cve-2024-20326
Vulnerability from cvelistv5
Published
2024-05-16 14:08
Modified
2024-08-01 21:59
Summary
A vulnerability in the ConfD CLI and the Cisco Crosswork Network Services Orchestrator CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary files as root on the underlying operating system. This vulnerability is due to improper authorization enforcement when specific CLI commands are used. An attacker could exploit this vulnerability by executing an affected CLI command with crafted arguments. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system with the privileges of the root user.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.5.3:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "7.5.10.2",
                "status": "affected",
                "version": "7.5.3",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.6:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "7.6.14.2",
                "status": "affected",
                "version": "7.6",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "7.7.15",
                "status": "affected",
                "version": "7.7",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "7.8.13.1",
                "status": "affected",
                "version": "7.8",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:8.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "8.0.12",
                "status": "affected",
                "version": "8.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.1.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "7.1.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.2.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "7.2.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "7.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:confd:7.4.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "confd",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "7.4.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.1.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "5.1.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.2.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "5.2.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.3.5:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "5.3.5"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.4.5:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "5.4.5"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.5.3:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "5.5.10.1",
                "status": "affected",
                "version": "5.5.3",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.6:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "5.6.14.3",
                "status": "affected",
                "version": "5.6",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": " \t5.7.15",
                "status": "affected",
                "version": "5.7",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": " \t5.8.13.1",
                "status": "affected",
                "version": "5.8",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "6.0.12",
                "status": "affected",
                "version": "6.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:6.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "6.1.7",
                "status": "affected",
                "version": "6.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:6.2:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "6.2.2",
                "status": "affected",
                "version": "6.2",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20326",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-16T15:55:41.498842Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:29.191Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.542Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-nso-rwpesc-qrQGnh3f",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f"
          },
          {
            "name": "cisco-sa-cnfd-rwpesc-ZAOufyx8",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco ConfD",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "7.3.5"
            },
            {
              "status": "affected",
              "version": "7.3.5.2"
            },
            {
              "status": "affected",
              "version": "7.3.5.1"
            },
            {
              "status": "affected",
              "version": "7.3.6"
            },
            {
              "status": "affected",
              "version": "7.4.5.3"
            },
            {
              "status": "affected",
              "version": "7.4.5.2"
            },
            {
              "status": "affected",
              "version": "7.4.6"
            },
            {
              "status": "affected",
              "version": "7.4.5.1"
            },
            {
              "status": "affected",
              "version": "7.4.8"
            },
            {
              "status": "affected",
              "version": "7.4.5"
            },
            {
              "status": "affected",
              "version": "7.4.7"
            },
            {
              "status": "affected",
              "version": "7.5.10"
            },
            {
              "status": "affected",
              "version": "7.5.4"
            },
            {
              "status": "affected",
              "version": "7.5.3.2"
            },
            {
              "status": "affected",
              "version": "7.5.3.1"
            },
            {
              "status": "affected",
              "version": "7.5.4.2"
            },
            {
              "status": "affected",
              "version": "7.5.4.1"
            },
            {
              "status": "affected",
              "version": "7.5.6.2"
            },
            {
              "status": "affected",
              "version": "7.5.5"
            },
            {
              "status": "affected",
              "version": "7.5.8"
            },
            {
              "status": "affected",
              "version": "7.5.9"
            },
            {
              "status": "affected",
              "version": "7.5.6"
            },
            {
              "status": "affected",
              "version": "7.5.4.3"
            },
            {
              "status": "affected",
              "version": "7.5.6.1"
            },
            {
              "status": "affected",
              "version": "7.5.7"
            },
            {
              "status": "affected",
              "version": "7.5.5.1"
            },
            {
              "status": "affected",
              "version": "7.5.3"
            },
            {
              "status": "affected",
              "version": "7.7"
            },
            {
              "status": "affected",
              "version": "7.6"
            },
            {
              "status": "affected",
              "version": "7.8"
            },
            {
              "status": "affected",
              "version": "7.6.12"
            },
            {
              "status": "affected",
              "version": "7.6.11"
            },
            {
              "status": "affected",
              "version": "7.6.9"
            },
            {
              "status": "affected",
              "version": "7.6.5"
            },
            {
              "status": "affected",
              "version": "7.6.1"
            },
            {
              "status": "affected",
              "version": "7.6.14.1"
            },
            {
              "status": "affected",
              "version": "7.6.8.1"
            },
            {
              "status": "affected",
              "version": "7.6.2"
            },
            {
              "status": "affected",
              "version": "7.6.4"
            },
            {
              "status": "affected",
              "version": "7.6.8"
            },
            {
              "status": "affected",
              "version": "7.6.7"
            },
            {
              "status": "affected",
              "version": "7.6.10"
            },
            {
              "status": "affected",
              "version": "7.6.3"
            },
            {
              "status": "affected",
              "version": "7.6.13"
            },
            {
              "status": "affected",
              "version": "7.6.14"
            },
            {
              "status": "affected",
              "version": "7.6.6"
            },
            {
              "status": "affected",
              "version": "7.7.7"
            },
            {
              "status": "affected",
              "version": "7.7.13"
            },
            {
              "status": "affected",
              "version": "7.7.4"
            },
            {
              "status": "affected",
              "version": "7.7.8"
            },
            {
              "status": "affected",
              "version": "7.7.9"
            },
            {
              "status": "affected",
              "version": "7.7.12"
            },
            {
              "status": "affected",
              "version": "7.7.2"
            },
            {
              "status": "affected",
              "version": "7.7.5"
            },
            {
              "status": "affected",
              "version": "7.7.5.1"
            },
            {
              "status": "affected",
              "version": "7.7.6"
            },
            {
              "status": "affected",
              "version": "7.7.10"
            },
            {
              "status": "affected",
              "version": "7.7.1"
            },
            {
              "status": "affected",
              "version": "7.7.3"
            },
            {
              "status": "affected",
              "version": "7.7.11"
            },
            {
              "status": "affected",
              "version": "7.8.8"
            },
            {
              "status": "affected",
              "version": "7.8.4"
            },
            {
              "status": "affected",
              "version": "7.8.2"
            },
            {
              "status": "affected",
              "version": "7.8.7"
            },
            {
              "status": "affected",
              "version": "7.8.9"
            },
            {
              "status": "affected",
              "version": "7.8.11"
            },
            {
              "status": "affected",
              "version": "7.8.5"
            },
            {
              "status": "affected",
              "version": "7.8.1"
            },
            {
              "status": "affected",
              "version": "7.8.3"
            },
            {
              "status": "affected",
              "version": "7.8.6"
            },
            {
              "status": "affected",
              "version": "7.8.10"
            },
            {
              "status": "affected",
              "version": "8.0.4"
            },
            {
              "status": "affected",
              "version": "8.0.8"
            },
            {
              "status": "affected",
              "version": "8.0.5"
            },
            {
              "status": "affected",
              "version": "8.0.7"
            },
            {
              "status": "affected",
              "version": "8.0.2"
            },
            {
              "status": "affected",
              "version": "8.0.1"
            },
            {
              "status": "affected",
              "version": "8.0.3"
            },
            {
              "status": "affected",
              "version": "8.0.6"
            },
            {
              "status": "affected",
              "version": "8.1"
            },
            {
              "status": "affected",
              "version": "8.0"
            },
            {
              "status": "affected",
              "version": "8.1.2"
            },
            {
              "status": "affected",
              "version": "8.1.4"
            },
            {
              "status": "affected",
              "version": "8.1.1"
            },
            {
              "status": "affected",
              "version": "8.1.3"
            }
          ]
        },
        {
          "product": "Cisco ConfD Basic",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "8.0.1"
            },
            {
              "status": "affected",
              "version": "8.0.6"
            },
            {
              "status": "affected",
              "version": "8.0.4"
            },
            {
              "status": "affected",
              "version": "8.0.2"
            },
            {
              "status": "affected",
              "version": "8.0.3"
            },
            {
              "status": "affected",
              "version": "8.0.5"
            },
            {
              "status": "affected",
              "version": "8.0.10"
            },
            {
              "status": "affected",
              "version": "8.0.11"
            },
            {
              "status": "affected",
              "version": "8.0.7"
            },
            {
              "status": "affected",
              "version": "8.0.8"
            },
            {
              "status": "affected",
              "version": "8.0.9"
            },
            {
              "status": "affected",
              "version": "7.8.3"
            },
            {
              "status": "affected",
              "version": "8.0"
            }
          ]
        },
        {
          "product": "Cisco Network Services Orchestrator",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the ConfD CLI and the Cisco  Crosswork Network Services Orchestrator CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary files as root on the underlying operating system.\n\n\nThis vulnerability is due to improper authorization enforcement when specific CLI commands are used. An attacker could exploit this vulnerability by executing an affected CLI command with crafted arguments. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system with the privileges of the root user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-16T14:08:18.634Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-nso-rwpesc-qrQGnh3f",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f"
        },
        {
          "name": "cisco-sa-cnfd-rwpesc-ZAOufyx8",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8"
        }
      ],
      "source": {
        "advisory": "cisco-sa-nso-rwpesc-qrQGnh3f",
        "defects": [
          "CSCwj67262",
          "CSCwi31715"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20326",
    "datePublished": "2024-05-16T14:08:18.634Z",
    "dateReserved": "2023-11-08T15:08:07.640Z",
    "dateUpdated": "2024-08-01T21:59:41.542Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-20326\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-05-16T14:15:08.420\",\"lastModified\":\"2025-07-25T14:39:47.173\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the ConfD CLI and the Cisco  Crosswork Network Services Orchestrator CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary files as root on the underlying operating system.\\n\\n\\nThis vulnerability is due to improper authorization enforcement when specific CLI commands are used. An attacker could exploit this vulnerability by executing an affected CLI command with crafted arguments. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system with the privileges of the root user.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la CLI de ConfD y la CLI de Cisco Crosswork Network Services Orchestrator podr\u00eda permitir que un atacante local autenticado y con pocos privilegios lea y escriba archivos arbitrarios como ra\u00edz en el sistema operativo subyacente. Esta vulnerabilidad se debe a una aplicaci\u00f3n inadecuada de la autorizaci\u00f3n cuando se utilizan comandos CLI espec\u00edficos. Un atacante podr\u00eda aprovechar esta vulnerabilidad ejecutando un comando CLI afectado con argumentos manipulados. Un exploit exitoso podr\u00eda permitir al atacante leer o escribir archivos arbitrarios en el sistema operativo subyacente con los privilegios del usuario root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:7.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BAFEB0D-15E8-4ED5-AA2F-FCFF784462DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:7.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3573A37A-D137-4B9A-8302-0D0562AB5784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFDCDF0C-B190-4570-AE4A-4F2DD1A52F41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48CC77F0-2188-467C-82F2-A3E77350A650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109545B7-86B5-4B56-A361-AF08EF0E15A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59ED080F-7BAC-453C-84DC-7945E988F912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC92BEB7-7EFF-4A8F-ACB8-8A33A2BC68E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A712A2EC-DD0E-40D3-A757-F3CB40C056BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7F5A5E-A3BB-479B-8D00-9181BE6DB324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79CDABDB-73AB-46FB-B54B-EC8092312799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567988DF-F202-4832-A50A-AA9EF478DC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71011A4-69D3-4024-B197-17546BDFC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C3E38FB-A91D-4950-A478-8774F7104C32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_basic:8.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B602FC1-4CEE-4D36-B54D-4720E5148351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955FAB89-5884-49B8-844F-8F793F94533A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB8262B-91D8-4D5D-99FE-442747683608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE14C54F-030F-433B-8D18-493FFAFD2615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15789D7E-1DD2-40EF-AAF1-9A249E5A1EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F83248-56C2-450B-85B0-8F3D7927A0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E6CD2D-04B5-4416-816F-34E75334D28D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87DD6DEF-3DD8-46CC-BBDA-B1CB02EA863E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6462F420-CDD3-4CCB-ADDA-9D4C637C62A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E674A274-04C7-45D3-A03C-6D6D47D9B6EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30FB9787-2D1F-4385-86CF-0F634525F6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B9EE4A-AD51-4F8B-BD6C-6AB9C7D5CA67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E9B1FC-1F97-44A7-BF73-CCD4E1BA813B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3595108-C8C9-46AE-9191-CCC4E30524BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A42C6434-1760-45E9-821F-B10F2363EBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25EC546A-3F75-45A1-9A4F-AA88366460A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53814C24-83B0-4C9D-A344-8C42A2C76A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FCE4AC-EAE7-4231-A249-7090E249AC11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7232B7D0-C34C-4045-B683-69D3815E74C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43110F62-AD93-4F23-944E-17279A5A805B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9959AF-36DC-48A1-9439-C2962DDA47F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FB0439B-DE71-4118-AF1F-687024718654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B23A29A4-663E-49AE-9A27-9BA9DF90DC00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F51011-A9D2-4D62-A9A2-42718A3E1E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA83B18-264D-4418-AE3B-485FEA777A7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE45D50-68A8-4E1B-8285-153AB0B6B1C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88928CAC-6177-4255-BF79-011853775223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7514B52B-47BC-4349-825A-752234D8AAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B771559D-BEE1-44FB-87EB-5D80BE58966A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1062A5FF-D0BB-42F3-89C0-AC530DD219D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15F9A59-951D-468E-94F5-BE676563AAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16A887CB-BBEC-473F-8ABB-7E62061A7BE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A52C0DA-67BD-4D2A-804C-23E9C48118D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209F5A28-A1D6-447F-A0FB-58F736661733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C16CA7-5860-4D40-B502-DD85B2644952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246B53CB-E2E7-4935-B163-32F7FD62C32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505AF62D-796D-4E8C-8F08-90397B43F57F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E554197-5231-48DB-96BC-0BAB310E3FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35203B1A-8204-4DBC-9FC8-DAFF83CB92C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B34B63F6-4BE7-4AFE-B697-CDDBF47FB08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8083E68-5129-4E62-A83D-49C7EC962B6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAFCF886-FA10-4F32-986B-9E4811C27264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A16ED7-C5CD-457D-AA1C-5CEC9AD605A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30586725-2E71-4678-9FD6-368E77CE3672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC87266-672F-4D4A-8651-5DDD59950B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCD1BAF-C495-4C8E-829D-36EE74D87598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11D7887C-5EE5-45CC-B23B-6EBD1FD3DD03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"606775C7-AE45-41B5-8C72-19BD7EC0DA94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA18CF4A-31DA-4326-A49E-23B1052BCA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88BF492-124C-476F-958C-B08EA4BF4C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5E4155-C81F-48B7-A98A-6C56762F2835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDEDEC04-5615-402D-92C6-B8095A64231F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1238717C-8420-43CA-AECD-7A4811FD182C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB4E2DD-B646-4940-A64A-6DCC87A577B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D9F3D0-793B-4D1A-929F-146307F6D62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4247A24-3D8A-4B75-8B87-DA453DAC6D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"262FC233-4D74-458B-A29D-FA2EFC4A7BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D659B8B-00D7-46E8-997B-5C4ACAAFCA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A613266-E406-42BF-BD8E-2A0D8F23BB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"221C4CD4-B342-4A27-ABED-6A57E7653C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D829B6-2FF0-4C79-9A69-A7AF05204D84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2493D9CF-2FFA-4039-A3EB-92EA7585260C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF815BB9-1D4C-4A57-8E55-0D16EC3D9F05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19217087-5886-4841-8E0D-884E4BE5A22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3DD2B9F-2ED0-42DF-AA55-FE2FFBD6F8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449274ED-4486-42DE-806C-60336D64E71E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A934CE25-5D2E-4073-8D99-198ABDF7F66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F3C4D8-F32C-44BA-AF77-1C52D08B08DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1891B42-FD48-4428-8AF4-1EA1D0619370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D02353-015E-45BB-AA81-102FFC83A924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F56658-10CE-44DD-A15F-A36DC3990595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:7.8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55FDC1E-DC2C-471E-BB8D-190680FCEEB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32C0B97-B616-4D7B-B65D-01ED7EAF69E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D83C93B8-9DA5-4D79-807F-0C1F72E43A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA882D4-4F88-461C-AD65-7497D7D0FDD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C674FCB5-A024-4DB9-B896-2DC31846685F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E96ABDE-C2C4-4200-8C8E-1853246A083B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5640D846-5FA6-4234-B8F0-A743F980D150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8682CD56-83A8-42E9-AE5B-08A885582E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4350D2C5-C7AA-4CB1-A67C-2CEA75CE531F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD3F0E57-E76C-44DB-B073-5BB1B2FAACE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32AB8C1-9770-4611-99FC-A7D1650FDD81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8030C9FD-D0EE-4483-9106-AE02158E2BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96AB94CD-A9B4-40F4-B256-A6D43FAB0A77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B718A5-DB86-4DA9-AFCF-A1EA778CDF1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:confd_premium:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB51C8A-F38A-430C-987D-A27C3A4EC948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3.5\",\"versionEndExcluding\":\"5.4\",\"matchCriteriaId\":\"BA84DDF5-267B-43D9-83EB-88B8C5179F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.5\",\"versionEndExcluding\":\"5.5\",\"matchCriteriaId\":\"CC13A32E-4901-4AA0-8475-B1717BAF18A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.3\",\"versionEndExcluding\":\"5.5.10.1\",\"matchCriteriaId\":\"D94313F6-64E6-4C44-941C-2172C4E5C91A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.6\",\"versionEndExcluding\":\"5.6.14.3\",\"matchCriteriaId\":\"C45E561F-E8A9-48FF-9C2F-04F81C206B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7\",\"versionEndExcluding\":\"5.7.15\",\"matchCriteriaId\":\"085E241C-7CBC-461D-A8E2-CFDE4CC51948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.8\",\"versionEndExcluding\":\"5.8.13.1\",\"matchCriteriaId\":\"149BFEE6-09DC-438B-92E5-D87EDD729FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndIncluding\":\"6.0.12\",\"matchCriteriaId\":\"69CA366E-925C-4C7D-911B-0C8102114AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1\",\"versionEndIncluding\":\"6.1.7\",\"matchCriteriaId\":\"7D11D04D-C5DD-43AC-A975-B29EBD58F31B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.2.2\",\"matchCriteriaId\":\"19E05905-C38F-4EC3-BE94-AC49CE1D1834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793E72C8-4F9A-4CBC-A8B8-CBAB05427CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE5ED6EA-255B-4D3F-BC29-01A852B2E4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:crosswork_network_services_orchestrator:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6C7DE84-CE91-4924-94F2-B878AC83E867\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.