Show plain JSON{"id": "CVE-2021-34767", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 7.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 7.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 2.8}]}, "published": "2021-09-23T03:15:20.180", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-ipv6-dos-NMYeCnZv", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-ipv6-dos-NMYeCnZv", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-670"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-670"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in IPv6 traffic processing of Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a Layer 2 (L2) loop in a configured VLAN, resulting in a denial of service (DoS) condition for that VLAN. The vulnerability is due to a logic error when processing specific link-local IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that would flow inbound through the wired interface of an affected device. A successful exploit could allow the attacker to cause traffic drops in the affected VLAN, thus triggering the DoS condition."}, {"lang": "es", "value": "Una vulnerabilidad en el procesamiento del tr\u00e1fico IPv6 de Cisco IOS XE Wireless Controller Software para Cisco Catalyst 9000 Family Wireless Controllers podr\u00eda permitir a un atacante adyacente no autenticado causar un bucle de capa 2 (L2) en una VLAN configurada, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS) para esa VLAN. La vulnerabilidad es debido a un error l\u00f3gico cuando se procesa tr\u00e1fico IPv6 local de enlace espec\u00edfico. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete IPv6 dise\u00f1ado que fluyera hacia adentro mediante la interfaz cableada de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar ca\u00eddas de tr\u00e1fico en la VLAN afectada, desencadenando as\u00ed una condici\u00f3n de DoS"}], "lastModified": "2024-11-21T06:11:09.273", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F73E7874-A063-4AE5-9F0A-53D590B7B99B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BF22C29-84DF-44CA-B574-FE04AB39E344"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2C7C0BA-D618-4B65-B42C-43393167EEE0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "012A6CF7-9104-4882-9C95-E6D4458AB778"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65FC3CC1-CF4F-4A2D-A500-04395AFE8B47"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "027200FC-8AD4-47E4-A404-490AE4F997EC"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89369318-2E83-489F-B872-5F2E247BBF8F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1B9ED0E5-CB20-4106-9CF2-8EB587B33543"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B0E620C-8E09-4F7C-A326-26013173B993"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF93F1C8-669F-4ECB-8D81-ECDA7B550175"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2E0BA345-B7D7-4975-9199-4DC7875BBFD0"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "78706517-83F4-4D44-A6EC-B78ADCEABAC0"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}