Vulnerability Name:

CVE-2021-3449 (CCN-198752)

Assigned:2021-03-25
Published:2021-03-25
Updated:2022-08-29
Summary:An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
CVSS v3 Severity:5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.9 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.2 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-476
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-3449

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing

Source: CONFIRM
Type: Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf

Source: CONFIRM
Type: Patch, Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf

Source: XF
Type: UNKNOWN
openssl-cve20213449-dos(198752)

Source: CONFIRM
Type: Mailing List, Patch, Vendor Advisory
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148

Source: CONFIRM
Type: Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845

Source: CONFIRM
Type: Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10356

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20210831 [SECURITY] [DLA 2751-1] postgresql-9.6 security update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-cbf14ab8f9

Source: CCN
Type: Node.js Blog, 2021-04-06
April 2021 Security Releases

Source: CONFIRM
Type: Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013

Source: MISC
Type: Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc

Source: GENTOO
Type: Third Party Advisory
GLSA-202103-03

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0006/

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210513-0002/

Source: CCN
Type: Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJd
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021

Source: CISCO
Type: Third Party Advisory
20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021

Source: DEBIAN
Type: Third Party Advisory
DSA-4875

Source: CCN
Type: IBM Security Bulletin 6442895 (Rational ClearQuest)
Vulnerabilities in OpenSSL affect IBM Rational ClearQuest (CVE-2021-3449, CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6443733 (i)
OpenSSL for IBM i is affected by CVE-2021-3449 and CVE-2021-3450

Source: CCN
Type: IBM Security Bulletin 6445493 (Watson Speech Services)
Update available for OpenSSL vulnerabilities affecting IBM Watson Speech Services 1.2.1

Source: CCN
Type: IBM Security Bulletin 6447507 (z/Transaction Processing Facility)
z/TPF is affected by an OpenSSL vulnerability

Source: CCN
Type: IBM Security Bulletin 6447788 (Sterling Connect:Express for UNIX)
OpenSSL Vulnerabilities Affect IBM Sterling Connect:Express for UNIX (CVE-2021-3049, CVE-2021-3050)

Source: CCN
Type: IBM Security Bulletin 6448846 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container may be affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6454457 (Elastic Storage Server)
IBM Elastic Storage System systems are affected by vulnerabilities in OpenSSL

Source: CCN
Type: IBM Security Bulletin 6454803 (Spectrum Control)
Vulnerabilities in XStream, Java, OpenSSL, WebSphere Application Server Liberty and Node.js affect IBM Spectrum Control

Source: CCN
Type: IBM Security Bulletin 6462927 (Rational ClearCase)
Vulnerability in OpenSSL affects IBM Rational ClearCase (CVE-2020-1971, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841)

Source: CCN
Type: IBM Security Bulletin 6463293 (MQ Appliance)
IBM MQ Appliance is affected by an OpenSSL vulnerability (CVE-2021-3449)

Source: CCN
Type: IBM Security Bulletin 6463307 (MQ for HPE NonStop)
IBM MQ for HPE NonStop Server is affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6463309 (WebSphere MQ for HP NonStop)
WebSphere MQ for HP NonStop Server is affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6465449 (Power HMC)
Vulnerability in OpenSSL affects Power Hardware Management Console (CVE-2021-3449).

Source: CCN
Type: IBM Security Bulletin 6465583 (WIoTP MessageGateway)
OpenSSL publicly disclosed vulnerability affects MessageGateway (CVE-CVE-2021-3449)

Source: CCN
Type: IBM Security Bulletin 6466315 (App Connect Enterprise)
Vulnerabilities in OpenSSL affect IBM Integration Bus and IBM App Connect Enterprise v11 (CVE-2021-3449 , CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6466329 (Cloud Transformation Advisor)
IBM Cloud Transformation Advisor is affected by Node.js vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6466639 (Cloud Pak for Integration)
IBM Cloud Pak for Integration is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6467073 (Business Automation Workflow)
Security vulnerabilities in IBM SDK for Node.js might affect the configuration editor used by IBM Business Automation Workflow and Business Process Manager (BPM)

Source: CCN
Type: IBM Security Bulletin 6467639 (Integration Bus)
IBM Integration Bus and IBM App Connect Enterprise v11 are affected by vulnerabilities in Node.js (CVE-2021-3450, CVE-2021-3449)

Source: CCN
Type: IBM Security Bulletin 6467937 (MobileFirst Foundation)
OpenSSL publicly disclosed vulnerability affects IBM MobileFirst Platform Foundation.

Source: CCN
Type: IBM Security Bulletin 6472137 (Netcool/System Service Monitor)
Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors

Source: CCN
Type: IBM Security Bulletin 6476334 (WA for ICP)
Potential vulnerability with Node.js

Source: CCN
Type: IBM Security Bulletin 6476346 (Security Verify Gateway)
Multiple Security Vulnerabilities fixed in Openssl as shipped with IBM Security Verify products

Source: CCN
Type: IBM Security Bulletin 6476632 (WA for ICP)
Potential vulnerability in OpenSSL

Source: CCN
Type: IBM Security Bulletin 6476940 (Cloud Pak for Security)
Cloud Pak for Security has several security vulnerabilities addressed in the latest version

Source: CCN
Type: IBM Security Bulletin 6477016 (API Connect)
IBM API Connect is impacted by multiple OpenSSL vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6478719 (Network Switches)
Vulnerability in Fabric OS used by IBM b-type SAN directors and switches.

Source: CCN
Type: IBM Security Bulletin 6479351 (Workload Scheduler)
Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler

Source: CCN
Type: IBM Security Bulletin 6481675 (DataPower Gateway)
Potential DoS in IBM DataPower Gateway

Source: CCN
Type: IBM Security Bulletin 6486347 (Cloud Private)
IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449, CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6491127 (Security Guardium Insights)
IBM Security Guardium Insights is affected by multiple vulnerabilities (CVE-2021-3538, CVE-2021-33502, CVE-2021-3450, CVE-2021-3449)

Source: CCN
Type: IBM Security Bulletin 6491653 (Security Verify Bridge)
ultiple vulnerabilities fixed in IBM Security Verify Bridge - Docker

Source: CCN
Type: IBM Security Bulletin 6493729 (Cloud Pak for Security)
Cloud Pak for Security is vulnerable to several CVEs

Source: CCN
Type: IBM Security Bulletin 6520474 (QRadar SIEM)
IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6520674 (QRadar SIEM)
IBM QRadar SIEM Application Framework v1 (CentOS6) is End of Life

Source: CCN
Type: IBM Security Bulletin 6523070 (Power System AC922 8335-GTH)
This Power System update is being released to address CVE 2021-3450 and CVE 2021-3449

Source: CCN
Type: IBM Security Bulletin 6536652 (App Connect Professional)
App Connect Professional & IBM WebSphere Cast Iron Solution are affected by OpenSSL vulnerability

Source: CCN
Type: IBM Security Bulletin 6538418 (Security Verify Access)
Multiple Security Vulnerabilities fixed in IBM Security Verify Access

Source: CCN
Type: IBM Security Bulletin 6589173 (Security Verify Adapter)
IBM Security Verify Adapters are vulnerable to denial of service and bypass security restrictions due to OpenSSL (CVE-2021-3449, CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6591203 (Netcool Agile Service Manager)
Multiple Vulnerabilities in Node.js affects IBM Netcool Agile Service Manager

Source: CCN
Type: IBM Security Bulletin 6985587 (Safer Payments)
OpenSSL security vulnerability CVE-2021-3449 and CVE-2021-3450 in IBM Safer Payments versions of 6.1 and 6.2 below 6.1.0.08 and 6.2.1.03

Source: CCN
Type: OpenSSL Security Advisory [25 March 2021]
OpenSSL Security Advisory [25 March 2021]

Source: CONFIRM
Type: Vendor Advisory
https://www.openssl.org/news/secadv/20210325.txt

Source: N/A
Type: Patch, Third Party Advisory
N/A

Source: CCN
Type: Oracle Critical Patch Update Advisory - April 2021
Oracle Critical Patch Update Advisory - April 2021

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: N/A
Type: Third Party Advisory
N/A

Source: MISC
Type: Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2021-05

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2021-06

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2021-09

Source: CONFIRM
Type: Third Party Advisory
https://www.tenable.com/security/tns-2021-10

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2021-3449

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:*:*:*:*:*:*:*:* (Version >= 1.1.1 and < 1.1.1k)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.2:-:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:storagegrid:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
  • OR cpe:/a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:tenable:tenable.sc:*:*:*:*:*:*:*:* (Version >= 5.13.0 and <= 5.17.0)
  • OR cpe:/a:tenable:nessus:*:*:*:*:*:*:*:* (Version <= 8.13.1)
  • OR cpe:/a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*
  • OR cpe:/a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*
  • OR cpe:/a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:tenable:log_correlation_engine:*:*:*:*:*:*:*:* (Version < 6.0.9)

  • Configuration 6:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:checkpoint:quantum_security_management_firmware:r80.40:*:*:*:*:*:*:*
  • OR cpe:/o:checkpoint:quantum_security_management_firmware:r81:*:*:*:*:*:*:*
  • AND
  • cpe:/h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:checkpoint:multi-domain_management_firmware:r80.40:*:*:*:*:*:*:*
  • OR cpe:/o:checkpoint:multi-domain_management_firmware:r81:*:*:*:*:*:*:*
  • AND
  • cpe:/h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*
  • OR cpe:/o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*
  • AND
  • cpe:/h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:primavera_unifier:*:*:*:*:*:*:*:* (Version >= 17.7 and <= 17.12)
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*
  • OR cpe:/a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*
  • OR cpe:/a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*
  • OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version >= 8.0.15 and <= 8.0.23)
  • OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version <= 5.7.33)
  • OR cpe:/a:oracle:mysql_workbench:*:*:*:*:*:*:*:* (Version <= 8.0.23)
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:essbase:21.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql_connectors:*:*:*:*:*:*:*:* (Version <= 8.0.23)
  • OR cpe:/a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* (Version < 9.2.6.0)
  • OR cpe:/a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:secure_backup:*:*:*:*:*:*:*:* (Version < 18.1.0.1.0)
  • OR cpe:/a:oracle:communications_communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:* (Version >= 10.2.0.0 and < 10.2.1.0-17sv)
  • AND
  • cpe:/h:sonicwall:sma100:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/a:sonicwall:capture_client:3.5:*:*:*:*:*:*:*
  • OR cpe:/o:sonicwall:sonicos:7.0.1.0:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:siemens:ruggedcom_rcm1224_firmware:*:*:*:*:*:*:*:* (Version >= 6.2
  • AND
  • cpe:/h:siemens:ruggedcom_rcm1224:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*

  • Configuration 16:
  • cpe:/o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:* (Version >= 6.2
  • AND
  • cpe:/h:siemens:scalance_m-800:-:*:*:*:*:*:*:*

  • Configuration 17:
  • cpe:/o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:* (Version >= 4.1
  • AND
  • cpe:/h:siemens:scalance_s602:-:*:*:*:*:*:*:*

  • Configuration 18:
  • cpe:/o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:* (Version >= 4.1
  • AND
  • cpe:/h:siemens:scalance_s612:-:*:*:*:*:*:*:*

  • Configuration 19:
  • cpe:/o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:* (Version >= 6.2
  • AND
  • cpe:/h:siemens:scalance_s615:-:*:*:*:*:*:*:*

  • Configuration 20:
  • cpe:/o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:* (Version >= 4.1
  • AND
  • cpe:/h:siemens:scalance_s623:-:*:*:*:*:*:*:*

  • Configuration 21:
  • cpe:/o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:* (Version >= 4.1
  • AND
  • cpe:/h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*

  • Configuration 22:
  • cpe:/o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:* (Version >= 2.0
  • AND
  • cpe:/h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*

  • Configuration 23:
  • cpe:/o:siemens:scalance_w700_firmware:*:*:*:*:*:*:*:* (Version >= 6.5
  • AND
  • cpe:/h:siemens:scalance_w700:-:*:*:*:*:*:*:*

  • Configuration 24:
  • cpe:/o:siemens:scalance_w1700_firmware:*:*:*:*:*:*:*:* (Version >= 2.0
  • AND
  • cpe:/h:siemens:scalance_w1700:-:*:*:*:*:*:*:*

  • Configuration 25:
  • cpe:/o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:* (Version < 4.3)
  • AND
  • cpe:/h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*

  • Configuration 26:
  • cpe:/o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:* (Version < 4.3)
  • AND
  • cpe:/h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*

  • Configuration 27:
  • cpe:/o:siemens:scalance_xf-200ba_firmware:*:*:*:*:*:*:*:* (Version < 4.3)
  • AND
  • cpe:/h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:*

  • Configuration 28:
  • cpe:/o:siemens:scalance_xm-400_firmware:*:*:*:*:*:*:*:* (Version < 6.4)
  • AND
  • cpe:/h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*

  • Configuration 29:
  • cpe:/o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:* (Version < 4.3)
  • AND
  • cpe:/h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*

  • Configuration 30:
  • cpe:/o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:* (Version < 4.3)
  • AND
  • cpe:/h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*

  • Configuration 31:
  • cpe:/o:siemens:scalance_xr524-8c_firmware:*:*:*:*:*:*:*:* (Version < 6.4)
  • AND
  • cpe:/h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*

  • Configuration 32:
  • cpe:/o:siemens:scalance_xr526-8c_firmware:*:*:*:*:*:*:*:* (Version < 6.4)
  • AND
  • cpe:/h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*

  • Configuration 33:
  • cpe:/o:siemens:scalance_xr528-6m_firmware:*:*:*:*:*:*:*:* (Version < 6.4)
  • AND
  • cpe:/h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*

  • Configuration 34:
  • cpe:/o:siemens:scalance_xr552-12_firmware:*:*:*:*:*:*:*:* (Version < 6.4)
  • AND
  • cpe:/h:siemens:scalance_xr552-12:-:*:*:*:*:*:*:*

  • Configuration 35:
  • cpe:/o:siemens:simatic_cloud_connect_7_firmware:-:*:*:*:*:*:*:*
  • OR cpe:/o:siemens:simatic_cloud_connect_7_firmware:*:*:*:*:*:*:*:* (Version >= 1.1
  • AND
  • cpe:/h:siemens:simatic_cloud_connect_7:-:*:*:*:*:*:*:*

  • Configuration 36:
  • cpe:/o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*
  • OR cpe:/o:siemens:simatic_cp_1242-7_gprs_v2_firmware:*:*:*:*:*:*:*:* (Version >= 3.1
  • AND
  • cpe:/h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*

  • Configuration 37:
  • cpe:/o:siemens:simatic_hmi_basic_panels_2nd_generation_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_hmi_basic_panels_2nd_generation:-:*:*:*:*:*:*:*

  • Configuration 38:
  • cpe:/o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*

  • Configuration 39:
  • cpe:/o:siemens:simatic_hmi_ktp_mobile_panels_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_hmi_ktp_mobile_panels:-:*:*:*:*:*:*:*

  • Configuration 40:
  • cpe:/o:siemens:simatic_mv500_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_mv500:-:*:*:*:*:*:*:*

  • Configuration 41:
  • cpe:/o:siemens:simatic_net_cp_1243-1_firmware:*:*:*:*:*:*:*:* (Version >= 3.1
  • AND
  • cpe:/h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:*

  • Configuration 42:
  • cpe:/o:siemens:simatic_net_cp1243-7_lte_eu_firmware:*:*:*:*:*:*:*:* (Version >= 3.1
  • AND
  • cpe:/h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*

  • Configuration 43:
  • cpe:/o:siemens:simatic_net_cp1243-7_lte_us_firmware:*:*:*:*:*:*:*:* (Version >= 3.1
  • AND
  • cpe:/h:siemens:simatic_net_cp1243-7_lte_us:-:*:*:*:*:*:*:*

  • Configuration 44:
  • cpe:/o:siemens:simatic_net_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:* (Version >= 3.1
  • AND
  • cpe:/h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*

  • Configuration 45:
  • cpe:/o:siemens:simatic_net_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:* (Version >= 2.1
  • AND
  • cpe:/h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:*

  • Configuration 46:
  • cpe:/o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:* (Version >= 2.2 and < 3.0)
  • AND
  • cpe:/h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*

  • Configuration 47:
  • cpe:/o:siemens:simatic_net_cp_1543sp-1_firmware:*:*:*:*:*:*:*:* (Version >= 2.1
  • AND
  • cpe:/h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*

  • Configuration 48:
  • cpe:/o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:* (Version >= 1.0
  • AND
  • cpe:/h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*

  • Configuration 49:
  • cpe:/o:siemens:simatic_pcs_7_telecontrol_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_pcs_7_telecontrol:-:*:*:*:*:*:*:*

  • Configuration 50:
  • cpe:/o:siemens:simatic_pcs_neo_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_pcs_neo:-:*:*:*:*:*:*:*

  • Configuration 51:
  • cpe:/o:siemens:simatic_pdm_firmware:*:*:*:*:*:*:*:* (Version >= 9.1.0.7
  • AND
  • cpe:/h:siemens:simatic_pdm:-:*:*:*:*:*:*:*

  • Configuration 52:
  • cpe:/o:siemens:simatic_process_historian_opc_ua_server_firmware:*:*:*:*:*:*:*:* (Version >= 2019
  • AND
  • cpe:/h:siemens:simatic_process_historian_opc_ua_server:-:*:*:*:*:*:*:*

  • Configuration 53:
  • cpe:/o:siemens:simatic_rf166c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf166c:-:*:*:*:*:*:*:*

  • Configuration 54:
  • cpe:/o:siemens:simatic_rf185c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf185c:-:*:*:*:*:*:*:*

  • Configuration 55:
  • cpe:/o:siemens:simatic_rf186c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf186c:-:*:*:*:*:*:*:*

  • Configuration 56:
  • cpe:/o:siemens:simatic_rf186ci_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf186ci:-:*:*:*:*:*:*:*

  • Configuration 57:
  • cpe:/o:siemens:simatic_rf188c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf188c:-:*:*:*:*:*:*:*

  • Configuration 58:
  • cpe:/o:siemens:simatic_rf188ci_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf188ci:-:*:*:*:*:*:*:*

  • Configuration 59:
  • cpe:/o:siemens:simatic_rf360r_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_rf360r:-:*:*:*:*:*:*:*

  • Configuration 60:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*

  • Configuration 61:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*

  • Configuration 62:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1212fc_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:*

  • Configuration 63:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*

  • Configuration 64:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*

  • Configuration 65:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*

  • Configuration 66:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:*

  • Configuration 67:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*

  • Configuration 68:
  • cpe:/o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*

  • Configuration 69:
  • cpe:/o:siemens:simatic_s7-1500_cpu_1518-4_pn/dp_mfp_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:simatic_s7-1500_cpu_1518-4_pn/dp_mfp:-:*:*:*:*:*:*:*

  • Configuration 70:
  • cpe:/o:siemens:sinamics_connect_300_firmware:*:*:*:*:*:*:*:*
  • AND
  • cpe:/h:siemens:sinamics_connect_300:-:*:*:*:*:*:*:*

  • Configuration 71:
  • cpe:/o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:* (Version >= 2.0 and < 2.2)
  • AND
  • cpe:/h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*

  • Configuration 72:
  • cpe:/a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_server:14.0:sp2_update1:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_server:14.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_server:14.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_server:14.0:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_logon:*:*:*:*:*:*:*:* (Version >= 1.6.0.2
  • OR cpe:/a:siemens:simatic_logon:1.5:sp3_update_1:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_wincc_telecontrol:-:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinec_nms:1.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinec_nms:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinec_pni:-:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinema_server:14.0:sp2_update2:*:*:*:*:*:*
  • OR cpe:/a:siemens:sinumerik_opc_ua_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:tia_administrator:*:*:*:*:*:*:*:*

  • Configuration 73:
  • cpe:/a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* (Version < 1.0.1.1)

  • Configuration 74:
  • cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 14.0.0 and <= 14.14.0)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 10.0.0 and <= 10.12.0)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 12.0.0 and <= 12.12.0)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 14.15.0 and < 14.16.1)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 12.13.0 and < 12.22.1)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 10.13.0 and <= 10.24.0)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 15.0.0 and < 15.14.0)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:1.1.1:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_infrastructure:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:video_surveillance_media_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:netcool/system_service_monitor:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:meeting_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_automation:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:express:1.5.0:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:integration_bus:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:managed_services_accelerator:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_for_hpe_nonstop:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_for_hpe_nonstop:8.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:elastic_storage_server:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_automation:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.4:*:standard:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.5:*:standard:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:api_connect:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_appliance:9.2.0.0:*:*:*:continuous_delivery:*:*:*
  • OR cpe:/h:cisco:webex_room_phone:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:10.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_appliance:9.2.0.1:*:*:*:continuous_delivery:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:api_connect:5.0.8.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:10.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:10.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8157
    P
    Security update for terraform-provider-aws (Important)
    2023-06-21
    oval:org.opensuse.security:def:8181
    P
    Security update for terraform-provider-null (Important)
    2023-06-21
    oval:org.opensuse.security:def:7630
    P
    libopenssl-1_1-devel-1.1.1l-150500.15.4 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:8156
    P
    Security update for openvswitch (Important)
    2023-05-19
    oval:org.opensuse.security:def:6094
    P
    Security update for squid (Important)
    2022-07-12
    oval:org.opensuse.security:def:3045
    P
    cups-pk-helper-0.2.5-5.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3587
    P
    libecpg6-10.10-1.15.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94699
    P
    librsync-devel-1.0.0-1.27 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94675
    P
    libopenssl-1_1-devel-1.1.1l-150400.5.14 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:170
    P
    libopenssl-1_1-devel-1.1.1d-11.20.1 on GA media (Moderate)
    2022-06-13
    oval:org.opensuse.security:def:5993
    P
    Security update for openvpn (Important)
    2022-03-29
    oval:org.opensuse.security:def:99503
    P
    (Important)
    2022-03-23
    oval:org.opensuse.security:def:102254
    P
    Security update for stunnel (Important)
    2022-03-16
    oval:org.opensuse.security:def:112741
    P
    libopenssl-1_1-devel-1.1.1l-1.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:112972
    P
    matrix-synapse-1.43.0-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:99702
    P
    (Important)
    2021-12-06
    oval:org.opensuse.security:def:100011
    P
    (Moderate)
    2021-11-04
    oval:org.opensuse.security:def:106213
    P
    libopenssl-1_1-devel-1.1.1l-1.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:106421
    P
    matrix-synapse-1.43.0-1.1 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:101412
    P
    yast2-rmt-1.3.2-3.3.1 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:1099
    P
    libopenssl-1_1-devel-1.1.1d-11.20.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:62188
    P
    libopenssl-1_1-devel-1.1.1d-11.20.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:71929
    P
    libopenssl-1_1-devel-1.1.1d-11.20.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:100946
    P
    libopenssl-1_1-devel-1.1.1d-11.20.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:110973
    P
    Security update for nodejs12 (Important)
    2021-07-19
    oval:org.opensuse.security:def:110976
    P
    Security update for nodejs10 (Important)
    2021-07-19
    oval:org.opensuse.security:def:109478
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9364
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92950
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:70258
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:67183
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:98917
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:10304
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:8620
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92354
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69504
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:111623
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:76251
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9554
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:93103
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:118574
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:70444
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:99112
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:8806
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92553
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69694
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9753
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:93256
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:91967
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69246
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:102812
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:99304
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:96122
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9001
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92752
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69893
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:10118
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92162
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69270
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:111621
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:118573
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:20972
    P
    Security update for nodejs10 (Important)
    2021-07-14
    oval:org.opensuse.security:def:69245
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:102811
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:96121
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:20973
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:49443
    P
    Security update for nodejs10 (Important)
    2021-07-14
    oval:org.opensuse.security:def:109477
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:102264
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:49444
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:com.redhat.rhsa:def:20211024
    P
    RHSA-2021:1024: openssl security update (Important)
    2021-03-30
    oval:org.opensuse.security:def:34662
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:100387
    P
    (Important)
    2021-03-25
    oval:org.opensuse.security:def:60485
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:76150
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:88269
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:26215
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:108078
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:52031
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:95541
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:127239
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:5202
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:100720
    P
    (Important)
    2021-03-25
    oval:org.opensuse.security:def:88586
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:97347
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:33788
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:108920
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:59611
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:5984
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:64676
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:89266
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:125676
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:42164
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:34046
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:59869
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:111291
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:73798
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:117592
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:24043
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:67082
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:89524
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    oval:org.opensuse.security:def:126842
    P
    Security update for openssl-1_1 (Important)
    2021-03-25
    BACK
    openssl openssl *
    debian debian linux 9.0
    debian debian linux 10.0
    freebsd freebsd 12.2 p1
    freebsd freebsd 12.2 p2
    freebsd freebsd 12.2 -
    netapp santricity smi-s provider -
    netapp snapcenter -
    netapp oncommand workflow automation -
    netapp storagegrid -
    netapp oncommand insight -
    netapp ontap select deploy administration utility -
    netapp active iq unified manager -
    netapp cloud volumes ontap mediator -
    netapp e-series performance analyzer -
    tenable tenable.sc *
    tenable nessus *
    tenable nessus network monitor 5.11.1
    tenable nessus network monitor 5.12.0
    tenable nessus network monitor 5.12.1
    tenable nessus network monitor 5.13.0
    tenable nessus network monitor 5.11.0
    tenable log correlation engine *
    fedoraproject fedora 34
    mcafee web gateway cloud service 10.1.1
    mcafee web gateway cloud service 9.2.10
    mcafee web gateway cloud service 8.2.19
    mcafee web gateway 10.1.1
    mcafee web gateway 9.2.10
    mcafee web gateway 8.2.19
    checkpoint quantum security management firmware r80.40
    checkpoint quantum security management firmware r81
    checkpoint quantum security management -
    checkpoint multi-domain management firmware r80.40
    checkpoint multi-domain management firmware r81
    checkpoint multi-domain management -
    checkpoint quantum security gateway firmware r80.40
    checkpoint quantum security gateway firmware r81
    checkpoint quantum security gateway -
    oracle peoplesoft enterprise peopletools 8.57
    oracle jd edwards world security a9.4
    oracle primavera unifier *
    oracle peoplesoft enterprise peopletools 8.58
    oracle primavera unifier 19.12
    oracle enterprise manager for storage management 13.4.0.0
    oracle primavera unifier 20.12
    oracle zfs storage appliance kit 8.8
    oracle secure global desktop 5.6
    oracle graalvm 20.3.1.2
    oracle graalvm 21.0.0.2
    oracle graalvm 19.3.5
    oracle mysql server *
    oracle mysql server *
    oracle mysql workbench *
    oracle peoplesoft enterprise peopletools 8.59
    oracle essbase 21.2
    oracle mysql connectors *
    oracle jd edwards enterpriseone tools *
    oracle primavera unifier 21.12
    oracle secure backup *
    oracle communications communications policy management 12.6.0.0.0
    sonicwall sma100 firmware *
    sonicwall sma100 -
    sonicwall capture client 3.5
    sonicwall sonicos 7.0.1.0
    siemens ruggedcom rcm1224 firmware *
    siemens ruggedcom rcm1224 -
    siemens scalance lpe9403 firmware *
    siemens scalance lpe9403 -
    siemens scalance m-800 firmware *
    siemens scalance m-800 -
    siemens scalance s602 firmware *
    siemens scalance s602 -
    siemens scalance s612 firmware *
    siemens scalance s612 -
    siemens scalance s615 firmware *
    siemens scalance s615 -
    siemens scalance s623 firmware *
    siemens scalance s623 -
    siemens scalance s627-2m firmware *
    siemens scalance s627-2m -
    siemens scalance sc-600 firmware *
    siemens scalance sc-600 -
    siemens scalance w700 firmware *
    siemens scalance w700 -
    siemens scalance w1700 firmware *
    siemens scalance w1700 -
    siemens scalance xb-200 firmware *
    siemens scalance xb-200 -
    siemens scalance xc-200 firmware *
    siemens scalance xc-200 -
    siemens scalance xf-200ba firmware *
    siemens scalance xf-200ba -
    siemens scalance xm-400 firmware *
    siemens scalance xm-400 -
    siemens scalance xp-200 firmware *
    siemens scalance xp-200 -
    siemens scalance xr-300wg firmware *
    siemens scalance xr-300wg -
    siemens scalance xr524-8c firmware *
    siemens scalance xr524-8c -
    siemens scalance xr526-8c firmware *
    siemens scalance xr526-8c -
    siemens scalance xr528-6m firmware *
    siemens scalance xr528-6m -
    siemens scalance xr552-12 firmware *
    siemens scalance xr552-12 -
    siemens simatic cloud connect 7 firmware -
    siemens simatic cloud connect 7 firmware *
    siemens simatic cloud connect 7 -
    siemens simatic cp 1242-7 gprs v2 firmware -
    siemens simatic cp 1242-7 gprs v2 firmware *
    siemens simatic cp 1242-7 gprs v2 -
    siemens simatic hmi basic panels 2nd generation firmware *
    siemens simatic hmi basic panels 2nd generation -
    siemens simatic hmi comfort outdoor panels firmware *
    siemens simatic hmi comfort outdoor panels -
    siemens simatic hmi ktp mobile panels firmware *
    siemens simatic hmi ktp mobile panels -
    siemens simatic mv500 firmware *
    siemens simatic mv500 -
    siemens simatic net cp 1243-1 firmware *
    siemens simatic net cp 1243-1 -
    siemens simatic net cp1243-7 lte eu firmware *
    siemens simatic net cp1243-7 lte eu -
    siemens simatic net cp1243-7 lte us firmware *
    siemens simatic net cp1243-7 lte us -
    siemens simatic net cp 1243-8 irc firmware *
    siemens simatic net cp 1243-8 irc -
    siemens simatic net cp 1542sp-1 irc firmware *
    siemens simatic net cp 1542sp-1 irc -
    siemens simatic net cp 1543-1 firmware *
    siemens simatic net cp 1543-1 -
    siemens simatic net cp 1543sp-1 firmware *
    siemens simatic net cp 1543sp-1 -
    siemens simatic net cp 1545-1 firmware *
    siemens simatic net cp 1545-1 -
    siemens simatic pcs 7 telecontrol firmware *
    siemens simatic pcs 7 telecontrol -
    siemens simatic pcs neo firmware *
    siemens simatic pcs neo -
    siemens simatic pdm firmware *
    siemens simatic pdm -
    siemens simatic process historian opc ua server firmware *
    siemens simatic process historian opc ua server -
    siemens simatic rf166c firmware *
    siemens simatic rf166c -
    siemens simatic rf185c firmware *
    siemens simatic rf185c -
    siemens simatic rf186c firmware *
    siemens simatic rf186c -
    siemens simatic rf186ci firmware *
    siemens simatic rf186ci -
    siemens simatic rf188c firmware *
    siemens simatic rf188c -
    siemens simatic rf188ci firmware *
    siemens simatic rf188ci -
    siemens simatic rf360r firmware *
    siemens simatic rf360r -
    siemens simatic s7-1200 cpu 1211c firmware *
    siemens simatic s7-1200 cpu 1211c -
    siemens simatic s7-1200 cpu 1212c firmware *
    siemens simatic s7-1200 cpu 1212c -
    siemens simatic s7-1200 cpu 1212fc firmware *
    siemens simatic s7-1200 cpu 1212fc -
    siemens simatic s7-1200 cpu 1214 fc firmware *
    siemens simatic s7-1200 cpu 1214 fc -
    siemens simatic s7-1200 cpu 1214c firmware *
    siemens simatic s7-1200 cpu 1214c -
    siemens simatic s7-1200 cpu 1214 fc firmware *
    siemens simatic s7-1200 cpu 1214 fc -
    siemens simatic s7-1200 cpu 1215 fc firmware *
    siemens simatic s7-1200 cpu 1215 fc -
    siemens simatic s7-1200 cpu 1215c firmware *
    siemens simatic s7-1200 cpu 1215c -
    siemens simatic s7-1200 cpu 1217c firmware *
    siemens simatic s7-1200 cpu 1217c -
    siemens simatic s7-1500 cpu 1518-4 pn/dp mfp firmware *
    siemens simatic s7-1500 cpu 1518-4 pn/dp mfp -
    siemens sinamics connect 300 firmware *
    siemens sinamics connect 300 -
    siemens tim 1531 irc firmware *
    siemens tim 1531 irc -
    siemens simatic wincc runtime advanced *
    siemens sinema server 14.0 sp2_update1
    siemens sinema server 14.0 sp1
    siemens sinema server 14.0 sp2
    siemens sinema server 14.0 -
    siemens simatic logon *
    siemens simatic logon 1.5 sp3_update_1
    siemens simatic wincc telecontrol -
    siemens sinec nms 1.0 sp1
    siemens sinec nms 1.0 -
    siemens sinec pni -
    siemens sinema server 14.0 sp2_update2
    siemens sinumerik opc ua server *
    siemens tia administrator *
    siemens sinec infrastructure network services *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    openssl openssl 1.1.1
    ibm rational clearcase 8.0.1
    ibm business process manager 8.5
    ibm rational clearcase 8.0.0
    ibm i 7.1
    ibm i 7.2
    cisco prime infrastructure -
    cisco video surveillance media server -
    ibm netcool/system service monitor 4.0.1
    ibm i 7.3
    ibm api connect 5.0.0.0
    cisco evolved programmable network manager *
    cisco meeting server -
    ibm rational clearquest 9.0.1
    ibm workload scheduler 9.4
    ibm business process manager 8.6
    ibm rational clearcase 9.0.1
    ibm qradar security information and event manager 7.3
    nodejs node.js 10
    ibm workload automation 9.4
    ibm sterling connect:express 1.5.0
    ibm integration bus 10.0.0
    ibm app connect 11.0.0.0
    ibm integration bus 10.0.0.0
    cisco ip conference phone 7832 -
    cisco ip conference phone 8832 -
    ibm i 7.4
    nodejs node.js 12
    ibm spectrum control 5.3.1
    ibm spectrum control 5.3.2
    ibm spectrum control 5.3.3
    ibm spectrum control 5.3.0.1
    cisco managed services accelerator -
    ibm mq for hpe nonstop 8.1.0
    ibm mq for hpe nonstop 8.0.4
    ibm elastic storage server 6.0.0
    ibm workload automation 9.5
    ibm cloud private 3.2.1 cd
    nodejs node.js 14.0
    ibm qradar security information and event manager 7.4 -
    ibm business automation workflow 18.0
    ibm business automation workflow 19.0
    ibm business automation workflow 20.0
    ibm rational clearquest 9.0.0
    ibm rational clearquest 9.0.2
    ibm cloud private 3.2.2 cd
    ibm spectrum control 5.3.4
    ibm spectrum control 5.3.5
    ibm spectrum control 5.3.6
    ibm spectrum control 5.3.7
    ibm api connect 10.0.0
    ibm security verify access 10.0.0
    ibm mq appliance 9.2.0.0
    cisco webex room phone -
    ibm datapower gateway 10.0.1.0
    ibm mq appliance 9.2.0.1
    ibm spectrum control 5.4.1
    ibm security verify access 10.0.2.0
    ibm cloud pak for security 1.6.0.0
    ibm cloud pak for security 1.5.0.1
    ibm cloud pak for security 1.5.0.0
    ibm workload scheduler 9.5
    ibm cloud pak for security 1.6.0.1
    ibm app connect enterprise 12.0.1.0
    ibm api connect 5.0.8.11
    ibm cloud pak for security 1.7.0.0
    ibm cloud pak for security 1.7.1.0
    ibm datapower gateway 10.0.2.0
    ibm datapower gateway 10.0.1.3
    ibm cloud pak for security 1.7.2.0
    ibm security verify access 10.0.1.0