9(3)M6a"
},
{
"status": "affected",
"version": "15.9(3)M6b"
},
{
"status": "affected",
"version": "15.9(3)M8"
},
{
"status": "affected",
"version": "15.9(3)M7a"
},
{
"status": "affected",
"version": "15.9(3)M9"
},
{
"status": "affected",
"version": "15.9(3)M8b"
},
{
"status": "affected",
"version": "15.9(3)M10"
},
{
"status": "affected",
"version": "15.3(3)JK"
},
{
"status": "affected",
"version": "15.3(3)JK1"
},
{
"status": "affected",
"version": "15.3(3)JK2"
},
{
"status": "affected",
"version": "15.3(3)JK3"
},
{
"status": "affected",
"version": "15.3(3)JK2a"
},
{
"status": "affected",
"version": "15.3(3)JK1t"
},
{
"status": "affected",
"version": "15.3(3)JK4"
},
{
"status": "affected",
"version": "15.3(3)JK5"
},
{
"status": "affected",
"version": "15.3(3)JK6"
},
{
"status": "affected",
"version": "15.3(3)JK7"
},
{
"status": "affected",
"version": "15.3(3)JK8"
},
{
"status": "affected",
"version": "15.3(3)JK8a"
},
{
"status": "affected",
"version": "15.3(3)JK8b"
},
{
"status": "affected",
"version": "15.3(3)JK9"
},
{
"status": "affected",
"version": "15.3(3)JK10"
},
{
"status": "affected",
"version": "15.3(3)JK11"
},
{
"status": "affected",
"version": "15.3(3)JJ"
},
{
"status": "affected",
"version": "15.3(3)JJ1"
},
{
"status": "affected",
"version": "15.3(3)JPI1"
},
{
"status": "affected",
"version": "15.3(3)JPI4"
},
{
"status": "affected",
"version": "15.3(3)JPI1t"
},
{
"status": "affected",
"version": "15.3(3)JPI5"
},
{
"status": "affected",
"version": "15.3(3)JPI7"
},
{
"status": "affected",
"version": "15.3(3)JPI6a"
},
{
"status": "affected",
"version": "15.3(3)JPI8a"
},
{
"status": "affected",
"version": "15.3(3)JPI9"
},
{
"status": "affected",
"version": "15.3(3)JPI10"
},
{
"status": "affected",
"version": "15.3(3)JPJ2"
},
{
"status": "affected",
"version": "15.3(3)JPJ3"
},
{
"status": "affected",
"version": "15.3(3)JPJ2t"
},
{
"status": "affected",
"version": "15.3(3)JPJ3a"
},
{
"status": "affected",
"version": "15.3(3)JPJ4"
},
{
"status": "affected",
"version": "15.3(3)JPJ5"
},
{
"status": "affected",
"version": "15.3(3)JPJ6"
},
{
"status": "affected",
"version": "15.3(3)JPJ7"
},
{
"status": "affected",
"version": "15.3(3)JPJ7c"
},
{
"status": "affected",
"version": "15.3(3)JPJ8a"
},
{
"status": "affected",
"version": "15.3(3)JPJ9"
},
{
"status": "affected",
"version": "15.3(3)JPJ10"
},
{
"status": "affected",
"version": "15.3(3)JPJ11"
},
{
"status": "affected",
"version": "15.3(3)JPK"
},
{
"status": "affected",
"version": "15.3(3)JPK1"
},
{
"status": "affected",
"version": "15.3(3)JPK2"
},
{
"status": "affected",
"version": "15.3(3)JPK3"
},
{
"status": "affected",
"version": "15.3(3)JPK4"
},
{
"status": "affected",
"version": "15.3(3)JPK5"
},
{
"status": "affected",
"version": "15.3(3)JPK6"
},
{
"status": "affected",
"version": "15.3(3)JPK7"
},
{
"status": "affected",
"version": "15.3(3)JPK8"
},
{
"status": "affected",
"version": "15.3(3)JPK9"
},
{
"status": "affected",
"version": "15.3(3)JPL"
},
{
"status": "affected",
"version": "15.3(3)JPM"
},
{
"status": "affected",
"version": "15.3(3)JPN"
},
{
"status": "affected",
"version": "15.3(3)JPN1"
},
{
"status": "affected",
"version": "15.3(3)JPN2"
},
{
"status": "affected",
"version": "15.3(3)JPN3"
},
{
"status": "affected",
"version": "15.3(3)JPN4"
},
{
"status": "affected",
"version": "15.3(3)JPN5"
},
{
"status": "affected",
"version": "15.3(3)JPO"
},
{
"status": "affected",
"version": "15.3(3)JPP"
},
{
"status": "affected",
"version": "15.3(3)JPQ"
},
{
"status": "affected",
"version": "15.3(3)JPQ1"
},
{
"status": "affected",
"version": "15.3(3)JPQ2"
},
{
"status": "affected",
"version": "15.3(3)JPQ3"
},
{
"status": "affected",
"version": "15.3(3)JPQ4"
},
{
"status": "affected",
"version": "15.3(3)JPR"
},
{
"status": "affected",
"version": "15.3(3)JPS"
},
{
"status": "affected",
"version": "15.3(3)JPT"
},
{
"status": "affected",
"version": "15.3(3)JPT1"
}
]
},
{
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "7.11.21"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.2.2"
},
{
"status": "affected",
"version": "24.2.20"
},
{
"status": "affected",
"version": "24.3.1"
},
{
"status": "affected",
"version": "24.3.2"
},
{
"status": "affected",
"version": "24.4.1"
}
]
},
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.7.0S"
},
{
"status": "affected",
"version": "3.7.1S"
},
{
"status": "affected",
"version": "3.7.2S"
},
{
"status": "affected",
"version": "3.7.3S"
},
{
"status": "affected",
"version": "3.7.4S"
},
{
"status": "affected",
"version": "3.7.5S"
},
{
"status": "affected",
"version": "3.7.6S"
},
{
"status": "affected",
"version": "3.7.7S"
},
{
"status": "affected",
"version": "3.7.4aS"
},
{
"status": "affected",
"version": "3.7.2tS"
},
{
"status": "affected",
"version": "3.7.0bS"
},
{
"status": "affected",
"version": "3.7.1aS"
},
{
"status": "affected",
"version": "3.3.0SG"
},
{
"status": "affected",
"version": "3.3.2SG"
},
{
"status": "affected",
"version": "3.3.1SG"
},
{
"status": "affected",
"version": "3.8.0S"
},
{
"status": "affected",
"version": "3.8.1S"
},
{
"status": "affected",
"version": "3.8.2S"
},
{
"status": "affected",
"version": "3.9.1S"
},
{
"status": "affected",
"version": "3.9.0S"
},
{
"status": "affected",
"version": "3.9.2S"
},
{
"status": "affected",
"version": "3.9.1aS"
},
{
"status": "affected",
"version": "3.9.0aS"
},
{
"status": "affected",
"version": "3.2.0SE"
},
{
"status": "affected",
"version": "3.2.1SE"
},
{
"status": "affected",
"version": "3.2.2SE"
},
{
"status": "affected",
"version": "3.2.3SE"
},
{
"status": "affected",
"version": "3.3.0SE"
},
{
"status": "affected",
"version": "3.3.1SE"
},
{
"status": "affected",
"version": "3.3.2SE"
},
{
"status": "affected",
"version": "3.3.3SE"
},
{
"status": "affected",
"version": "3.3.4SE"
},
{
"status": "affected",
"version": "3.3.5SE"
},
{
"status": "affected",
"version": "3.4.0SG"
},
{
"status": "affected",
"version": "3.4.2SG"
},
{
"status": "affected",
"version": "3.4.1SG"
},
{
"status": "affected",
"version": "3.4.3SG"
},
{
"status": "affected",
"version": "3.4.4SG"
},
{
"status": "affected",
"version": "3.4.5SG"
},
{
"status": "affected",
"version": "3.4.6SG"
},
{
"status": "affected",
"version": "3.4.7SG"
},
{
"status": "affected",
"version": "3.4.8SG"
},
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.10.0S"
},
{
"status": "affected",
"version": "3.10.1S"
},
{
"status": "affected",
"version": "3.10.2S"
},
{
"status": "affected",
"version": "3.10.3S"
},
{
"status": "affected",
"version": "3.10.4S"
},
{
"status": "affected",
"version": "3.10.5S"
},
{
"status": "affected",
"version": "3.10.6S"
},
{
"status": "affected",
"version": "3.10.2tS"
},
{
"status": "affected",
"version": "3.10.7S"
},
{
"status": "affected",
"version": "3.10.1xbS"
},
{
"status": "affected",
"version": "3.10.8S"
},
{
"status": "affected",
"version": "3.10.8aS"
},
{
"status": "affected",
"version": "3.10.9S"
},
{
"status": "affected",
"version": "3.10.10S"
},
{
"status": "affected",
"version": "3.11.1S"
},
{
"status": "affected",
"version": "3.11.2S"
},
{
"status": "affected",
"version": "3.11.0S"
},
{
"status": "affected",
"version": "3.11.3S"
},
{
"status": "affected",
"version": "3.11.4S"
},
{
"status": "affected",
"version": "3.12.0S"
},
{
"status": "affected",
"version": "3.12.1S"
},
{
"status": "affected",
"version": "3.12.2S"
},
{
"status": "affected",
"version": "3.12.3S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.12.4S"
},
{
"status": "affected",
"version": "3.13.0S"
},
{
"status": "affected",
"version": "3.13.1S"
},
{
"status": "affected",
"version": "3.13.2S"
},
{
"status": "affected",
"version": "3.13.3S"
},
{
"status": "affected",
"version": "3.13.4S"
},
{
"status": "affected",
"version": "3.13.5S"
},
{
"status": "affected",
"version": "3.13.2aS"
},
{
"status": "affected",
"version": "3.13.0aS"
},
{
"status": "affected",
"version": "3.13.5aS"
},
{
"status": "affected",
"version": "3.13.6S"
},
{
"status": "affected",
"version": "3.13.7S"
},
{
"status": "affected",
"version": "3.13.6aS"
},
{
"status": "affected",
"version": "3.13.7aS"
},
{
"status": "affected",
"version": "3.13.8S"
},
{
"status": "affected",
"version": "3.13.9S"
},
{
"status": "affected",
"version": "3.13.10S"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.5bE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.2aS"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.3aS"
},
{
"status": "affected",
"version": "3.16.4S"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.16.6S"
},
{
"status": "affected",
"version": "3.16.7S"
},
{
"status": "affected",
"version": "3.16.6bS"
},
{
"status": "affected",
"version": "3.16.7aS"
},
{
"status": "affected",
"version": "3.16.7bS"
},
{
"status": "affected",
"version": "3.16.8S"
},
{
"status": "affected",
"version": "3.16.9S"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "3.17.4S"
},
{
"status": "affected",
"version": "16.1.1"
},
{
"status": "affected",
"version": "16.1.2"
},
{
"status": "affected",
"version": "16.1.3"
},
{
"status": "affected",
"version": "16.2.1"
},
{
"status": "affected",
"version": "16.2.2"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.8.8E"
},
{
"status": "affected",
"version": "3.8.9E"
},
{
"status": "affected",
"version": "3.8.10E"
},
{
"status": "affected",
"version": "16.3.1"
},
{
"status": "affected",
"version": "16.3.2"
},
{
"status": "affected",
"version": "16.3.3"
},
{
"status": "affected",
"version": "16.3.1a"
},
{
"status": "affected",
"version": "16.3.4"
},
{
"status": "affected",
"version": "16.3.5"
},
{
"status": "affected",
"version": "16.3.5b"
},
{
"status": "affected",
"version": "16.3.6"
},
{
"status": "affected",
"version": "16.3.7"
},
{
"status": "affected",
"version": "16.3.8"
},
{
"status": "affected",
"version": "16.3.9"
},
{
"status": "affected",
"version": "16.3.10"
},
{
"status": "affected",
"version": "16.3.11"
},
{
"status": "affected",
"version": "16.4.1"
},
{
"status": "affected",
"version": "16.4.2"
},
{
"status": "affected",
"version": "16.4.3"
},
{
"status": "affected",
"version": "16.5.1"
},
{
"status": "affected",
"version": "16.5.1a"
},
{
"status": "affected",
"version": "16.5.1b"
},
{
"status": "affected",
"version": "16.5.2"
},
{
"status": "affected",
"version": "16.5.3"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.2S"
},
{
"status": "affected",
"version": "3.18.3S"
},
{
"status": "affected",
"version": "3.18.4S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.1bSP"
},
{
"status": "affected",
"version": "3.18.1cSP"
},
{
"status": "affected",
"version": "3.18.2SP"
},
{
"status": "affected",
"version": "3.18.2aSP"
},
{
"status": "affected",
"version": "3.18.3SP"
},
{
"status": "affected",
"version": "3.18.4SP"
},
{
"status": "affected",
"version": "3.18.3aSP"
},
{
"status": "affected",
"version": "3.18.3bSP"
},
{
"status": "affected",
"version": "3.18.5SP"
},
{
"status": "affected",
"version": "3.18.6SP"
},
{
"status": "affected",
"version": "3.18.7SP"
},
{
"status": "affected",
"version": "3.18.8aSP"
},
{
"status": "affected",
"version": "3.18.9SP"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "16.6.1"
},
{
"status": "affected",
"version": "16.6.2"
},
{
"status": "affected",
"version": "16.6.3"
},
{
"status": "affected",
"version": "16.6.4"
},
{
"status": "affected",
"version": "16.6.5"
},
{
"status": "affected",
"version": "16.6.4a"
},
{
"status": "affected",
"version": "16.6.5a"
},
{
"status": "affected",
"version": "16.6.6"
},
{
"status": "affected",
"version": "16.6.7"
},
{
"status": "affected",
"version": "16.6.8"
},
{
"status": "affected",
"version": "16.6.9"
},
{
"status": "affected",
"version": "16.6.10"
},
{
"status": "affected",
"version": "16.7.1"
},
{
"status": "affected",
"version": "16.7.1a"
},
{
"status": "affected",
"version": "16.7.1b"
},
{
"status": "affected",
"version": "16.7.2"
},
{
"status": "affected",
"version": "16.7.3"
},
{
"status": "affected",
"version": "16.7.4"
},
{
"status": "affected",
"version": "16.8.1"
},
{
"status": "affected",
"version": "16.8.1a"
},
{
"status": "affected",
"version": "16.8.1b"
},
{
"status": "affected",
"version": "16.8.1s"
},
{
"status": "affected",
"version": "16.8.1c"
},
{
"status": "affected",
"version": "16.8.1d"
},
{
"status": "affected",
"version": "16.8.2"
},
{
"status": "affected",
"version": "16.8.1e"
},
{
"status": "affected",
"version": "16.8.3"
},
{
"status": "affected",
"version": "16.9.1"
},
{
"status": "affected",
"version": "16.9.2"
},
{
"status": "affected",
"version": "16.9.1a"
},
{
"status": "affected",
"version": "16.9.1b"
},
{
"status": "affected",
"version": "16.9.1s"
},
{
"status": "affected",
"version": "16.9.3"
},
{
"status": "affected",
"version": "16.9.4"
},
{
"status": "affected",
"version": "16.9.3a"
},
{
"status": "affected",
"version": "16.9.5"
},
{
"status": "affected",
"version": "16.9.6"
},
{
"status": "affected",
"version": "16.9.7"
},
{
"status": "affected",
"version": "16.9.8"
},
{
"status": "affected",
"version": "16.10.1"
},
{
"status": "affected",
"version": "16.10.1a"
},
{
"status": "affected",
"version": "16.10.1b"
},
{
"status": "affected",
"version": "16.10.1s"
},
{
"status": "affected",
"version": "16.10.1c"
},
{
"status": "affected",
"version": "16.10.1e"
},
{
"status": "affected",
"version": "16.10.1d"
},
{
"status": "affected",
"version": "16.10.2"
},
{
"status": "affected",
"version": "16.10.1f"
},
{
"status": "affected",
"version": "16.10.1g"
},
{
"status": "affected",
"version": "16.10.3"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.2E"
},
{
"status": "affected",
"version": "3.10.3E"
},
{
"status": "affected",
"version": "16.11.1"
},
{
"status": "affected",
"version": "16.11.1a"
},
{
"status": "affected",
"version": "16.11.1b"
},
{
"status": "affected",
"version": "16.11.2"
},
{
"status": "affected",
"version": "16.11.1s"
},
{
"status": "affected",
"version": "16.12.1"
},
{
"status": "affected",
"version": "16.12.1s"
},
{
"status": "affected",
"version": "16.12.1a"
},
{
"status": "affected",
"version": "16.12.1c"
},
{
"status": "affected",
"version": "16.12.1w"
},
{
"status": "affected",
"version": "16.12.2"
},
{
"status": "affected",
"version": "16.12.1y"
},
{
"status": "affected",
"version": "16.12.2a"
},
{
"status": "affected",
"version": "16.12.3"
},
{
"status": "affected",
"version": "16.12.8"
},
{
"status": "affected",
"version": "16.12.2s"
},
{
"status": "affected",
"version": "16.12.1x"
},
{
"status": "affected",
"version": "16.12.1t"
},
{
"status": "affected",
"version": "16.12.4"
},
{
"status": "affected",
"version": "16.12.3s"
},
{
"status": "affected",
"version": "16.12.3a"
},
{
"status": "affected",
"version": "16.12.4a"
},
{
"status": "affected",
"version": "16.12.5"
},
{
"status": "affected",
"version": "16.12.6"
},
{
"status": "affected",
"version": "16.12.1z1"
},
{
"status": "affected",
"version": "16.12.5a"
},
{
"status": "affected",
"version": "16.12.5b"
},
{
"status": "affected",
"version": "16.12.1z2"
},
{
"status": "affected",
"version": "16.12.6a"
},
{
"status": "affected",
"version": "16.12.7"
},
{
"status": "affected",
"version": "16.12.9"
},
{
"status": "affected",
"version": "16.12.10"
},
{
"status": "affected",
"version": "16.12.10a"
},
{
"status": "affected",
"version": "16.12.11"
},
{
"status": "affected",
"version": "16.12.12"
},
{
"status": "affected",
"version": "3.11.0E"
},
{
"status": "affected",
"version": "3.11.1E"
},
{
"status": "affected",
"version": "3.11.2E"
},
{
"status": "affected",
"version": "3.11.3E"
},
{
"status": "affected",
"version": "3.11.1aE"
},
{
"status": "affected",
"version": "3.11.4E"
},
{
"status": "affected",
"version": "3.11.3aE"
},
{
"status": "affected",
"version": "3.11.5E"
},
{
"status": "affected",
"version": "3.11.6E"
},
{
"status": "affected",
"version": "3.11.7E"
},
{
"status": "affected",
"version": "3.11.8E"
},
{
"status": "affected",
"version": "3.11.9E"
},
{
"status": "affected",
"version": "3.11.10E"
},
{
"status": "affected",
"version": "3.11.11E"
},
{
"status": "affected",
"version": "17.1.1"
},
{
"status": "affected",
"version": "17.1.1a"
},
{
"status": "affected",
"version": "17.1.1s"
},
{
"status": "affected",
"version": "17.1.1t"
},
{
"status": "affected",
"version": "17.1.3"
},
{
"status": "affected",
"version": "17.2.1"
},
{
"status": "affected",
"version": "17.2.1r"
},
{
"status": "affected",
"version": "17.2.1a"
},
{
"status": "affected",
"version": "17.2.1v"
},
{
"status": "affected",
"version": "17.2.2"
},
{
"status": "affected",
"version": "17.2.3"
},
{
"status": "affected",
"version": "17.3.1"
},
{
"status": "affected",
"version": "17.3.2"
},
{
"status": "affected",
"version": "17.3.3"
},
{
"status": "affected",
"version": "17.3.1a"
},
{
"status": "affected",
"version": "17.3.1w"
},
{
"status": "affected",
"version": "17.3.2a"
},
{
"status": "affected",
"version": "17.3.1x"
},
{
"status": "affected",
"version": "17.3.1z"
},
{
"status": "affected",
"version": "17.3.4"
},
{
"status": "affected",
"version": "17.3.5"
},
{
"status": "affected",
"version": "17.3.4a"
},
{
"status": "affected",
"version": "17.3.6"
},
{
"status": "affected",
"version": "17.3.4b"
},
{
"status": "affected",
"version": "17.3.4c"
},
{
"status": "affected",
"version": "17.3.5a"
},
{
"status": "affected",
"version": "17.3.5b"
},
{
"status": "affected",
"version": "17.3.7"
},
{
"status": "affected",
"version": "17.3.8"
},
{
"status": "affected",
"version": "17.3.8a"
},
{
"status": "affected",
"version": "17.4.1"
},
{
"status": "affected",
"version": "17.4.2"
},
{
"status": "affected",
"version": "17.4.1a"
},
{
"status": "affected",
"version": "17.4.1b"
},
{
"status": "affected",
"version": "17.4.2a"
},
{
"status": "affected",
"version": "17.5.1"
},
{
"status": "affected",
"version": "17.5.1a"
},
{
"status": "affected",
"version": "17.6.1"
},
{
"status": "affected",
"version": "17.6.2"
},
{
"status": "affected",
"version": "17.6.1w"
},
{
"status": "affected",
"version": "17.6.1a"
},
{
"status": "affected",
"version": "17.6.1x"
},
{
"status": "affected",
"version": "17.6.3"
},
{
"status": "affected",
"version": "17.6.1y"
},
{
"status": "affected",
"version": "17.6.1z"
},
{
"status": "affected",
"version": "17.6.3a"
},
{
"status": "affected",
"version": "17.6.4"
},
{
"status": "affected",
"version": "17.6.1z1"
},
{
"status": "affected",
"version": "17.6.5"
},
{
"status": "affected",
"version": "17.6.6"
},
{
"status": "affected",
"version": "17.6.6a"
},
{
"status": "affected",
"version": "17.6.5a"
},
{
"status": "affected",
"version": "17.6.7"
},
{
"status": "affected",
"version": "17.6.8"
},
{
"status": "affected",
"version": "17.6.8a"
},
{
"status": "affected",
"version": "17.7.1"
},
{
"status": "affected",
"version": "17.7.1a"
},
{
"status": "affected",
"version": "17.7.1b"
},
{
"status": "affected",
"version": "17.7.2"
},
{
"status": "affected",
"version": "17.10.1"
},
{
"status": "affected",
"version": "17.10.1a"
},
{
"status": "affected",
"version": "17.10.1b"
},
{
"status": "affected",
"version": "17.8.1"
},
{
"status": "affected",
"version": "17.8.1a"
},
{
"status": "affected",
"version": "17.9.1"
},
{
"status": "affected",
"version": "17.9.1w"
},
{
"status": "affected",
"version": "17.9.2"
},
{
"status": "affected",
"version": "17.9.1a"
},
{
"status": "affected",
"version": "17.9.1x"
},
{
"status": "affected",
"version": "17.9.1y"
},
{
"status": "affected",
"version": "17.9.3"
},
{
"status": "affected",
"version": "17.9.2a"
},
{
"status": "affected",
"version": "17.9.1x1"
},
{
"status": "affected",
"version": "17.9.3a"
},
{
"status": "affected",
"version": "17.9.4"
},
{
"status": "affected",
"version": "17.9.1y1"
},
{
"status": "affected",
"version": "17.9.5"
},
{
"status": "affected",
"version": "17.9.4a"
},
{
"status": "affected",
"version": "17.9.5a"
},
{
"status": "affected",
"version": "17.9.5b"
},
{
"status": "affected",
"version": "17.9.6"
},
{
"status": "affected",
"version": "17.9.6a"
},
{
"status": "affected",
"version": "17.9.5e"
},
{
"status": "affected",
"version": "17.11.1"
},
{
"status": "affected",
"version": "17.11.1a"
},
{
"status": "affected",
"version": "17.12.1"
},
{
"status": "affected",
"version": "17.12.1w"
},
{
"status": "affected",
"version": "17.12.1a"
},
{
"status": "affected",
"version": "17.12.1x"
},
{
"status": "affected",
"version": "17.12.2"
},
{
"status": "affected",
"version": "17.12.3"
},
{
"status": "affected",
"version": "17.12.2a"
},
{
"status": "affected",
"version": "17.12.1y"
},
{
"status": "affected",
"version": "17.12.1z"
},
{
"status": "affected",
"version": "17.12.4"
},
{
"status": "affected",
"version": "17.12.3a"
},
{
"status": "affected",
"version": "17.12.1z1"
},
{
"status": "affected",
"version": "17.12.1z2"
},
{
"status": "affected",
"version": "17.12.4a"
},
{
"status": "affected",
"version": "17.13.1"
},
{
"status": "affected",
"version": "17.13.1a"
},
{
"status": "affected",
"version": "17.14.1"
},
{
"status": "affected",
"version": "17.14.1a"
},
{
"status": "affected",
"version": "17.11.99SW"
},
{
"status": "affected",
"version": "17.15.1"
},
{
"status": "affected",
"version": "17.15.1w"
},
{
"status": "affected",
"version": "17.15.1a"
},
{
"status": "affected",
"version": "17.15.2"
},
{
"status": "affected",
"version": "17.15.1b"
},
{
"status": "affected",
"version": "17.15.1x"
},
{
"status": "affected",
"version": "17.16.1"
},
{
"status": "affected",
"version": "17.16.1a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload.\u0026nbsp;\r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T16:37:29.828Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-snmp-dos-sdxnSUcW",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW"
}
],
"source": {
"advisory": "cisco-sa-snmp-dos-sdxnSUcW",
"defects": [
"CSCwn08493",
"CSCwm89600"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20172",
"datePublished": "2025-02-05T16:37:29.828Z",
"dateReserved": "2024-10-10T19:15:13.219Z",
"dateUpdated": "2025-03-13T12:58:43.080Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-1440 (GCVE-0-2021-1440)
Vulnerability from cvelistv5
Published
2024-11-18 15:34
Modified
2024-11-18 15:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-617 - Reachable Assertion
Summary
A vulnerability in the implementation of the Resource Public Key Infrastructure (RPKI) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause the Border Gateway Protocol (BGP) process to crash, resulting in a denial of service (DoS) condition.
This vulnerability is due to the incorrect handling of a specific RPKI to Router (RTR) Protocol packet header. An attacker could exploit this vulnerability by compromising the RPKI validator server and sending a specifically crafted RTR packet to an affected device. Alternatively, the attacker could use man-in-the-middle techniques to impersonate the RPKI validator server and send a specifically crafted RTR response packet over the established RTR TCP connection to the affected device. A successful exploit could allow the attacker to cause a DoS condition because the BGP process could constantly restart and BGP routing could become unstable.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2021 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.6.1 Version: 6.5.3 Version: 7.0.1 Version: 6.6.11 Version: 6.5.1 Version: 6.5.2 Version: 6.6.2 Version: 6.6.12 Version: 6.6.25 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 7.0.2 Version: 7.1.2 Version: 7.2.1 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 6.6.4 Version: 7.2.12 Version: 7.2.2 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1440",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-18T15:51:07.818992Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:51:25.688Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.2.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the Resource Public Key Infrastructure (RPKI) feature of Cisco\u0026nbsp;IOS XR Software could allow an unauthenticated, remote attacker to cause the Border Gateway Protocol (BGP) process to crash, resulting in a denial of service (DoS) condition.\r\nThis vulnerability is due to the incorrect handling of a specific RPKI to Router (RTR) Protocol packet header. An attacker could exploit this vulnerability by compromising the RPKI validator server and sending a specifically crafted RTR packet to an affected device. Alternatively, the attacker could use man-in-the-middle techniques to impersonate the RPKI validator server and send a specifically crafted RTR response packet over the established RTR TCP connection to the affected device. A successful exploit could allow the attacker to cause a DoS condition because the BGP process could constantly restart and BGP routing could become unstable.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2021 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-617",
"description": "Reachable Assertion",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:34:27.378Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-xrbgp-rpki-dos-gvmjqxbk",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the October 2021 release of the Cisco\u0026nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773\"\u003eCisco\u0026nbsp;Event Response: October 2021 Cisco\u0026nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ"
}
],
"source": {
"advisory": "cisco-sa-xrbgp-rpki-dos-gvmjqxbk",
"defects": [
"CSCvx04451"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software BGP Resource Public Key Infrastructure Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1440",
"datePublished": "2024-11-18T15:34:27.378Z",
"dateReserved": "2020-11-13T00:00:00.000Z",
"dateUpdated": "2024-11-18T15:51:25.688Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-20655 (GCVE-0-2022-20655)
Vulnerability from cvelistv5
Published
2024-11-15 15:56
Modified
2024-11-15 21:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xr_software",
"vendor": "cisco",
"versions": [
{
"lessThan": "7.0.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "7.1.1",
"status": "affected",
"version": "7.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "virtual_topology_system",
"vendor": "cisco",
"versions": [
{
"lessThan": "2.6.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "network_services_orchestrator",
"vendor": "cisco",
"versions": [
{
"lessThan": "4.3.9.1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "4.4.5.6",
"status": "affected",
"version": "4.4.0.0",
"versionType": "custom"
},
{
"lessThan": "4.5.7",
"status": "affected",
"version": "4.5.0",
"versionType": "custom"
},
{
"lessThan": "4.6.1.7",
"status": "affected",
"version": "4.6.0",
"versionType": "custom"
},
{
"lessThan": "4.7.1",
"status": "affected",
"version": "4.7.0",
"versionType": "custom"
},
{
"lessThan": "5.1.0.1",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "enterprise_nfv_infrastructure_software",
"vendor": "cisco",
"versions": [
{
"lessThan": "3.12.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "catalyst_sd-wan_manager",
"vendor": "cisco",
"versions": [
{
"lessThan": "18.4.4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "19.2.1",
"status": "affected",
"version": "19.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xe_catalyst_sd-wan",
"vendor": "cisco",
"versions": [
{
"lessThan": "16.10.2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "16.12.1b",
"status": "affected",
"version": "16.12.0",
"versionType": "custom"
},
{
"lessThan": "17.2.1r",
"status": "affected",
"version": "17.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sd-wan_vedge_router",
"vendor": "cisco",
"versions": [
{
"lessThan": "18.4.4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "19.2.1",
"status": "affected",
"version": "19.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "carrier_packet_transport",
"vendor": "cisco",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20655",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T19:43:18.170598Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T21:00:58.460Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Virtual Topology System (VTS)",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Network Services Orchestrator",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Enterprise NFV Infrastructure Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Catalyst SD-WAN",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Catalyst SD-WAN Manager",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco IOS XE Catalyst SD-WAN",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco SD-WAN vEdge Router",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Ultra Gateway Platform",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
},
{
"product": "Cisco Carrier Packet Transport",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.5"
},
{
"status": "affected",
"version": "3.1"
},
{
"status": "affected",
"version": "3.2"
},
{
"status": "affected",
"version": "2.5"
},
{
"status": "affected",
"version": "2.0"
},
{
"status": "affected",
"version": "9.2.2"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.0"
},
{
"status": "affected",
"version": "1.1"
},
{
"status": "affected",
"version": "1.2"
},
{
"status": "affected",
"version": "2.1.0"
},
{
"status": "affected",
"version": "2.3.0"
},
{
"status": "affected",
"version": "2.3.3"
},
{
"status": "affected",
"version": "2.3.5"
},
{
"status": "affected",
"version": "2.3.4"
},
{
"status": "affected",
"version": "2.0.1"
},
{
"status": "affected",
"version": "2.0.0"
},
{
"status": "affected",
"version": "2.0.3"
},
{
"status": "affected",
"version": "2.0.4"
},
{
"status": "affected",
"version": "2.0.5"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.2.2"
},
{
"status": "affected",
"version": "2.2.3"
},
{
"status": "affected",
"version": "10.8.0"
},
{
"status": "affected",
"version": "7.0.3"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "1.0.2"
},
{
"status": "affected",
"version": "1.1.1"
},
{
"status": "affected",
"version": "1.1.2"
},
{
"status": "affected",
"version": "4.1"
},
{
"status": "affected",
"version": "4.0"
},
{
"status": "affected",
"version": "12.1.0"
},
{
"status": "affected",
"version": "9.8.1"
},
{
"status": "affected",
"version": "9.8.0"
},
{
"status": "affected",
"version": "4.1.82"
},
{
"status": "affected",
"version": "4.1.4"
},
{
"status": "affected",
"version": "4.6.1"
},
{
"status": "affected",
"version": "4.0.4"
},
{
"status": "affected",
"version": "4.0.3"
},
{
"status": "affected",
"version": "6.2.4"
},
{
"status": "affected",
"version": "3.0.5"
},
{
"status": "affected",
"version": "3.0.6"
},
{
"status": "affected",
"version": "3.0.7"
},
{
"status": "affected",
"version": "3.0.3"
},
{
"status": "affected",
"version": "3.0.0"
},
{
"status": "affected",
"version": "9.5.0"
},
{
"status": "affected",
"version": "9.5.3"
},
{
"status": "affected",
"version": "9.5.1"
},
{
"status": "affected",
"version": "9.5.2"
},
{
"status": "affected",
"version": "9.7.0"
},
{
"status": "affected",
"version": "9.521"
},
{
"status": "affected",
"version": "4.5.0"
},
{
"status": "affected",
"version": "4.7.0"
},
{
"status": "affected",
"version": "3.2.0"
},
{
"status": "affected",
"version": "3.2.1"
},
{
"status": "affected",
"version": "3.1.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:56:42.927Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-cli-cmdinj-4MttWZPB",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB"
},
{
"name": "cisco-sa-confdcli-cmdinj-wybQDSSh",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh"
}
],
"source": {
"advisory": "cisco-sa-cli-cmdinj-4MttWZPB",
"defects": [
"CSCvq22323",
"CSCvq58164",
"CSCvq58224",
"CSCvq58168",
"CSCvq58183",
"CSCvq58226",
"CSCvz49669",
"CSCvq58204",
"CSCvm76596"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20655",
"datePublished": "2024-11-15T15:56:42.927Z",
"dateReserved": "2021-11-02T13:28:29.037Z",
"dateUpdated": "2024-11-15T21:00:58.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-20846 (GCVE-0-2022-20846)
Vulnerability from cvelistv5
Published
2024-11-15 15:32
Modified
2024-11-15 16:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco Discovery Protocol process to reload on an affected device.
This vulnerability is due to a heap buffer overflow in certain Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.6.15 Version: 7.5.12 Version: 7.3.3 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20846",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T16:40:55.507077Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T16:41:07.934Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco\u0026nbsp;Discovery Protocol implementation for Cisco\u0026nbsp;IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco\u0026nbsp;Discovery Protocol process to reload on an affected device.\r\nThis vulnerability is due to a heap buffer overflow in certain Cisco\u0026nbsp;Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco\u0026nbsp;Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco\u0026nbsp;Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco\u0026nbsp;Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). \u0026nbsp;Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco\u00a0PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:32:38.495Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-xr-cdp-wnALzvT2",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the September 2022 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74840\"\u003eCisco\u0026nbsp;Event Response: September 2022 Semiannual Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the September 2022 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74840\"\u003eCisco\u0026nbsp;Event Response: September 2022 Semiannual Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6"
}
],
"source": {
"advisory": "cisco-sa-xr-cdp-wnALzvT2",
"defects": [
"CSCwb23263"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Cisco Discovery Protocol Buffer Overflow Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20846",
"datePublished": "2024-11-15T15:32:38.495Z",
"dateReserved": "2021-11-02T13:28:29.179Z",
"dateUpdated": "2024-11-15T16:41:07.934Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-20845 (GCVE-0-2022-20845)
Vulnerability from cvelistv5
Published
2024-11-15 15:32
Modified
2024-11-15 15:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-789 - Uncontrolled Memory Allocation
Summary
A vulnerability in the TL1 function of Cisco Network Convergence System (NCS) 4000 Series could allow an authenticated, local attacker to cause a memory leak in the TL1 process.
This vulnerability is due to TL1 not freeing memory under some conditions. An attacker could exploit this vulnerability by connecting to the device and issuing TL1 commands after being authenticated. A successful exploit could allow the attacker to cause the TL1 process to consume large amounts of memory. When the memory reaches a threshold, the Resource Monitor (Resmon) process will begin to restart or shutdown the top five consumers of memory, resulting in a denial of service (DoS).Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.29 Version: 6.5.26 Version: 6.5.25 Version: 6.5.28 Version: 6.5.31 Version: 6.5.32 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20845",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T15:43:35.209883Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:43:44.513Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "6.5.32"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TL1 function of Cisco\u0026nbsp;Network Convergence System (NCS) 4000 Series could allow an authenticated, local attacker to cause a memory leak in the TL1 process.\r\nThis vulnerability is due to TL1 not freeing memory under some conditions. An attacker could exploit this vulnerability by connecting to the device and issuing TL1 commands after being authenticated. A successful exploit could allow the attacker to cause the TL1 process to consume large amounts of memory. When the memory reaches a threshold, the Resource Monitor (Resmon)\u0026nbsp;process will begin to restart or shutdown the top five consumers of memory, resulting in a denial of service (DoS).Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-789",
"description": "Uncontrolled Memory Allocation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:32:28.604Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-ncs4k-tl1-GNnLwC6",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the September 2022 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74840\"\u003eCisco\u0026nbsp;Event Response: September 2022 Semiannual Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt"
}
],
"source": {
"advisory": "cisco-sa-ncs4k-tl1-GNnLwC6",
"defects": [
"CSCwb16005"
],
"discovery": "INTERNAL"
},
"title": "Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20845",
"datePublished": "2024-11-15T15:32:28.604Z",
"dateReserved": "2021-11-02T13:28:29.179Z",
"dateUpdated": "2024-11-15T15:43:44.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-20849 (GCVE-0-2022-20849)
Vulnerability from cvelistv5
Published
2024-11-15 15:31
Modified
2024-11-15 15:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-391 - Unchecked Error Condition
Summary
A vulnerability in the Broadband Network Gateway PPP over Ethernet (PPPoE) feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the PPPoE process to continually crash.
This vulnerability exists because the PPPoE feature does not properly handle an error condition within a specific crafted packet sequence. An attacker could exploit this vulnerability by sending a sequence of specific PPPoE packets from controlled customer premises equipment (CPE). A successful exploit could allow the attacker to cause the PPPoE process to continually restart, resulting in a denial of service condition (DoS).Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.6.1 Version: 6.5.15 Version: 7.0.1 Version: 6.6.25 Version: 6.6.2 Version: 6.5.1 Version: 6.5.2 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.1.2 Version: 7.2.1 Version: 6.7.2 Version: 7.1.25 Version: 6.6.4 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.8.1 Version: 7.3.2 Version: 7.5.1 Version: 7.3.3 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-20849",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T15:46:04.754318Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:46:25.684Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Broadband Network Gateway PPP over Ethernet (PPPoE) feature of Cisco\u0026nbsp;IOS XR Software could allow an unauthenticated, adjacent attacker to cause the PPPoE process to continually crash.\r\nThis vulnerability exists because the PPPoE feature does not properly handle an error condition within a specific crafted packet sequence. An attacker could exploit this vulnerability by sending a sequence of specific PPPoE packets from controlled customer premises equipment (CPE). A successful exploit could allow the attacker to cause the PPPoE process to continually restart, resulting in a denial of service condition (DoS).Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-391",
"description": "Unchecked Error Condition",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T15:31:20.913Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-bng-Gmg5Gxt",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt"
}
],
"source": {
"advisory": "cisco-sa-iosxr-bng-Gmg5Gxt",
"defects": [
"CSCwa57311"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Broadband Network Gateway PPPoE Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2022-20849",
"datePublished": "2024-11-15T15:31:20.913Z",
"dateReserved": "2021-11-02T13:28:29.180Z",
"dateUpdated": "2024-11-15T15:46:25.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20304 (GCVE-0-2024-20304)
Vulnerability from cvelistv5
Published
2024-09-11 16:39
Modified
2024-09-11 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Summary
A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device.
This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition.
Note: This vulnerability can be exploited using IPv4 or IPv6.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.8.1 Version: 7.8.12 Version: 7.7.1 Version: 7.7.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xr",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20304",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-11T20:05:37.476896Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T20:11:14.196Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device.\r\n\r\nThis vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition.\r\nNote: This vulnerability can be exploited using IPv4 or IPv6."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-401",
"description": "Missing Release of Memory after Effective Lifetime",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T16:39:54.503Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-pak-mem-exhst-3ke9FeFy",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pak-mem-exhst-3ke9FeFy"
}
],
"source": {
"advisory": "cisco-sa-pak-mem-exhst-3ke9FeFy",
"defects": [
"CSCwk63828"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Packet Memory Exhaustion Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20304",
"datePublished": "2024-09-11T16:39:54.503Z",
"dateReserved": "2023-11-08T15:08:07.630Z",
"dateUpdated": "2024-09-11T20:11:14.196Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20489 (GCVE-0-2024-20489)
Vulnerability from cvelistv5
Published
2024-09-11 16:39
Modified
2024-09-11 20:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Unprotected Storage of Credentials
Summary
A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials.
This vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 24.1.1 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xr",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20489",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-11T20:04:09.480088Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T20:12:26.719Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials.\r\n\r\nThis vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-256",
"description": "Unprotected Storage of Credentials",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T16:39:06.449Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-ponctlr-ci-OHcHmsFL",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL"
}
],
"source": {
"advisory": "cisco-sa-iosxr-ponctlr-ci-OHcHmsFL",
"defects": [
"CSCwi81017"
],
"discovery": "INTERNAL"
},
"title": "Cisco Routed Passive Optical Network Cleartext Password Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20489",
"datePublished": "2024-09-11T16:39:06.449Z",
"dateReserved": "2023-11-08T15:08:07.685Z",
"dateUpdated": "2024-09-11T20:12:26.719Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20483 (GCVE-0-2024-20483)
Vulnerability from cvelistv5
Published
2024-09-11 16:38
Modified
2024-09-20 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root.
These vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input as the argument of an affected configuration command. A successful exploit could allow the attacker to execute arbitrary commands as root on the PON controller.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 24.1.1 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 Version: 24.3.1 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xr",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20483",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-19T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-20T03:55:21.862Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
},
{
"status": "affected",
"version": "24.3.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root.\r\n\r\nThese vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input as the argument of an affected configuration command. A successful exploit could allow the attacker to execute arbitrary commands as root on the PON controller."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T16:38:57.862Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-iosxr-ponctlr-ci-OHcHmsFL",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL"
}
],
"source": {
"advisory": "cisco-sa-iosxr-ponctlr-ci-OHcHmsFL",
"defects": [
"CSCwi81011"
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XR PON Controller Command Injection Vulnerabilities"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20483",
"datePublished": "2024-09-11T16:38:57.862Z",
"dateReserved": "2023-11-08T15:08:07.684Z",
"dateUpdated": "2024-09-20T03:55:21.862Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20406 (GCVE-0-2024-20406)
Vulnerability from cvelistv5
Published
2024-09-11 16:38
Modified
2024-09-11 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in the segment routing feature for the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending specific IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process on all affected devices that are participating in the Flexible Algorithm to crash and restart, resulting in a DoS condition.
Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency. This vulnerability affects segment routing for IS-IS over IPv4 and IPv6 control planes as well as devices that are configured as level 1, level 2, or multi-level routing IS-IS type.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 7.4.1 Version: 6.8.1 Version: 7.4.15 Version: 7.5.1 Version: 7.4.16 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.7.1 Version: 6.8.2 Version: 7.4.2 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 7.6.3 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20406",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-11T20:38:32.503942Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T20:38:41.758Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "7.6.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the segment routing feature for the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending specific IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process on all affected devices that are participating in the Flexible Algorithm to crash and restart, resulting in a DoS condition.\r\nNote: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency. This vulnerability affects segment routing for IS-IS over IPv4 and IPv6 control planes as well as devices that are configured as level 1, level 2, or multi-level routing IS-IS type."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T16:38:50.133Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-isis-xehpbVNe",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-xehpbVNe"
}
],
"source": {
"advisory": "cisco-sa-isis-xehpbVNe",
"defects": [
"CSCwi39542"
],
"discovery": "EXTERNAL"
},
"title": "Cisco IOS XR Software Intermediate System-to-Intermediate System Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20406",
"datePublished": "2024-09-11T16:38:50.133Z",
"dateReserved": "2023-11-08T15:08:07.661Z",
"dateUpdated": "2024-09-11T20:38:41.758Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-20381 (GCVE-0-2024-20381)
Vulnerability from cvelistv5
Published
2024-09-11 16:38
Modified
2024-09-27 13:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.
This vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system.
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco IOS XR Software |
Version: 6.5.3 Version: 6.5.29 Version: 6.5.1 Version: 6.6.1 Version: 6.5.2 Version: 6.5.92 Version: 6.5.15 Version: 6.6.2 Version: 7.0.1 Version: 6.6.25 Version: 6.5.26 Version: 6.6.11 Version: 6.5.25 Version: 6.5.28 Version: 6.5.93 Version: 6.6.12 Version: 6.5.90 Version: 7.0.0 Version: 7.1.1 Version: 7.0.90 Version: 6.6.3 Version: 6.7.1 Version: 7.0.2 Version: 7.1.15 Version: 7.2.0 Version: 7.2.1 Version: 7.1.2 Version: 6.7.2 Version: 7.0.11 Version: 7.0.12 Version: 7.0.14 Version: 7.1.25 Version: 6.6.4 Version: 7.2.12 Version: 7.3.1 Version: 7.1.3 Version: 6.7.3 Version: 7.4.1 Version: 7.2.2 Version: 6.7.4 Version: 6.5.31 Version: 7.3.15 Version: 7.3.16 Version: 6.8.1 Version: 7.4.15 Version: 6.5.32 Version: 7.3.2 Version: 7.5.1 Version: 7.4.16 Version: 7.3.27 Version: 7.6.1 Version: 7.5.2 Version: 7.8.1 Version: 7.6.15 Version: 7.5.12 Version: 7.8.12 Version: 7.3.3 Version: 7.7.1 Version: 6.8.2 Version: 7.3.4 Version: 7.4.2 Version: 6.7.35 Version: 6.9.1 Version: 7.6.2 Version: 7.5.3 Version: 7.7.2 Version: 6.9.2 Version: 7.9.1 Version: 7.10.1 Version: 7.8.2 Version: 7.5.4 Version: 6.5.33 Version: 7.8.22 Version: 7.7.21 Version: 7.9.2 Version: 7.3.5 Version: 7.5.5 Version: 7.11.1 Version: 7.9.21 Version: 7.10.2 Version: 24.1.1 Version: 7.6.3 Version: 7.3.6 Version: 7.5.52 Version: 7.11.2 Version: 24.2.1 Version: 24.1.2 Version: 24.2.11 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "network_services_orchestrator",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "5.4.1"
},
{
"status": "affected",
"version": "5.3.1"
}
]
},
{
"cpes": [
"cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "small_business_rv_series_router_firmware",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "1.0.01.17"
},
{
"status": "affected",
"version": "1.0.03.17"
}
]
},
{
"cpes": [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ios_xr",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20381",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-27T03:55:16.289362Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T13:58:21.912Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco IOS XR Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "6.5.3"
},
{
"status": "affected",
"version": "6.5.29"
},
{
"status": "affected",
"version": "6.5.1"
},
{
"status": "affected",
"version": "6.6.1"
},
{
"status": "affected",
"version": "6.5.2"
},
{
"status": "affected",
"version": "6.5.92"
},
{
"status": "affected",
"version": "6.5.15"
},
{
"status": "affected",
"version": "6.6.2"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "6.6.25"
},
{
"status": "affected",
"version": "6.5.26"
},
{
"status": "affected",
"version": "6.6.11"
},
{
"status": "affected",
"version": "6.5.25"
},
{
"status": "affected",
"version": "6.5.28"
},
{
"status": "affected",
"version": "6.5.93"
},
{
"status": "affected",
"version": "6.6.12"
},
{
"status": "affected",
"version": "6.5.90"
},
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.1.1"
},
{
"status": "affected",
"version": "7.0.90"
},
{
"status": "affected",
"version": "6.6.3"
},
{
"status": "affected",
"version": "6.7.1"
},
{
"status": "affected",
"version": "7.0.2"
},
{
"status": "affected",
"version": "7.1.15"
},
{
"status": "affected",
"version": "7.2.0"
},
{
"status": "affected",
"version": "7.2.1"
},
{
"status": "affected",
"version": "7.1.2"
},
{
"status": "affected",
"version": "6.7.2"
},
{
"status": "affected",
"version": "7.0.11"
},
{
"status": "affected",
"version": "7.0.12"
},
{
"status": "affected",
"version": "7.0.14"
},
{
"status": "affected",
"version": "7.1.25"
},
{
"status": "affected",
"version": "6.6.4"
},
{
"status": "affected",
"version": "7.2.12"
},
{
"status": "affected",
"version": "7.3.1"
},
{
"status": "affected",
"version": "7.1.3"
},
{
"status": "affected",
"version": "6.7.3"
},
{
"status": "affected",
"version": "7.4.1"
},
{
"status": "affected",
"version": "7.2.2"
},
{
"status": "affected",
"version": "6.7.4"
},
{
"status": "affected",
"version": "6.5.31"
},
{
"status": "affected",
"version": "7.3.15"
},
{
"status": "affected",
"version": "7.3.16"
},
{
"status": "affected",
"version": "6.8.1"
},
{
"status": "affected",
"version": "7.4.15"
},
{
"status": "affected",
"version": "6.5.32"
},
{
"status": "affected",
"version": "7.3.2"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.4.16"
},
{
"status": "affected",
"version": "7.3.27"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.8.1"
},
{
"status": "affected",
"version": "7.6.15"
},
{
"status": "affected",
"version": "7.5.12"
},
{
"status": "affected",
"version": "7.8.12"
},
{
"status": "affected",
"version": "7.3.3"
},
{
"status": "affected",
"version": "7.7.1"
},
{
"status": "affected",
"version": "6.8.2"
},
{
"status": "affected",
"version": "7.3.4"
},
{
"status": "affected",
"version": "7.4.2"
},
{
"status": "affected",
"version": "6.7.35"
},
{
"status": "affected",
"version": "6.9.1"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.7.2"
},
{
"status": "affected",
"version": "6.9.2"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.8.2"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "6.5.33"
},
{
"status": "affected",
"version": "7.8.22"
},
{
"status": "affected",
"version": "7.7.21"
},
{
"status": "affected",
"version": "7.9.2"
},
{
"status": "affected",
"version": "7.3.5"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.11.1"
},
{
"status": "affected",
"version": "7.9.21"
},
{
"status": "affected",
"version": "7.10.2"
},
{
"status": "affected",
"version": "24.1.1"
},
{
"status": "affected",
"version": "7.6.3"
},
{
"status": "affected",
"version": "7.3.6"
},
{
"status": "affected",
"version": "7.5.52"
},
{
"status": "affected",
"version": "7.11.2"
},
{
"status": "affected",
"version": "24.2.1"
},
{
"status": "affected",
"version": "24.1.2"
},
{
"status": "affected",
"version": "24.2.11"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Network Services Orchestrator",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "5.4.1"
},
{
"status": "affected",
"version": "5.3.1"
},
{
"status": "affected",
"version": "4.4.1"
},
{
"status": "affected",
"version": "5.2.1.1"
},
{
"status": "affected",
"version": "5.4.0.1"
},
{
"status": "affected",
"version": "4.7.1"
},
{
"status": "affected",
"version": "5.2.0.3"
},
{
"status": "affected",
"version": "5.2.1"
},
{
"status": "affected",
"version": "5.1.2"
},
{
"status": "affected",
"version": "5.4"
},
{
"status": "affected",
"version": "4.5.1"
},
{
"status": "affected",
"version": "5.4.0.2"
},
{
"status": "affected",
"version": "4.7.3"
},
{
"status": "affected",
"version": "5.2.0.4"
},
{
"status": "affected",
"version": "5.1.1.1"
},
{
"status": "affected",
"version": "5.1.1.3"
},
{
"status": "affected",
"version": "5.2.3.2"
},
{
"status": "affected",
"version": "5.4.1.1"
},
{
"status": "affected",
"version": "5.5"
},
{
"status": "affected",
"version": "5.4.2"
},
{
"status": "affected",
"version": "5.5.1"
},
{
"status": "affected",
"version": "5.4.3"
},
{
"status": "affected",
"version": "5.4.3.1"
},
{
"status": "affected",
"version": "5.5.2"
},
{
"status": "affected",
"version": "5.3.4.3"
},
{
"status": "affected",
"version": "5.5.2.1"
},
{
"status": "affected",
"version": "5.5.2.2"
},
{
"status": "affected",
"version": "5.4.3.2"
},
{
"status": "affected",
"version": "5.5.2.3"
},
{
"status": "affected",
"version": "5.4.4"
},
{
"status": "affected",
"version": "5.4.4.1"
},
{
"status": "affected",
"version": "5.5.2.4"
},
{
"status": "affected",
"version": "5.5.2.5"
},
{
"status": "affected",
"version": "5.5.2.6"
},
{
"status": "affected",
"version": "5.4.4.2"
},
{
"status": "affected",
"version": "5.4.3.3"
},
{
"status": "affected",
"version": "5.5.2.7"
},
{
"status": "affected",
"version": "5.5.2.8"
},
{
"status": "affected",
"version": "5.4.3.4"
},
{
"status": "affected",
"version": "5.4.4.3"
},
{
"status": "affected",
"version": "5.6"
},
{
"status": "affected",
"version": "5.5.2.9"
},
{
"status": "affected",
"version": "5.5.3"
},
{
"status": "affected",
"version": "5.5.2.10"
},
{
"status": "affected",
"version": "5.6.1"
},
{
"status": "affected",
"version": "5.5.2.11"
},
{
"status": "affected",
"version": "5.6.2"
},
{
"status": "affected",
"version": "5.5.3.1"
},
{
"status": "affected",
"version": "5.4.5"
},
{
"status": "affected",
"version": "5.4.5.1"
},
{
"status": "affected",
"version": "5.5.4"
},
{
"status": "affected",
"version": "5.6.3"
},
{
"status": "affected",
"version": "5.5.4.1"
},
{
"status": "affected",
"version": "5.7"
},
{
"status": "affected",
"version": "5.5.2.12"
},
{
"status": "affected",
"version": "5.4.2.1"
},
{
"status": "affected",
"version": "5.6.3.1"
},
{
"status": "affected",
"version": "5.4.5.2"
},
{
"status": "affected",
"version": "5.7.1"
},
{
"status": "affected",
"version": "5.7.1.1"
},
{
"status": "affected",
"version": "5.6.4"
},
{
"status": "affected",
"version": "5.4.2.2"
},
{
"status": "affected",
"version": "5.4.6"
},
{
"status": "affected",
"version": "5.7.2"
},
{
"status": "affected",
"version": "5.7.2.1"
},
{
"status": "affected",
"version": "5.6.5"
},
{
"status": "affected",
"version": "5.5.5"
},
{
"status": "affected",
"version": "5.7.3"
},
{
"status": "affected",
"version": "5.8"
},
{
"status": "affected",
"version": "5.6.6.1"
},
{
"status": "affected",
"version": "5.7.5.1"
},
{
"status": "affected",
"version": "5.6.7.1"
},
{
"status": "affected",
"version": "5.6.7"
},
{
"status": "affected",
"version": "5.5.6.1"
},
{
"status": "affected",
"version": "5.8.1"
},
{
"status": "affected",
"version": "5.6.6"
},
{
"status": "affected",
"version": "5.4.7"
},
{
"status": "affected",
"version": "5.8.2.1"
},
{
"status": "affected",
"version": "5.7.5"
},
{
"status": "affected",
"version": "5.7.4"
},
{
"status": "affected",
"version": "5.8.2"
},
{
"status": "affected",
"version": "5.5.6"
},
{
"status": "affected",
"version": "5.6.7.2"
},
{
"status": "affected",
"version": "5.7.6"
},
{
"status": "affected",
"version": "5.7.6.1"
},
{
"status": "affected",
"version": "5.8.3"
},
{
"status": "affected",
"version": "5.6.8"
},
{
"status": "affected",
"version": "5.7.6.2"
},
{
"status": "affected",
"version": "5.8.4"
},
{
"status": "affected",
"version": "5.5.7"
},
{
"status": "affected",
"version": "5.7.7"
},
{
"status": "affected",
"version": "5.6.9"
},
{
"status": "affected",
"version": "5.6.8.1"
},
{
"status": "affected",
"version": "5.8.5"
},
{
"status": "affected",
"version": "5.5.8"
},
{
"status": "affected",
"version": "5.7.8"
},
{
"status": "affected",
"version": "5.4.7.1"
},
{
"status": "affected",
"version": "6.0"
},
{
"status": "affected",
"version": "5.7.8.1"
},
{
"status": "affected",
"version": "6.0.1"
},
{
"status": "affected",
"version": "5.6.10"
},
{
"status": "affected",
"version": "5.8.6"
},
{
"status": "affected",
"version": "6.0.1.1"
},
{
"status": "affected",
"version": "6.0.2"
},
{
"status": "affected",
"version": "5.7.9"
},
{
"status": "affected",
"version": "5.5.9"
},
{
"status": "affected",
"version": "5.6.11"
},
{
"status": "affected",
"version": "5.8.7"
},
{
"status": "affected",
"version": "6.0.3"
},
{
"status": "affected",
"version": "5.7.10"
},
{
"status": "affected",
"version": "5.6.12"
},
{
"status": "affected",
"version": "5.8.8"
},
{
"status": "affected",
"version": "6.0.4"
},
{
"status": "affected",
"version": "5.5.10"
},
{
"status": "affected",
"version": "5.7.10.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.7.6.3"
},
{
"status": "affected",
"version": "5.7.11"
},
{
"status": "affected",
"version": "6.0.5"
},
{
"status": "affected",
"version": "5.6.13"
},
{
"status": "affected",
"version": "5.8.9"
},
{
"status": "affected",
"version": "6.1.1"
},
{
"status": "affected",
"version": "5.7.10.2"
},
{
"status": "affected",
"version": "6.0.6"
},
{
"status": "affected",
"version": "5.7.12"
},
{
"status": "affected",
"version": "6.1.2"
},
{
"status": "affected",
"version": "5.6.14"
},
{
"status": "affected",
"version": "6.1.2.1"
},
{
"status": "affected",
"version": "5.8.10"
},
{
"status": "affected",
"version": "6.0.7"
},
{
"status": "affected",
"version": "6.1.3"
},
{
"status": "affected",
"version": "5.7.13"
},
{
"status": "affected",
"version": "5.8.11"
},
{
"status": "affected",
"version": "6.1.3.1"
},
{
"status": "affected",
"version": "6.0.8"
},
{
"status": "affected",
"version": "6.1.4"
},
{
"status": "affected",
"version": "5.6.14.1"
},
{
"status": "affected",
"version": "5.8.12"
},
{
"status": "affected",
"version": "6.0.9"
},
{
"status": "affected",
"version": "6.1.5"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "5.8.13"
},
{
"status": "affected",
"version": "5.7.14"
},
{
"status": "affected",
"version": "6.0.10"
},
{
"status": "affected",
"version": "6.1.6"
},
{
"status": "affected",
"version": "6.1.6.1"
},
{
"status": "affected",
"version": "6.0.11"
},
{
"status": "affected",
"version": "6.1.7"
},
{
"status": "affected",
"version": "6.2.2"
},
{
"status": "affected",
"version": "5.7.15"
},
{
"status": "affected",
"version": "6.1.3.2"
},
{
"status": "affected",
"version": "6.1.7.1"
},
{
"status": "affected",
"version": "6.0.12"
},
{
"status": "affected",
"version": "6.1.8"
},
{
"status": "affected",
"version": "5.7.9.1"
},
{
"status": "affected",
"version": "5.7.15.1"
},
{
"status": "affected",
"version": "6.1.10"
},
{
"status": "affected",
"version": "6.1.11"
},
{
"status": "affected",
"version": "5.1.4.3"
},
{
"status": "affected",
"version": "6.1.11.1"
},
{
"status": "affected",
"version": "6.1.11.2"
},
{
"status": "affected",
"version": "5.7.17"
},
{
"status": "affected",
"version": "6.1.12"
}
]
},
{
"defaultStatus": "unknown",
"product": "Cisco Small Business RV Series Router Firmware",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "1.0.01.17"
},
{
"status": "affected",
"version": "1.0.03.17"
},
{
"status": "affected",
"version": "1.0.01.16"
},
{
"status": "affected",
"version": "1.0.01.18"
},
{
"status": "affected",
"version": "1.0.00.29"
},
{
"status": "affected",
"version": "1.0.03.16"
},
{
"status": "affected",
"version": "1.0.03.15"
},
{
"status": "affected",
"version": "1.0.02.16"
},
{
"status": "affected",
"version": "1.0.01.20"
},
{
"status": "affected",
"version": "1.0.00.33"
},
{
"status": "affected",
"version": "1.0.03.18"
},
{
"status": "affected",
"version": "1.0.03.19"
},
{
"status": "affected",
"version": "1.0.03.20"
},
{
"status": "affected",
"version": "1.0.03.21"
},
{
"status": "affected",
"version": "1.0.03.22"
},
{
"status": "affected",
"version": "1.0.03.24"
},
{
"status": "affected",
"version": "1.0.03.26"
},
{
"status": "affected",
"version": "1.0.03.27"
},
{
"status": "affected",
"version": "1.0.03.28"
},
{
"status": "affected",
"version": "1.0.03.29"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\u0026nbsp;\r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "Improper Authorization",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-25T16:24:52.271Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-nso-auth-bypass-QnTEesp",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp"
}
],
"source": {
"advisory": "cisco-sa-nso-auth-bypass-QnTEesp",
"defects": [
"CSCwj26769"
],
"discovery": "INTERNAL"
},
"title": "Cisco Network Services Orchestrator Configuration Update Authorization Bypass Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20381",
"datePublished": "2024-09-11T16:38:42.096Z",
"dateReserved": "2023-11-08T15:08:07.656Z",
"dateUpdated": "2024-09-27T13:58:21.912Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}