CVE-2024-20350
Vulnerability from cvelistv5
Published
2024-09-25 16:19
Modified
2024-09-27 03:55
Severity ?
EPSS score ?
Summary
Cisco Catalyst Center Static SSH Host Key Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Digital Network Architecture Center (DNA Center) |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:digital_network_architecture_center:1.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.1.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.1-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.1-airgap-ca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.1-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.3-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.2.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.0-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.3-airgap-ca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.4-hf1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.5-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.0-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.4.3-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.0-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.0-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.6-70045-hf1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-72328-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-72323:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.3.7-72328-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.3-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.3-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.6.0-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.0-va:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.4-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.4-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.3-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.3-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.4-airgap:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.7.4-airgap-mdnac:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:1.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf70:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf51:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf52:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:digital_network_architecture_center:2.3.5.5-70026-hf53:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "digital_network_architecture_center", "vendor": "cisco", "versions": [ { "status": "affected", "version": "1.4.0.0" }, { "status": "affected", "version": "2.1.1.0" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.2.0" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.2.4" }, { "status": "affected", "version": "2.1.2.5" }, { "status": "affected", "version": "2.2.1.0" }, { "status": "affected", "version": "2.1.2.6" }, { "status": "affected", "version": "2.2.2.0" }, { "status": "affected", "version": "2.2.2.1" }, { "status": "affected", "version": "2.2.2.3" }, { "status": "affected", "version": "2.1.2.7" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.3.0" }, { "status": "affected", "version": "2.2.2.4" }, { "status": "affected", "version": "2.2.2.5" }, { "status": "affected", "version": "2.2.3.3" }, { "status": "affected", "version": "2.2.2.7" }, { "status": "affected", "version": "2.2.2.6" }, { "status": "affected", "version": "2.2.2.8" }, { "status": "affected", "version": "2.2.3.4" }, { "status": "affected", "version": "2.1.2.8" }, { "status": "affected", "version": "2.3.2.1" }, { "status": "affected", "version": "2.3.2.1-airgap" }, { "status": "affected", "version": "2.3.2.1-airgap-ca" }, { "status": "affected", "version": "2.2.3.5" }, { "status": "affected", "version": "2.3.3.0" }, { "status": "affected", "version": "2.3.3.3" }, { "status": "affected", "version": "2.3.3.1-airgap" }, { "status": "affected", "version": "2.3.3.1" }, { "status": "affected", "version": "2.3.2.3" }, { "status": "affected", "version": "2.3.3.3-airgap" }, { "status": "affected", "version": "2.2.3.6" }, { "status": "affected", "version": "2.2.2.9" }, { "status": "affected", "version": "2.3.3.0-airgap" }, { "status": "affected", "version": "2.3.3.3-airgap-ca" }, { "status": "affected", "version": "2.3.3.4" }, { "status": "affected", "version": "2.3.3.4-airgap" }, { "status": "affected", "version": "2.3.3.4-airgap-mdnac" }, { "status": "affected", "version": "2.3.3.4-hf1" }, { "status": "affected", "version": "2.3.4.0" }, { "status": "affected", "version": "2.3.3.5" }, { "status": "affected", "version": "2.3.3.5-airgap" }, { "status": "affected", "version": "2.3.4.0-airgap" }, { "status": "affected", "version": "2.3.4.3" }, { "status": "affected", "version": "2.3.4.3-airgap" }, { "status": "affected", "version": "2.3.3.6" }, { "status": "affected", "version": "2.3.5.0" }, { "status": "affected", "version": "2.3.3.6-airgap" }, { "status": "affected", "version": "2.3.5.0-airgap" }, { "status": "affected", "version": "2.3.3.6-airgap-mdnac" }, { "status": "affected", "version": "2.3.5.0-airgap-mdnac" }, { "status": "affected", "version": "2.3.3.7" }, { "status": "affected", "version": "2.3.3.7-airgap" }, { "status": "affected", "version": "2.3.3.7-airgap-mdnac" }, { "status": "affected", "version": "2.3.6.0" }, { "status": "affected", "version": "2.3.3.6-70045-hf1" }, { "status": "affected", "version": "2.3.3.7-72328-airgap" }, { "status": "affected", "version": "2.3.3.7-72323" }, { "status": "affected", "version": "2.3.3.7-72328-mdnac" }, { "status": "affected", "version": "2.3.5.3" }, { "status": "affected", "version": "2.3.5.3-airgap-mdnac" }, { "status": "affected", "version": "2.3.5.3-airgap" }, { "status": "affected", "version": "2.3.6.0-airgap" }, { "status": "affected", "version": "2.3.7.0" }, { "status": "affected", "version": "2.3.7.0-airgap" }, { "status": "affected", "version": "2.3.7.0-airgap-mdnac" }, { "status": "affected", "version": "2.3.7.0-va" }, { "status": "affected", "version": "2.3.5.4" }, { "status": "affected", "version": "2.3.5.4-airgap" }, { "status": "affected", "version": "2.3.5.4-airgap-mdnac" }, { "status": "affected", "version": "2.3.7.3" }, { "status": "affected", "version": "2.3.7.3-airgap" }, { "status": "affected", "version": "2.3.7.3-airgap-mdnac" }, { "status": "affected", "version": "2.3.5.5-airgap" }, { "status": "affected", "version": "2.3.5.5" }, { "status": "affected", "version": "2.3.5.5-airgap-mdnac" }, { "status": "affected", "version": "2.3.7.4" }, { "status": "affected", "version": "2.3.7.4-airgap" }, { "status": "affected", "version": "2.3.7.4-airgap-mdnac" }, { "status": "affected", "version": "1.0.0.0" }, { "status": "affected", "version": "2.3.5.5-70026-hf70" }, { "status": "affected", "version": "2.3.5.5-70026-hf51" }, { "status": "affected", "version": "2.3.5.5-70026-hf52" }, { "status": "affected", "version": "2.3.5.5-70026-hf53" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20350", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T03:55:13.779Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Digital Network Architecture Center (DNA Center)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.4.0.0" }, { "status": "affected", "version": "2.1.1.0" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.2.0" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.2.4" }, { "status": "affected", "version": "2.1.2.5" }, { "status": "affected", "version": "2.2.1.0" }, { "status": "affected", "version": "2.1.2.6" }, { "status": "affected", "version": "2.2.2.0" }, { "status": "affected", "version": "2.2.2.1" }, { "status": "affected", "version": "2.2.2.3" }, { "status": "affected", "version": "2.1.2.7" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.3.0" }, { "status": "affected", "version": "2.2.2.4" }, { "status": "affected", "version": "2.2.2.5" }, { "status": "affected", "version": "2.2.3.3" }, { "status": "affected", "version": "2.2.2.7" }, { "status": "affected", "version": "2.2.2.6" }, { "status": "affected", "version": "2.2.2.8" }, { "status": "affected", "version": "2.2.3.4" }, { "status": "affected", "version": "2.1.2.8" }, { "status": "affected", "version": "2.3.2.1" }, { "status": "affected", "version": "2.3.2.1-AIRGAP" }, { "status": "affected", "version": "2.3.2.1-AIRGAP-CA" }, { "status": "affected", "version": "2.2.3.5" }, { "status": "affected", "version": "2.3.3.0" }, { "status": "affected", "version": "2.3.3.3" }, { "status": "affected", "version": "2.3.3.1-AIRGAP" }, { "status": "affected", "version": "2.3.3.1" }, { "status": "affected", "version": "2.3.2.3" }, { "status": "affected", "version": "2.3.3.3-AIRGAP" }, { "status": "affected", "version": "2.2.3.6" }, { "status": "affected", "version": "2.2.2.9" }, { "status": "affected", "version": "2.3.3.0-AIRGAP" }, { "status": "affected", "version": "2.3.3.3-AIRGAP-CA" }, { "status": "affected", "version": "2.3.3.4" }, { "status": "affected", "version": "2.3.3.4-AIRGAP" }, { "status": "affected", "version": "2.3.3.4-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.3.4-HF1" }, { "status": "affected", "version": "2.3.4.0" }, { "status": "affected", "version": "2.3.3.5" }, { "status": "affected", "version": "2.3.3.5-AIRGAP" }, { "status": "affected", "version": "2.3.4.0-AIRGAP" }, { "status": "affected", "version": "2.3.4.3" }, { "status": "affected", "version": "2.3.4.3-AIRGAP" }, { "status": "affected", "version": "2.3.3.6" }, { "status": "affected", "version": "2.3.5.0" }, { "status": "affected", "version": "2.3.3.6-AIRGAP" }, { "status": "affected", "version": "2.3.5.0-AIRGAP" }, { "status": "affected", "version": "2.3.3.6-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.5.0-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.3.7" }, { "status": "affected", "version": "2.3.3.7-AIRGAP" }, { "status": "affected", "version": "2.3.3.7-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.6.0" }, { "status": "affected", "version": "2.3.3.6-70045-HF1" }, { "status": "affected", "version": "2.3.3.7-72328-AIRGAP" }, { "status": "affected", "version": "2.3.3.7-72323" }, { "status": "affected", "version": "2.3.3.7-72328-MDNAC" }, { "status": "affected", "version": "2.3.5.3" }, { "status": "affected", "version": "2.3.5.3-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.5.3-AIRGAP" }, { "status": "affected", "version": "2.3.6.0-AIRGAP" }, { "status": "affected", "version": "2.3.7.0" }, { "status": "affected", "version": "2.3.7.0-AIRGAP" }, { "status": "affected", "version": "2.3.7.0-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.7.0-VA" }, { "status": "affected", "version": "2.3.5.4" }, { "status": "affected", "version": "2.3.5.4-AIRGAP" }, { "status": "affected", "version": "2.3.5.4-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.7.3" }, { "status": "affected", "version": "2.3.7.3-AIRGAP" }, { "status": "affected", "version": "2.3.7.3-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.5.5-AIRGAP" }, { "status": "affected", "version": "2.3.5.5" }, { "status": "affected", "version": "2.3.5.5-AIRGAP-MDNAC" }, { "status": "affected", "version": "2.3.7.4" }, { "status": "affected", "version": "2.3.7.4-AIRGAP" }, { "status": "affected", "version": "2.3.7.4-AIRGAP-MDNAC" }, { "status": "affected", "version": "1.0.0.0" }, { "status": "affected", "version": "2.3.5.5-70026-HF70" }, { "status": "affected", "version": "2.3.5.5-70026-HF51" }, { "status": "affected", "version": "2.3.5.5-70026-HF52" }, { "status": "affected", "version": "2.3.5.5-70026-HF53" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\r\n\r\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "Use of Hard-coded Cryptographic Key", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:19:15.162Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-dnac-ssh-e4uOdASj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj" } ], "source": { "advisory": "cisco-sa-dnac-ssh-e4uOdASj", "defects": [ "CSCwi40467" ], "discovery": "INTERNAL" }, "title": "Cisco Catalyst Center Static SSH Host Key Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20350", "datePublished": "2024-09-25T16:19:15.162Z", "dateReserved": "2023-11-08T15:08:07.646Z", "dateUpdated": "2024-09-27T03:55:13.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-20350\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-09-25T17:15:15.000\",\"lastModified\":\"2025-07-30T16:08:54.540\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\\r\\n\\r\\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el servidor SSH de Cisco Catalyst Center, anteriormente Cisco DNA Center, podr\u00eda permitir que un atacante remoto no autenticado se haga pasar por un dispositivo Cisco Catalyst Center. Esta vulnerabilidad se debe a la presencia de una clave de host SSH est\u00e1tica. Un atacante podr\u00eda aprovechar esta vulnerabilidad realizando un ataque de tipo m\u00e1quina intermedia en las conexiones SSH, lo que podr\u00eda permitir al atacante interceptar el tr\u00e1fico entre los clientes SSH y un dispositivo Cisco Catalyst Center. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacerse pasar por el dispositivo afectado, inyectar comandos en la sesi\u00f3n de terminal y robar credenciales de usuario v\u00e1lidas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-321\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE85EC8B-8F95-4D16-A99A-B5BF21AAA2BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:1.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E8C372-6C4C-4E4B-8882-045BBD38E428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30381FB2-1AA0-4D59-9A4C-82C53376B3B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC7F470-054B-43E6-8B3A-0553E520CFBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C7C39F-E6DA-42E3-932C-2DAEEC0FD1F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B1E9FAE-2769-47C0-A15A-6EAFA33D2F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"412B8010-83BA-469D-8F82-EA7EB0F0733B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB83C74-8D66-46D5-980B-ADB3B43EF4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07AACA6-A0B7-411D-96A5-1B33844AB464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12512A8E-0294-4810-9B12-393DC0E3FEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8205598B-8A18-4334-B7AA-8984FE343F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39DFED3A-70E2-4EA7-A1EF-2213A31BD58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE272E6-A054-4F39-B354-0381E73622B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC183929-918E-445F-929C-1C02B8781538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"475C27B1-C740-4A8F-80D6-93D66E16EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FEE2C67-7D11-466B-BE94-1B656940BD49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02431720-D4FC-4074-8EB9-BAD9E6D83905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"671B8897-2AD2-4799-A728-9B25DCF2BC9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C84825-B16C-4CAB-8308-939DE9D471B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F26C092A-12F2-4670-98F7-F7CC50A2A75B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C616589C-BCC5-4803-BFD2-D53649ACB994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC28749F-6CEE-4C6B-A382-B3525B15D37D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D046C9E-6DC7-497B-B0D1-5E9703818474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"410E9FD8-06C4-4FC4-B1DD-6068DE85A773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB6FFCE-5605-4CAD-9593-F549C34D1461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62467B6-229E-4909-8F09-E066AA7F8A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC0A39D0-7648-4F41-BD72-2BF47DC73CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E390EAB-12F5-4E53-AAE0-0D59CBA3FF6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.1-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0BB980C-C298-4B9D-81D1-44C5E9672A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.1-airgap-ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FE84595-E140-4CBD-8E1F-D246F2366BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246E7876-AA00-432F-B1FD-DC7CCBDFF35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D6DDEF-6F1F-4B08-8AF7-7568F7F22005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF90F9A-8969-44CE-B448-C93CC883749B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD896C8-C023-419E-9C7F-4FE961D34E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.1-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6390F5F-A064-456D-88A8-8D9AC09F5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE81455-F2D1-4A8E-A92F-86DF3B06C743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6593A2FB-375A-4AB6-B29B-5EA0B2ED7753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.3-airgap-ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C6A830-3CAE-4C8A-9F90-3E07625A8D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"129B0CC5-1300-4E86-9219-E405E2B106B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4:hotfix1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFB4136-C74F-492F-AA19-F7F99167CA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07A16861-1F5C-4D05-AF35-44A2E5349444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.4-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CE21F1-555E-4E4B-A834-7848816BDFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B64552-856E-4E23-A19B-DC56A64CA773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.5-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5586EC13-BF29-4E60-B6DB-D80770784237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBF60C4-96EC-438F-BCDB-DE627E403FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6-70045:hotfix1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6419BDFE-CC6E-4909-93BB-F3D80AE7BB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24EF7E9-1903-4D4B-A1B1-D9D6F6D483BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.6-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9331B0-BB75-44B5-8FCE-413DC5FB9D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CE78F01-EB7E-416D-9E37-BD7A44C9ADB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-72323:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622F9B5F-157E-4633-A2AE-82C571CF77CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-72328-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C9096F-3AAF-4C42-BEBE-A455E2B65008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-72328-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"388AFA5E-CAAE-4F83-90D2-1D82E0B967AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9A899CD-44A2-430B-B981-CABA0708FFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.3.7-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B5A02F-8DC3-40B9-9C27-DD6DBB9121A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80114D6D-ADCA-48F6-B22E-1D5FBDB9BA68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5285200-FA02-4F4D-8F23-997ED6DE3E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4E796D-8487-443D-A276-E85A8A9FAF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.4.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDE02CC9-F585-4A0D-B7F2-C30C2198CEF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C5AF23-41DC-4C33-BF41-CABA4B50D997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D0CC6C-CF41-47C8-8C93-3C96E57A9A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.0-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298A4F68-FCE4-4A6A-BF56-4CF913DA9F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1418C9-A4E8-40E7-AD72-0F10F0439412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BD1C910-CA57-4B84-A36F-ED5D764865DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.3-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5066DD-C764-45BE-99F1-2F16BFF27243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9955454-ED62-4C8C-A968-69C7EBDAED30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.4-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677D1D7F-D930-4FA8-8113-DC3E2A392E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.4-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BCFB1D-915B-4406-8D17-CAB639CF949D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F9DD001-C5D9-4D2B-ADEA-A5EF76A53DDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix51:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CDB28B8-3B28-47FF-9640-C7A7CC929914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix52:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F37A61B-A8D4-4441-B093-E8A2B6384F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix53:*:*:*:*:*:*\",\"matchCriteriaId\":\"697E1FB9-35F4-452F-A6FF-B1CF292936E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-70026:hotfix70:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8DCEED3-50CB-4CF8-B7A7-7D606B091E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F0AE74D-6E64-4C12-A77F-83737A5D179F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.5.5-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0FA75EA-B731-4CF8-AA9B-1302693966AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E7E8E9D-DD50-4084-B6D4-4B84872546F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.6.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9B98FA-95E5-4BB7-86D6-0E21D6D5D51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5008264-1A35-4FDF-958A-D72002688A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546F959A-2A63-4B50-9F6C-8381B00232E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCD2D31-80E3-484A-9926-5A1AAD7DD2FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.0-va:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C650869-7523-4913-9ED1-10CA069A5F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CF6A09-91F3-4F86-B5FA-F339F224C51F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.3-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D182944-46D0-47BB-9DBA-F4B6AEE9F7BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.3-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E01082-47AD-445D-A301-46C33CDBCCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78FE3B3A-BD6E-4104-B85C-B9E7E742F612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.4-airgap:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBFE7ED-990D-4D7D-B0FB-5E7ADA02571B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:2.3.7.4-airgap-mdnac:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05B65BAF-9B19-4BB1-A3F7-83ED272BF78A\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.