CVE-2024-20350
Vulnerability from cvelistv5
Published
2024-09-25 16:19
Modified
2024-09-27 03:55
Summary
Cisco Catalyst Center Static SSH Host Key Vulnerability
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:cisco:digital_network_architecture_center:1.4.0.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.1.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.1.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.4:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.5:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.1.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.6:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.1:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.7:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.1.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.4:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.5:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.7:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.6:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.8:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.4:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.8:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.1:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.1-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.1-airgap-ca:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.5:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.1-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.1:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.3-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.6:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.9:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.0-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.3-airgap-ca:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4-hf1:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.5:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.5-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.0-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.3-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.0-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.0-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.6.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6-70045-hf1:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-72328-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-72323:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-72328-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.3-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.3-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.6.0-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0-va:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.4:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.4-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.4-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.3:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.3-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.3-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.4:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.4-airgap:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.4-airgap-mdnac:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:1.0.0.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf70:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf51:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf52:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf53:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_network_architecture_center",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "1.4.0.0"
              },
              {
                "status": "affected",
                "version": "2.1.1.0"
              },
              {
                "status": "affected",
                "version": "2.1.1.3"
              },
              {
                "status": "affected",
                "version": "2.1.2.0"
              },
              {
                "status": "affected",
                "version": "2.1.2.3"
              },
              {
                "status": "affected",
                "version": "2.1.2.4"
              },
              {
                "status": "affected",
                "version": "2.1.2.5"
              },
              {
                "status": "affected",
                "version": "2.2.1.0"
              },
              {
                "status": "affected",
                "version": "2.1.2.6"
              },
              {
                "status": "affected",
                "version": "2.2.2.0"
              },
              {
                "status": "affected",
                "version": "2.2.2.1"
              },
              {
                "status": "affected",
                "version": "2.2.2.3"
              },
              {
                "status": "affected",
                "version": "2.1.2.7"
              },
              {
                "status": "affected",
                "version": "2.2.1.3"
              },
              {
                "status": "affected",
                "version": "2.2.3.0"
              },
              {
                "status": "affected",
                "version": "2.2.2.4"
              },
              {
                "status": "affected",
                "version": "2.2.2.5"
              },
              {
                "status": "affected",
                "version": "2.2.3.3"
              },
              {
                "status": "affected",
                "version": "2.2.2.7"
              },
              {
                "status": "affected",
                "version": "2.2.2.6"
              },
              {
                "status": "affected",
                "version": "2.2.2.8"
              },
              {
                "status": "affected",
                "version": "2.2.3.4"
              },
              {
                "status": "affected",
                "version": "2.1.2.8"
              },
              {
                "status": "affected",
                "version": "2.3.2.1"
              },
              {
                "status": "affected",
                "version": "2.3.2.1-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.2.1-airgap-ca"
              },
              {
                "status": "affected",
                "version": "2.2.3.5"
              },
              {
                "status": "affected",
                "version": "2.3.3.0"
              },
              {
                "status": "affected",
                "version": "2.3.3.3"
              },
              {
                "status": "affected",
                "version": "2.3.3.1-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.1"
              },
              {
                "status": "affected",
                "version": "2.3.2.3"
              },
              {
                "status": "affected",
                "version": "2.3.3.3-airgap"
              },
              {
                "status": "affected",
                "version": "2.2.3.6"
              },
              {
                "status": "affected",
                "version": "2.2.2.9"
              },
              {
                "status": "affected",
                "version": "2.3.3.0-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.3-airgap-ca"
              },
              {
                "status": "affected",
                "version": "2.3.3.4"
              },
              {
                "status": "affected",
                "version": "2.3.3.4-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.4-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.3.4-hf1"
              },
              {
                "status": "affected",
                "version": "2.3.4.0"
              },
              {
                "status": "affected",
                "version": "2.3.3.5"
              },
              {
                "status": "affected",
                "version": "2.3.3.5-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.4.0-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.4.3"
              },
              {
                "status": "affected",
                "version": "2.3.4.3-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.6"
              },
              {
                "status": "affected",
                "version": "2.3.5.0"
              },
              {
                "status": "affected",
                "version": "2.3.3.6-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.5.0-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.6-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.5.0-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.3.7"
              },
              {
                "status": "affected",
                "version": "2.3.3.7-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.7-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.6.0"
              },
              {
                "status": "affected",
                "version": "2.3.3.6-70045-hf1"
              },
              {
                "status": "affected",
                "version": "2.3.3.7-72328-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.3.7-72323"
              },
              {
                "status": "affected",
                "version": "2.3.3.7-72328-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.5.3"
              },
              {
                "status": "affected",
                "version": "2.3.5.3-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.5.3-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.6.0-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.7.0"
              },
              {
                "status": "affected",
                "version": "2.3.7.0-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.7.0-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.7.0-va"
              },
              {
                "status": "affected",
                "version": "2.3.5.4"
              },
              {
                "status": "affected",
                "version": "2.3.5.4-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.5.4-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.7.3"
              },
              {
                "status": "affected",
                "version": "2.3.7.3-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.7.3-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.5.5-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.5.5"
              },
              {
                "status": "affected",
                "version": "2.3.5.5-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "2.3.7.4"
              },
              {
                "status": "affected",
                "version": "2.3.7.4-airgap"
              },
              {
                "status": "affected",
                "version": "2.3.7.4-airgap-mdnac"
              },
              {
                "status": "affected",
                "version": "1.0.0.0"
              },
              {
                "status": "affected",
                "version": "2.3.5.5-70026-hf70"
              },
              {
                "status": "affected",
                "version": "2.3.5.5-70026-hf51"
              },
              {
                "status": "affected",
                "version": "2.3.5.5-70026-hf52"
              },
              {
                "status": "affected",
                "version": "2.3.5.5-70026-hf53"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20350",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-26T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-27T03:55:13.779Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Digital Network Architecture Center (DNA Center)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "1.4.0.0"
            },
            {
              "status": "affected",
              "version": "2.1.1.0"
            },
            {
              "status": "affected",
              "version": "2.1.1.3"
            },
            {
              "status": "affected",
              "version": "2.1.2.0"
            },
            {
              "status": "affected",
              "version": "2.1.2.3"
            },
            {
              "status": "affected",
              "version": "2.1.2.4"
            },
            {
              "status": "affected",
              "version": "2.1.2.5"
            },
            {
              "status": "affected",
              "version": "2.2.1.0"
            },
            {
              "status": "affected",
              "version": "2.1.2.6"
            },
            {
              "status": "affected",
              "version": "2.2.2.0"
            },
            {
              "status": "affected",
              "version": "2.2.2.1"
            },
            {
              "status": "affected",
              "version": "2.2.2.3"
            },
            {
              "status": "affected",
              "version": "2.1.2.7"
            },
            {
              "status": "affected",
              "version": "2.2.1.3"
            },
            {
              "status": "affected",
              "version": "2.2.3.0"
            },
            {
              "status": "affected",
              "version": "2.2.2.4"
            },
            {
              "status": "affected",
              "version": "2.2.2.5"
            },
            {
              "status": "affected",
              "version": "2.2.3.3"
            },
            {
              "status": "affected",
              "version": "2.2.2.7"
            },
            {
              "status": "affected",
              "version": "2.2.2.6"
            },
            {
              "status": "affected",
              "version": "2.2.2.8"
            },
            {
              "status": "affected",
              "version": "2.2.3.4"
            },
            {
              "status": "affected",
              "version": "2.1.2.8"
            },
            {
              "status": "affected",
              "version": "2.3.2.1"
            },
            {
              "status": "affected",
              "version": "2.3.2.1-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.2.1-AIRGAP-CA"
            },
            {
              "status": "affected",
              "version": "2.2.3.5"
            },
            {
              "status": "affected",
              "version": "2.3.3.0"
            },
            {
              "status": "affected",
              "version": "2.3.3.3"
            },
            {
              "status": "affected",
              "version": "2.3.3.1-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.1"
            },
            {
              "status": "affected",
              "version": "2.3.2.3"
            },
            {
              "status": "affected",
              "version": "2.3.3.3-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.2.3.6"
            },
            {
              "status": "affected",
              "version": "2.2.2.9"
            },
            {
              "status": "affected",
              "version": "2.3.3.0-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.3-AIRGAP-CA"
            },
            {
              "status": "affected",
              "version": "2.3.3.4"
            },
            {
              "status": "affected",
              "version": "2.3.3.4-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.4-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.3.4-HF1"
            },
            {
              "status": "affected",
              "version": "2.3.4.0"
            },
            {
              "status": "affected",
              "version": "2.3.3.5"
            },
            {
              "status": "affected",
              "version": "2.3.3.5-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.4.0-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.4.3"
            },
            {
              "status": "affected",
              "version": "2.3.4.3-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.6"
            },
            {
              "status": "affected",
              "version": "2.3.5.0"
            },
            {
              "status": "affected",
              "version": "2.3.3.6-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.5.0-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.6-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.5.0-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.3.7"
            },
            {
              "status": "affected",
              "version": "2.3.3.7-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.7-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.6.0"
            },
            {
              "status": "affected",
              "version": "2.3.3.6-70045-HF1"
            },
            {
              "status": "affected",
              "version": "2.3.3.7-72328-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.3.7-72323"
            },
            {
              "status": "affected",
              "version": "2.3.3.7-72328-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.5.3"
            },
            {
              "status": "affected",
              "version": "2.3.5.3-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.5.3-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.6.0-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.7.0"
            },
            {
              "status": "affected",
              "version": "2.3.7.0-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.7.0-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.7.0-VA"
            },
            {
              "status": "affected",
              "version": "2.3.5.4"
            },
            {
              "status": "affected",
              "version": "2.3.5.4-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.5.4-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.7.3"
            },
            {
              "status": "affected",
              "version": "2.3.7.3-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.7.3-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.5.5-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.5.5"
            },
            {
              "status": "affected",
              "version": "2.3.5.5-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "2.3.7.4"
            },
            {
              "status": "affected",
              "version": "2.3.7.4-AIRGAP"
            },
            {
              "status": "affected",
              "version": "2.3.7.4-AIRGAP-MDNAC"
            },
            {
              "status": "affected",
              "version": "1.0.0.0"
            },
            {
              "status": "affected",
              "version": "2.3.5.5-70026-HF70"
            },
            {
              "status": "affected",
              "version": "2.3.5.5-70026-HF51"
            },
            {
              "status": "affected",
              "version": "2.3.5.5-70026-HF52"
            },
            {
              "status": "affected",
              "version": "2.3.5.5-70026-HF53"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\r\n\r\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-321",
              "description": "Use of Hard-coded Cryptographic Key",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-25T16:19:15.162Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-dnac-ssh-e4uOdASj",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj"
        }
      ],
      "source": {
        "advisory": "cisco-sa-dnac-ssh-e4uOdASj",
        "defects": [
          "CSCwi40467"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Catalyst Center Static SSH Host Key Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20350",
    "datePublished": "2024-09-25T16:19:15.162Z",
    "dateReserved": "2023-11-08T15:08:07.646Z",
    "dateUpdated": "2024-09-27T03:55:13.779Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-20350\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-09-25T17:15:15.000\",\"lastModified\":\"2025-07-30T16:08:54.540\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\\r\\n\\r\\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el servidor SSH de Cisco Catalyst Center, anteriormente Cisco DNA Center, podr\u00eda permitir que un atacante remoto no autenticado se haga pasar por un dispositivo Cisco Catalyst Center. Esta vulnerabilidad se debe a la presencia de una clave de host SSH est\u00e1tica. Un atacante podr\u00eda aprovechar esta vulnerabilidad realizando un ataque de tipo m\u00e1quina intermedia en las conexiones SSH, lo que podr\u00eda permitir al atacante interceptar el tr\u00e1fico entre los clientes SSH y un dispositivo Cisco Catalyst Center. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacerse pasar por el dispositivo afectado, inyectar comandos en la sesi\u00f3n de terminal y robar credenciales de usuario v\u00e1lidas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-321\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE85EC8B-8F95-4D16-A99A-B5BF21AAA2BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:1.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E8C372-6C4C-4E4B-8882-045BBD38E428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30381FB2-1AA0-4D59-9A4C-82C53376B3B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC7F470-054B-43E6-8B3A-0553E520CFBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C7C39F-E6DA-42E3-932C-2DAEEC0FD1F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B1E9FAE-2769-47C0-A15A-6EAFA33D2F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"412B8010-83BA-469D-8F82-EA7EB0F0733B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB83C74-8D66-46D5-980B-ADB3B43EF4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07AACA6-A0B7-411D-96A5-1B33844AB464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12512A8E-0294-4810-9B12-393DC0E3FEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8205598B-8A18-4334-B7AA-8984FE343F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39DFED3A-70E2-4EA7-A1EF-2213A31BD58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE272E6-A054-4F39-B354-0381E73622B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC183929-918E-445F-929C-1C02B8781538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"475C27B1-C740-4A8F-80D6-93D66E16EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FEE2C67-7D11-466B-BE94-1B656940BD49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02431720-D4FC-4074-8EB9-BAD9E6D83905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"671B8897-2AD2-4799-A728-9B25DCF2BC9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C84825-B16C-4CAB-8308-939DE9D471B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F26C092A-12F2-4670-98F7-F7CC50A2A75B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C616589C-BCC5-4803-BFD2-D53649ACB994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC28749F-6CEE-4C6B-A382-B3525B15D37D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D046C9E-6DC7-497B-B0D1-5E9703818474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"410E9FD8-06C4-4FC4-B1DD-6068DE85A773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB6FFCE-5605-4CAD-9593-F549C34D1461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62467B6-229E-4909-8F09-E066AA7F8A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC0A39D0-7648-4F41-BD72-2BF47DC73CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E390EAB-12F5-4E53-AAE0-0D59CBA3FF6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.1-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0BB980C-C298-4B9D-81D1-44C5E9672A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.1-airgap-ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FE84595-E140-4CBD-8E1F-D246F2366BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246E7876-AA00-432F-B1FD-DC7CCBDFF35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D6DDEF-6F1F-4B08-8AF7-7568F7F22005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF90F9A-8969-44CE-B448-C93CC883749B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD896C8-C023-419E-9C7F-4FE961D34E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.1-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6390F5F-A064-456D-88A8-8D9AC09F5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE81455-F2D1-4A8E-A92F-86DF3B06C743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6593A2FB-375A-4AB6-B29B-5EA0B2ED7753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.3-airgap-ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C6A830-3CAE-4C8A-9F90-3E07625A8D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"129B0CC5-1300-4E86-9219-E405E2B106B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4:hotfix1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFB4136-C74F-492F-AA19-F7F99167CA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07A16861-1F5C-4D05-AF35-44A2E5349444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CE21F1-555E-4E4B-A834-7848816BDFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B64552-856E-4E23-A19B-DC56A64CA773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.5-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5586EC13-BF29-4E60-B6DB-D80770784237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBF60C4-96EC-438F-BCDB-DE627E403FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6-70045:hotfix1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6419BDFE-CC6E-4909-93BB-F3D80AE7BB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24EF7E9-1903-4D4B-A1B1-D9D6F6D483BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9331B0-BB75-44B5-8FCE-413DC5FB9D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CE78F01-EB7E-416D-9E37-BD7A44C9ADB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-72323:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622F9B5F-157E-4633-A2AE-82C571CF77CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-72328-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C9096F-3AAF-4C42-BEBE-A455E2B65008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-72328-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"388AFA5E-CAAE-4F83-90D2-1D82E0B967AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9A899CD-44A2-430B-B981-CABA0708FFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B5A02F-8DC3-40B9-9C27-DD6DBB9121A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80114D6D-ADCA-48F6-B22E-1D5FBDB9BA68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5285200-FA02-4F4D-8F23-997ED6DE3E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4E796D-8487-443D-A276-E85A8A9FAF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDE02CC9-F585-4A0D-B7F2-C30C2198CEF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C5AF23-41DC-4C33-BF41-CABA4B50D997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D0CC6C-CF41-47C8-8C93-3C96E57A9A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.0-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298A4F68-FCE4-4A6A-BF56-4CF913DA9F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1418C9-A4E8-40E7-AD72-0F10F0439412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BD1C910-CA57-4B84-A36F-ED5D764865DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.3-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5066DD-C764-45BE-99F1-2F16BFF27243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9955454-ED62-4C8C-A968-69C7EBDAED30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.4-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677D1D7F-D930-4FA8-8113-DC3E2A392E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.4-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BCFB1D-915B-4406-8D17-CAB639CF949D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F9DD001-C5D9-4D2B-ADEA-A5EF76A53DDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix51:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDB28B8-3B28-47FF-9640-C7A7CC929914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix52:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F37A61B-A8D4-4441-B093-E8A2B6384F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix53:*:*:*:*:*:*\",\"matchCriteriaId\":\"697E1FB9-35F4-452F-A6FF-B1CF292936E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix70:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8DCEED3-50CB-4CF8-B7A7-7D606B091E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F0AE74D-6E64-4C12-A77F-83737A5D179F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0FA75EA-B731-4CF8-AA9B-1302693966AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E7E8E9D-DD50-4084-B6D4-4B84872546F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.6.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9B98FA-95E5-4BB7-86D6-0E21D6D5D51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5008264-1A35-4FDF-958A-D72002688A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546F959A-2A63-4B50-9F6C-8381B00232E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCD2D31-80E3-484A-9926-5A1AAD7DD2FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0-va:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C650869-7523-4913-9ED1-10CA069A5F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CF6A09-91F3-4F86-B5FA-F339F224C51F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D182944-46D0-47BB-9DBA-F4B6AEE9F7BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.3-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E01082-47AD-445D-A301-46C33CDBCCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78FE3B3A-BD6E-4104-B85C-B9E7E742F612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.4-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBFE7ED-990D-4D7D-B0FB-5E7ADA02571B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.4-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05B65BAF-9B19-4BB1-A3F7-83ED272BF78A\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.