{"id": "CVE-2024-6387", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "
[email protected]", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}, {"type": "Primary", "source": "
[email protected]", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2024-07-01T13:15:06.467", "references": [{"url": "https://access.redhat.com/errata/RHSA-2024:4312", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4340", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4389", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4469", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4474", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4479", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4484", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://access.redhat.com/security/cve/CVE-2024-6387", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604", "tags": ["Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html", "tags": ["Exploit", "Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://www.openssh.com/txt/release-9.8", "tags": ["Release Notes", "Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt", "tags": ["Exploit", "Third Party Advisory"], "source": "
[email protected]"}, {"url": "http://seclists.org/fulldisclosure/2024/Jul/18", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2024/Jul/19", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2024/Jul/20", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/01/13", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/02/1", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/03/1", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/03/11", "tags": ["Exploit", "Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/03/2", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/03/3", "tags": ["Mailing List", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/03/4", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/03/5", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/04/1", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/04/2", "tags": ["Exploit", "Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/2", "tags": ["Exploit", "Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/08/3", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/09/2", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/09/5", "tags": ["Exploit", "Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/1", "tags": ["Exploit", "Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/2", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/3", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/4", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/10/6", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/11/1", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/11/3", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/23/4", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/23/6", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/28/2", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/28/3", "tags": ["Mailing List"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4312", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4340", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4389", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4469", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4474", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4479", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2024:4484", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/security/cve/CVE-2024-6387", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/", "tags": ["Press/Media Coverage", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server", "tags": ["Press/Media Coverage", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://explore.alas.aws.amazon.com/CVE-2024-6387.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc", "tags": ["Release Notes"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/AlmaLinux/updates/issues/629", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/Azure/AKS/issues/4379", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/PowerShell/Win32-OpenSSH/discussions/2248", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2249", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/microsoft/azurelinux/issues/9555", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/oracle/oracle-linux/issues/149", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/rapier1/hpn-ssh/issues/87", "tags": ["Issue Tracking"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/zgzhang/cve-2024-6387-poc", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.almalinux.org/archives/list/
[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html", "tags": ["Mailing List", "Release Notes"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html", "tags": ["Mailing List", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://news.ycombinator.com/item?id=40843778", "tags": ["Issue Tracking", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://packetstorm.news/files/id/190587/", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.netapp.com/advisory/ntap-20240701-0001/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://sig-security.rocky.page/issues/CVE-2024-6387/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/", "tags": ["Press/Media Coverage", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.apple.com/kb/HT214118", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.apple.com/kb/HT214119", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.apple.com/kb/HT214120", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://ubuntu.com/security/CVE-2024-6387", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://ubuntu.com/security/notices/USN-6859-1", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/52269", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.openssh.com/txt/release-9.8", "tags": ["Release Notes", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.suse.com/security/cve/CVE-2024-6387.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.theregister.com/2024/07/01/regresshion_openssh/", "tags": ["Press/Media Coverage", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Secondary", "source": "
[email protected]", "description": [{"lang": "en", "value": "CWE-364"}]}, {"type": "Primary", "source": "
[email protected]", "description": [{"lang": "en", "value": "CWE-362"}]}], "descriptions": [{"lang": "en", "value": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period."}, {"lang": "es", "value": "Se encontr\u00f3 una condici\u00f3n de ejecuci\u00f3n del controlador de se\u00f1ales en el servidor de OpenSSH (sshd), donde un cliente no se autentica dentro de los segundos de LoginGraceTime (120 de forma predeterminada, 600 en versiones anteriores de OpenSSH), luego se llama al controlador SIGALRM de sshd de forma asincr\u00f3nica. Sin embargo, este controlador de se\u00f1ales llama a varias funciones que no son seguras para se\u00f1ales as\u00edncronas, por ejemplo, syslog()."}], "lastModified": "2025-09-30T13:52:23.540", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92EF92CC-8175-4319-A529-AF979BAE5FCE"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sonicwall:sma_6200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17BDC1B0-BE6A-4680-A78E-5338AD709095"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FCBF1E6-3A6E-430A-AB34-AA48D4478C5F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sonicwall:sma_7200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4C366A02-074C-4F98-AE68-30E0FF85CD00"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5DA3089-31AA-499E-9C23-788503BE55B7", "versionEndIncluding": "4.32.1f", "versionStartIncluding": "4.32.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "602CE21C-E1A9-4407-A504-CF4E58F596F5"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "BF90B5A4-6E55-4369-B9D4-E7A061E797D2"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57B93E9A-1483-4FF7-BF45-BD0D7D9F1747"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F87F7D08-7A28-493A-96BB-74C142109F8D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sonicwall:sma_6210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0734D1E1-2F59-4832-875F-AB03994B8992"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7592AE3D-D749-4494-9A55-71E2FD9BDFC0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sonicwall:sma_7210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A15BA659-19D1-49AA-B249-EAE5E63B9B9A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CE83596-82B9-4656-8E50-50D79DF06FB0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sonicwall:sma_8200v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "68369A76-B0C3-4736-9EE6-4E0034111591"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCF845D8-65AE-4165-9742-B56E86AB7D21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sonicwall:sra_ex_7000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D435EFD-7B02-4921-8AC5-BBF07277F4B2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F65C59D-249A-4790-892C-B78CF82E51CF"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a1k:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E0E9D71-AF09-41F4-A1C7-94F616AF2832"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F7D6B02-55FE-4BF1-8607-A0D703E61055"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a70:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D0FFEBCB-88AF-4AB2-A347-FB9420D2302A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "550C1E38-56A3-4676-9D28-D66F66BA2FC8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a90:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4812740A-7E14-4B43-8E08-3FACA2585B48"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDD92BFA-9117-4E6E-A13F-ED064B4B7284"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4B7DA42F-5D64-4967-A2D4-6210FE507841"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E73901F-666D-4D8B-BDFD-93DD2F70C74B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D0FD5AED-42CF-4918-B32C-D675738EF15C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34B25BEF-8708-4E2C-8BA6-EBCD5267EB04"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CE0F11D2-B5D9-46B4-BFC5-C86BC87D516A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04E3BD77-8915-4FFC-8483-5DB5D610F829"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "97E94ECB-BB51-4364-BEDD-8648C193196F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AC7AD92-8B33-4137-A4EC-08641E4AF857"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD443748-B0D1-4C1A-A62E-BD5FB5967370"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1236B66D-EB11-4324-929F-E2B86683C3C7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "281DFC67-46BB-4FC2-BE03-3C65C9311F65"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECF32BB1-9A58-4821-AE49-5D5C8200631F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F21DE67F-CDFD-4D36-9967-633CD0240C6F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1AB1EC2-2560-494A-A51B-6F20CE318FEB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "58DE2B52-4E49-4CD0-9310-00291B0352C7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B36CECA5-4545-49C2-92EB-B739407B207F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8E7549A-DE35-4274-B3F6-22D51C7A6613"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5AE3364-DB2D-4543-B1E2-175BF8BEBEE7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:c800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B64173B9-2A11-4390-AC76-7DD94F0CD305"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93B9B933-7D69-4B33-8983-C1CEC000B38B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "641290E6-558D-439F-AEBA-8F7BFF3D5C74"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEAA16D1-1E27-4128-BA14-5A0C59340EAA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a9500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D1C0A781-C3E2-4B41-8A30-FAD9E826270E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D421A96-E6E9-4B27-ADE0-D8E87A82EEDE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "775078AE-16E0-4AF6-9022-372FC2852107"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17D14D7F-E8E5-4669-8DB4-C634D0705EE9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F2D2745-242C-4603-899E-70C9025BDDD2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EFB4541D-5EF7-4266-BFF3-2DDEC95E8012"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7FD1DA9-7980-4643-B378-7095892DA176"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "347E9E3E-941C-4109-B59F-B9BB05486B34"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD661062-0D5B-4671-9D92-FEF8D7395C1E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8155BF5F-DD1B-4AB4-81F8-9BCE6A8821AE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F997DB9A-AF66-4CE1-B33B-A04493ECBA19"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:fas2820:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E0E8CD85-6C01-4B70-A1AA-750B46295194"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA924D87-8FAE-4E34-83F7-A5E25C7450E5", "versionEndExcluding": "12.7.6", "versionStartIncluding": "12.0"}, {"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A", "versionEndExcluding": "13.6.8", "versionStartIncluding": "13.0"}, {"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE", "versionEndExcluding": "14.6", "versionStartIncluding": "14.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4"}, {"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F45F69D6-7E32-4483-9EFC-63697CDDD22C", "versionEndIncluding": "9.8", "versionStartIncluding": "8.6"}, {"criteria": "cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C37CBBB-A4AA-40D0-9609-0620FDC12BA8"}, {"criteria": "cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7945F60B-460E-4CA6-9EB4-BEE663386D50"}, {"criteria": "cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB66ECE1-715A-4074-9355-E3512F7BCDBB"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01363FFA-F7A6-43FC-8D47-E67F95410095"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB056B47-1F45-4CE4-81F6-872F66C24C29"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F843B777-5C64-4CAE-80D6-89DC2C9515B1"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09F471C6-69AF-4E78-8143-17E783C80B9F"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "47842532-D2B6-44CB-ADE2-4AC8630A4D8C"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "21538C5B-A130-411E-B5F7-BBBA4C9D488A"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7D34E98-F549-4261-A42D-B37066C638B4"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "vulnerable": true, "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"}, {"criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C5DA53D-744B-4087-AEA9-257F18949E4D", "versionEndIncluding": "11.70.2", "versionStartIncluding": "11.0.0"}, {"criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8"}, {"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"}, {"criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*", "vulnerable": true, "matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5"}, {"criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*", "vulnerable": true, "matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A87EFA20-DD6B-41C5-98FD-A29F67D2E732"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2888B0C1-4D85-42EC-9696-03FAD0A9C28F"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "556F4943-7BA4-4E09-94B3-4515DC3C7807"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AFEC561-D79B-498B-B59D-1D82B21BDF1A"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3306F11-D3C0-41D6-BB5E-2ABDC3927715"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E584FE1-3A34-492B-B10F-508DA7CBA768"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5605E90-D125-4CC9-8B9F-F5EED9D4EE0C"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "761B4382-E857-4868-9F80-189B7F60256B"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51B17801-15FD-4425-BA6C-BE06B14F1BFE"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9CAFF74-AD36-4D29-83F3-23E0417C485D"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B2D2A82-BFFE-45FE-9F79-4AF12C6DE69D"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A81663-047E-4328-BE3A-CF65AB55B29F"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17DAE911-21E1-4182-85A0-B9F0059DDA7F"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEA48EC-24EA-4106-9465-CE66B938635F"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC8C769C-A23E-4F61-AC42-4DA64421B096"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA25530A-133C-4D7C-8993-D5C42D79A0B5"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69A72B5A-2189-4700-8E8B-1E5E7CA86C40"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5771F187-281B-4680-B562-EFC7441A8F88"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A4437F5-9DDA-4769-974E-23BFA085E0DB"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9C3A3D4-C9F4-41EB-B532-821AF83470B1"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "878A1F0A-087F-47D7-9CA5-A54BB8D6676A"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50A5E650-31FB-45BE-8827-641B58A83E45"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "038E5B85-7F60-4D71-8D3F-EDBF6E036CE0"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF309824-D379-4749-A1FA-BCB2987DD671"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79D770C6-7A57-4A49-8164-C55391F62301"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA813990-8C8F-4EE8-9F2B-9F73C510A7B2"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6A2EBE8-012E-470E-9E56-56ACBE345F78", "versionEndIncluding": "10.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "
[email protected]"}