CVE-2021-44228
Scores
EPSS
Percentile: 94.4%
CVSS
CVSS Score: 9.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
None (N)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Medium
Describes the conditions beyond the attacker's control
Authentication
None (N)
Describes the level of privileges an attacker must possess
Confidentiality Impact
Complete
Measures the impact to the confidentiality of information
Integrity Impact
Complete
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
Complete
Measures the impact to the availability of the impacted component
Description
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Scaner-VS 7 — a modern vulnerability management solution
Sources
CWEs
Related Vulnerabilities
Exploits
Vulnerable Software (185)
Type: Configuration
Product: apache-log4j1.2
Operating System: debian
{ "unaffected": true}
Source: debian
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu bionic 18.04
{ "fixed": "2.10.0-2ubuntu0.1"}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu focal 20.04
{ "fixed": "2.15.0-0.20.04.1"}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu hirsute 21.04
{ "fixed": "2.15.0-0.21.04.1"}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu impish 21.10
{ "fixed": "2.15.0-0.21.10.1"}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu jammy 22.04
{ "unaffected": true}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu trusty 14.04
{ "unfixed": true}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: ubuntu xenial 16.04
{ "unfixed": true}
Source: ubuntu
Type: Configuration
Product: apache-log4j2
Operating System: debian
{ "fixed": "2.15.0-1"}
Source: debian
Type: Configuration
Product: log4j
Operating System: altlinux
{ "fixed": "0:2.15.0-alt1_1jpp11"}
Source: redhat
Type: Configuration
Product: log4j-jcl
Operating System: altlinux
{ "fixed": "0:2.15.0-alt1_1jpp11"}
Source: redhat
Type: Configuration
Product: log4j-slf4j
Operating System: altlinux
{ "fixed": "0:2.15.0-alt1_1jpp11"}
Source: redhat
Type: Configuration
Vendor: *
Product: 6bk1602-0aa12-0tp0_firmware
Operating System: * * *
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulne...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "cpe_match": [ { "cpe23uri": "cpe:2.3:h:siemens:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:*" } ], "operator": "OR" } ], "operator": "AND"}
Source: nvd
Type: Configuration
Vendor: *
Product: 6bk1602-0aa22-0tp0_firmware
Operating System: * * *
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulne...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "cpe_match": [ { "cpe23uri": "cpe:2.3:h:siemens:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:*" } ], "operator": "OR" } ], "operator": "AND"}
Source: nvd
Type: Configuration
Vendor: *
Product: 6bk1602-0aa32-0tp0_firmware
Operating System: * * *
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulne...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "cpe_match": [ { "cpe23uri": "cpe:2.3:h:siemens:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:*" } ], "operator": "OR" } ], "operator": "AND"}
Source: nvd
Type: Configuration
Vendor: *
Product: 6bk1602-0aa42-0tp0_firmware
Operating System: * * *
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulne...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "cpe_match": [ { "cpe23uri": "cpe:2.3:h:siemens:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:*" } ], "operator": "OR" } ], "operator": "AND"}
Source: nvd
Type: Configuration
Vendor: *
Product: 6bk1602-0aa52-0tp0_firmware
Operating System: * * *
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulne...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:o:siemens:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "cpe_match": [ { "cpe23uri": "cpe:2.3:h:siemens:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:*" } ], "operator": "OR" } ], "operator": "AND"}
Source: nvd
Type: Configuration
Vendor: *
Product: active_iq_unified_manager
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:netapp:solidfire_enterprise_sds:-:*:*:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: advanced_malware_protection_virtual_private_cloud_appliance
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.5.4", "vulnerable": true...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.5.4", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:*", "versionEndExcluding": "2021.11_1.162", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.0.000.115", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.000.044", "versionStartIncluding": "3.1.000.000", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.2.000.009", "versionStartIncluding": "3.2.000.000", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.6\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.10.0.16", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.5.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.3.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.5.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.9.1.3", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.10.0.1", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.0.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.12.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.0.3", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.3\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:11.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.2.8", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.2.2.8", "versionStartIncluding": "2.2.2.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.2.3.4", "versionStartIncluding": "2.2.3.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.5", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.5\\(4\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.0\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.1.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.6\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.4.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.2.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.9-361", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.3.5.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.5.2", "versionStartIncluding": "5.4", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.5.4.1", "versionStartIncluding": "5.5", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.6.3.1", "versionStartIncluding": "5.6", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.1.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.6", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.4.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", "versionEndExcluding": "20.3.4.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", "versionEndExcluding": "20.4.2.1", "versionStartIncluding": "20.4", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", "versionEndExcluding": "20.5.1.1", "versionStartIncluding": "20.5", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", "versionEndExcluding": "20.6.2.1", "versionStartIncluding": "20.6", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.2.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0\\(1p\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.8.2.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*", "versionEndExcluding": "11.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*", "versionEndExcluding": "11.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:-:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:session_management:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\)su3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.6\\(2\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.6", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.6\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.14.4", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.6.7", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.2.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.4.4", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.5\\(1\\)", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.3.0.2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.0", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.2.1", "vulnerable": true }, { "cpe23uri": "cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.2.1v2", "vulnerable": true }, { "cpe23uri": "cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*", "versionEndExcluding": "11.5\\(1\\)", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: automated_subsea_tuning
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:broadworks:-:*:*:*...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_suite:4.10.0.15:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_suite:5.3.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_suite:5.4.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_suite:5.5.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cloudcenter_suite:5.5.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.001\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.002\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.001\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.002\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:common_services_platform_collector:002.010\\(000.000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:emergency_responder:11.5\\(4.65000.14\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:emergency_responder:11.5\\(4.66000.14\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.5\\(1\\):su1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.5\\(1\\):su2:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.6\\(1\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.6\\(1\\):es01:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.6\\(1\\):es02:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:finesse:12.6\\(1\\):es03:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:002.004\\(000.914\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:002.006\\(000.156\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:002.007\\(000.356\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:003.000\\(000.458\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:003.001\\(000.518\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:identity_services_engine:003.002\\(000.116\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\\(002.000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_assurance_engine:6.0\\(2.1912\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(3\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_insights_for_data_center:6.0\\(2.1914\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:8.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:8.4\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:8.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:9.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:9.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:9.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:12.5\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:paging_server:14.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1b\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1c\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1d\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1f\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1g\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1h\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1k\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:ucs_central_software:2.0\\(1l\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.17900.52\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18119.2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18900.97\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.21900.40\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.22900.28\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager_im_\\\u0026_presence_service:11.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_communications_manager_im_\\\u0026_presence_service:11.5\\(1.22900.6\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_computing_system:006.008\\(001.000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):su1:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(2\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es01:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es02:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(2\\):-:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(001\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(000\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(001\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unified_workforce_optimization:11.5\\(1\\):sr7:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:unity_connection:11.5\\(1.10000.6\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(1.26\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(2.26\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(3.025\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(4.018\\):*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*", "vulnerable": true } ], "operator": "OR"}
Source: nvd