Vulnerability Name: CVE-2021-3449 (CCN-198752) Assigned: 2021-03-25 Published: 2021-03-25 Updated: 2022-08-29 Summary: An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j). CVSS v3 Severity: 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H )5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
5.9 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H )5.2 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-476 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2021-3449 Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing Source: CONFIRM Type: Third Party Advisoryhttps://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf Source: CONFIRM Type: Patch, Third Party Advisoryhttps://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf Source: XF Type: UNKNOWNopenssl-cve20213449-dos(198752) Source: CONFIRM Type: Mailing List, Patch, Vendor Advisoryhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148 Source: CONFIRM Type: Third Party Advisoryhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845 Source: CONFIRM Type: Third Party Advisoryhttps://kc.mcafee.com/corporate/index?page=content&id=SB10356 Source: MLIST Type: Mailing List, Third Party Advisory[debian-lts-announce] 20210831 [SECURITY] [DLA 2751-1] postgresql-9.6 security update Source: FEDORA Type: Mailing List, Third Party AdvisoryFEDORA-2021-cbf14ab8f9 Source: CCN Type: Node.js Blog, 2021-04-06April 2021 Security Releases Source: CONFIRM Type: Third Party Advisoryhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013 Source: MISC Type: Third Party Advisoryhttps://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc Source: GENTOO Type: Third Party AdvisoryGLSA-202103-03 Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20210326-0006/ Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20210513-0002/ Source: CCN Type: Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJdMultiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 Source: CISCO Type: Third Party Advisory20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 Source: DEBIAN Type: Third Party AdvisoryDSA-4875 Source: CCN Type: IBM Security Bulletin 6442895 (Rational ClearQuest)Vulnerabilities in OpenSSL affect IBM Rational ClearQuest (CVE-2021-3449, CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6443733 (i)OpenSSL for IBM i is affected by CVE-2021-3449 and CVE-2021-3450 Source: CCN Type: IBM Security Bulletin 6445493 (Watson Speech Services)Update available for OpenSSL vulnerabilities affecting IBM Watson Speech Services 1.2.1 Source: CCN Type: IBM Security Bulletin 6447507 (z/Transaction Processing Facility)z/TPF is affected by an OpenSSL vulnerability Source: CCN Type: IBM Security Bulletin 6447788 (Sterling Connect:Express for UNIX)OpenSSL Vulnerabilities Affect IBM Sterling Connect:Express for UNIX (CVE-2021-3049, CVE-2021-3050) Source: CCN Type: IBM Security Bulletin 6448846 (App Connect Enterprise Certified Container)IBM App Connect Enterprise Certified Container may be affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6454457 (Elastic Storage Server)IBM Elastic Storage System systems are affected by vulnerabilities in OpenSSL Source: CCN Type: IBM Security Bulletin 6454803 (Spectrum Control)Vulnerabilities in XStream, Java, OpenSSL, WebSphere Application Server Liberty and Node.js affect IBM Spectrum Control Source: CCN Type: IBM Security Bulletin 6462927 (Rational ClearCase)Vulnerability in OpenSSL affects IBM Rational ClearCase (CVE-2020-1971, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841) Source: CCN Type: IBM Security Bulletin 6463293 (MQ Appliance)IBM MQ Appliance is affected by an OpenSSL vulnerability (CVE-2021-3449) Source: CCN Type: IBM Security Bulletin 6463307 (MQ for HPE NonStop)IBM MQ for HPE NonStop Server is affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6463309 (WebSphere MQ for HP NonStop)WebSphere MQ for HP NonStop Server is affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6465449 (Power HMC)Vulnerability in OpenSSL affects Power Hardware Management Console (CVE-2021-3449). Source: CCN Type: IBM Security Bulletin 6465583 (WIoTP MessageGateway)OpenSSL publicly disclosed vulnerability affects MessageGateway (CVE-CVE-2021-3449) Source: CCN Type: IBM Security Bulletin 6466315 (App Connect Enterprise)Vulnerabilities in OpenSSL affect IBM Integration Bus and IBM App Connect Enterprise v11 (CVE-2021-3449 , CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6466329 (Cloud Transformation Advisor)IBM Cloud Transformation Advisor is affected by Node.js vulnerabilities Source: CCN Type: IBM Security Bulletin 6466639 (Cloud Pak for Integration)IBM Cloud Pak for Integration is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6467073 (Business Automation Workflow)Security vulnerabilities in IBM SDK for Node.js might affect the configuration editor used by IBM Business Automation Workflow and Business Process Manager (BPM) Source: CCN Type: IBM Security Bulletin 6467639 (Integration Bus)IBM Integration Bus and IBM App Connect Enterprise v11 are affected by vulnerabilities in Node.js (CVE-2021-3450, CVE-2021-3449) Source: CCN Type: IBM Security Bulletin 6467937 (MobileFirst Foundation)OpenSSL publicly disclosed vulnerability affects IBM MobileFirst Platform Foundation. Source: CCN Type: IBM Security Bulletin 6472137 (Netcool/System Service Monitor)Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors Source: CCN Type: IBM Security Bulletin 6476334 (WA for ICP)Potential vulnerability with Node.js Source: CCN Type: IBM Security Bulletin 6476346 (Security Verify Gateway)Multiple Security Vulnerabilities fixed in Openssl as shipped with IBM Security Verify products Source: CCN Type: IBM Security Bulletin 6476632 (WA for ICP)Potential vulnerability in OpenSSL Source: CCN Type: IBM Security Bulletin 6476940 (Cloud Pak for Security)Cloud Pak for Security has several security vulnerabilities addressed in the latest version Source: CCN Type: IBM Security Bulletin 6477016 (API Connect)IBM API Connect is impacted by multiple OpenSSL vulnerabilities Source: CCN Type: IBM Security Bulletin 6478719 (Network Switches)Vulnerability in Fabric OS used by IBM b-type SAN directors and switches. Source: CCN Type: IBM Security Bulletin 6479351 (Workload Scheduler)Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler Source: CCN Type: IBM Security Bulletin 6481675 (DataPower Gateway)Potential DoS in IBM DataPower Gateway Source: CCN Type: IBM Security Bulletin 6486347 (Cloud Private)IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449, CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6491127 (Security Guardium Insights)IBM Security Guardium Insights is affected by multiple vulnerabilities (CVE-2021-3538, CVE-2021-33502, CVE-2021-3450, CVE-2021-3449) Source: CCN Type: IBM Security Bulletin 6491653 (Security Verify Bridge)ultiple vulnerabilities fixed in IBM Security Verify Bridge - Docker Source: CCN Type: IBM Security Bulletin 6493729 (Cloud Pak for Security)Cloud Pak for Security is vulnerable to several CVEs Source: CCN Type: IBM Security Bulletin 6520474 (QRadar SIEM)IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6520674 (QRadar SIEM)IBM QRadar SIEM Application Framework v1 (CentOS6) is End of Life Source: CCN Type: IBM Security Bulletin 6523070 (Power System AC922 8335-GTH)This Power System update is being released to address CVE 2021-3450 and CVE 2021-3449 Source: CCN Type: IBM Security Bulletin 6536652 (App Connect Professional)App Connect Professional & IBM WebSphere Cast Iron Solution are affected by OpenSSL vulnerability Source: CCN Type: IBM Security Bulletin 6538418 (Security Verify Access)Multiple Security Vulnerabilities fixed in IBM Security Verify Access Source: CCN Type: IBM Security Bulletin 6589173 (Security Verify Adapter)IBM Security Verify Adapters are vulnerable to denial of service and bypass security restrictions due to OpenSSL (CVE-2021-3449, CVE-2021-3450) Source: CCN Type: IBM Security Bulletin 6591203 (Netcool Agile Service Manager)Multiple Vulnerabilities in Node.js affects IBM Netcool Agile Service Manager Source: CCN Type: IBM Security Bulletin 6985587 (Safer Payments)OpenSSL security vulnerability CVE-2021-3449 and CVE-2021-3450 in IBM Safer Payments versions of 6.1 and 6.2 below 6.1.0.08 and 6.2.1.03 Source: CCN Type: OpenSSL Security Advisory [25 March 2021]OpenSSL Security Advisory [25 March 2021] Source: CONFIRM Type: Vendor Advisoryhttps://www.openssl.org/news/secadv/20210325.txt Source: N/A Type: Patch, Third Party AdvisoryN/A Source: CCN Type: Oracle Critical Patch Update Advisory - April 2021Oracle Critical Patch Update Advisory - April 2021 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuApr2021.html Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuapr2022.html Source: N/A Type: Third Party AdvisoryN/A Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2021.html Source: CONFIRM Type: Third Party Advisoryhttps://www.tenable.com/security/tns-2021-05 Source: CONFIRM Type: Third Party Advisoryhttps://www.tenable.com/security/tns-2021-06 Source: CONFIRM Type: Third Party Advisoryhttps://www.tenable.com/security/tns-2021-09 Source: CONFIRM Type: Third Party Advisoryhttps://www.tenable.com/security/tns-2021-10 Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2021-3449 Vulnerable Configuration: Configuration 1 :cpe:/a:openssl:openssl:*:*:*:*:*:*:*:* (Version >= 1.1.1 and < 1.1.1k)Configuration 2 :cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:* Configuration 3 :cpe:/o:freebsd:freebsd:12.2:p1:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:12.2:p2:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:12.2:-:*:*:*:*:*:* Configuration 4 :cpe:/a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:* OR cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:* OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* OR cpe:/a:netapp:storagegrid:-:*:*:*:*:*:*:* OR cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:* OR cpe:/a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* OR cpe:/a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:* OR cpe:/a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:* Configuration 5 :cpe:/a:tenable:tenable.sc:*:*:*:*:*:*:*:* (Version >= 5.13.0 and <= 5.17.0)OR cpe:/a:tenable:nessus:*:*:*:*:*:*:*:* (Version <= 8.13.1) OR cpe:/a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:* OR cpe:/a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:* OR cpe:/a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:* OR cpe:/a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:* OR cpe:/a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:* OR cpe:/a:tenable:log_correlation_engine:*:*:*:*:*:*:*:* (Version < 6.0.9) Configuration 6 :cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:* Configuration 7 :cpe:/a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:* OR cpe:/a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:* OR cpe:/a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:* OR cpe:/a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:* OR cpe:/a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:* OR cpe:/a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:* Configuration 8 :cpe:/o:checkpoint:quantum_security_management_firmware:r80.40:*:*:*:*:*:*:* OR cpe:/o:checkpoint:quantum_security_management_firmware:r81:*:*:*:*:*:*:* AND cpe:/h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:* Configuration 9 :cpe:/o:checkpoint:multi-domain_management_firmware:r80.40:*:*:*:*:*:*:* OR cpe:/o:checkpoint:multi-domain_management_firmware:r81:*:*:*:*:*:*:* AND cpe:/h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:* Configuration 10 :cpe:/o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:* OR cpe:/o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:* AND cpe:/h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:* Configuration 11 :cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* OR cpe:/a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:*:*:*:*:*:*:*:* (Version >= 17.7 and <= 17.12) OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:* OR cpe:/a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* OR cpe:/a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:* OR cpe:/a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:* OR cpe:/a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:* OR cpe:/a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:* OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version >= 8.0.15 and <= 8.0.23) OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version <= 5.7.33) OR cpe:/a:oracle:mysql_workbench:*:*:*:*:*:*:*:* (Version <= 8.0.23) OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:* OR cpe:/a:oracle:essbase:21.2:*:*:*:*:*:*:* OR cpe:/a:oracle:mysql_connectors:*:*:*:*:*:*:*:* (Version <= 8.0.23) OR cpe:/a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* (Version < 9.2.6.0) OR cpe:/a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:* OR cpe:/a:oracle:secure_backup:*:*:*:*:*:*:*:* (Version < 18.1.0.1.0) OR cpe:/a:oracle:communications_communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:* Configuration 12 :cpe:/o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:* (Version >= 10.2.0.0 and < 10.2.1.0-17sv)AND cpe:/h:sonicwall:sma100:-:*:*:*:*:*:*:* Configuration 13 :cpe:/a:sonicwall:capture_client:3.5:*:*:*:*:*:*:* OR cpe:/o:sonicwall:sonicos:7.0.1.0:*:*:*:*:*:*:* Configuration 14 :cpe:/o:siemens:ruggedcom_rcm1224_firmware:*:*:*:*:*:*:*:* (Version >= 6.2AND cpe:/h:siemens:ruggedcom_rcm1224:-:*:*:*:*:*:*:* Configuration 15 :cpe:/o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:* Configuration 16 :cpe:/o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:* (Version >= 6.2AND cpe:/h:siemens:scalance_m-800:-:*:*:*:*:*:*:* Configuration 17 :cpe:/o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:* (Version >= 4.1AND cpe:/h:siemens:scalance_s602:-:*:*:*:*:*:*:* Configuration 18 :cpe:/o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:* (Version >= 4.1AND cpe:/h:siemens:scalance_s612:-:*:*:*:*:*:*:* Configuration 19 :cpe:/o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:* (Version >= 6.2AND cpe:/h:siemens:scalance_s615:-:*:*:*:*:*:*:* Configuration 20 :cpe:/o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:* (Version >= 4.1AND cpe:/h:siemens:scalance_s623:-:*:*:*:*:*:*:* Configuration 21 :cpe:/o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:* (Version >= 4.1AND cpe:/h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:* Configuration 22 :cpe:/o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:* (Version >= 2.0AND cpe:/h:siemens:scalance_sc-600:-:*:*:*:*:*:*:* Configuration 23 :cpe:/o:siemens:scalance_w700_firmware:*:*:*:*:*:*:*:* (Version >= 6.5AND cpe:/h:siemens:scalance_w700:-:*:*:*:*:*:*:* Configuration 24 :cpe:/o:siemens:scalance_w1700_firmware:*:*:*:*:*:*:*:* (Version >= 2.0AND cpe:/h:siemens:scalance_w1700:-:*:*:*:*:*:*:* Configuration 25 :cpe:/o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:* (Version < 4.3)AND cpe:/h:siemens:scalance_xb-200:-:*:*:*:*:*:*:* Configuration 26 :cpe:/o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:* (Version < 4.3)AND cpe:/h:siemens:scalance_xc-200:-:*:*:*:*:*:*:* Configuration 27 :cpe:/o:siemens:scalance_xf-200ba_firmware:*:*:*:*:*:*:*:* (Version < 4.3)AND cpe:/h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:* Configuration 28 :cpe:/o:siemens:scalance_xm-400_firmware:*:*:*:*:*:*:*:* (Version < 6.4)AND cpe:/h:siemens:scalance_xm-400:-:*:*:*:*:*:*:* Configuration 29 :cpe:/o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:* (Version < 4.3)AND cpe:/h:siemens:scalance_xp-200:-:*:*:*:*:*:*:* Configuration 30 :cpe:/o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:* (Version < 4.3)AND cpe:/h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:* Configuration 31 :cpe:/o:siemens:scalance_xr524-8c_firmware:*:*:*:*:*:*:*:* (Version < 6.4)AND cpe:/h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:* Configuration 32 :cpe:/o:siemens:scalance_xr526-8c_firmware:*:*:*:*:*:*:*:* (Version < 6.4)AND cpe:/h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:* Configuration 33 :cpe:/o:siemens:scalance_xr528-6m_firmware:*:*:*:*:*:*:*:* (Version < 6.4)AND cpe:/h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:* Configuration 34 :cpe:/o:siemens:scalance_xr552-12_firmware:*:*:*:*:*:*:*:* (Version < 6.4)AND cpe:/h:siemens:scalance_xr552-12:-:*:*:*:*:*:*:* Configuration 35 :cpe:/o:siemens:simatic_cloud_connect_7_firmware:-:*:*:*:*:*:*:* OR cpe:/o:siemens:simatic_cloud_connect_7_firmware:*:*:*:*:*:*:*:* (Version >= 1.1 AND cpe:/h:siemens:simatic_cloud_connect_7:-:*:*:*:*:*:*:* Configuration 36 :cpe:/o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:* OR cpe:/o:siemens:simatic_cp_1242-7_gprs_v2_firmware:*:*:*:*:*:*:*:* (Version >= 3.1 AND cpe:/h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:* Configuration 37 :cpe:/o:siemens:simatic_hmi_basic_panels_2nd_generation_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_hmi_basic_panels_2nd_generation:-:*:*:*:*:*:*:* Configuration 38 :cpe:/o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:* Configuration 39 :cpe:/o:siemens:simatic_hmi_ktp_mobile_panels_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_hmi_ktp_mobile_panels:-:*:*:*:*:*:*:* Configuration 40 :cpe:/o:siemens:simatic_mv500_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_mv500:-:*:*:*:*:*:*:* Configuration 41 :cpe:/o:siemens:simatic_net_cp_1243-1_firmware:*:*:*:*:*:*:*:* (Version >= 3.1AND cpe:/h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:* Configuration 42 :cpe:/o:siemens:simatic_net_cp1243-7_lte_eu_firmware:*:*:*:*:*:*:*:* (Version >= 3.1AND cpe:/h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:* Configuration 43 :cpe:/o:siemens:simatic_net_cp1243-7_lte_us_firmware:*:*:*:*:*:*:*:* (Version >= 3.1AND cpe:/h:siemens:simatic_net_cp1243-7_lte_us:-:*:*:*:*:*:*:* Configuration 44 :cpe:/o:siemens:simatic_net_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:* (Version >= 3.1AND cpe:/h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:* Configuration 45 :cpe:/o:siemens:simatic_net_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:* (Version >= 2.1AND cpe:/h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:* Configuration 46 :cpe:/o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:* (Version >= 2.2 and < 3.0)AND cpe:/h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:* Configuration 47 :cpe:/o:siemens:simatic_net_cp_1543sp-1_firmware:*:*:*:*:*:*:*:* (Version >= 2.1AND cpe:/h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:* Configuration 48 :cpe:/o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:* (Version >= 1.0AND cpe:/h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:* Configuration 49 :cpe:/o:siemens:simatic_pcs_7_telecontrol_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_pcs_7_telecontrol:-:*:*:*:*:*:*:* Configuration 50 :cpe:/o:siemens:simatic_pcs_neo_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_pcs_neo:-:*:*:*:*:*:*:* Configuration 51 :cpe:/o:siemens:simatic_pdm_firmware:*:*:*:*:*:*:*:* (Version >= 9.1.0.7AND cpe:/h:siemens:simatic_pdm:-:*:*:*:*:*:*:* Configuration 52 :cpe:/o:siemens:simatic_process_historian_opc_ua_server_firmware:*:*:*:*:*:*:*:* (Version >= 2019AND cpe:/h:siemens:simatic_process_historian_opc_ua_server:-:*:*:*:*:*:*:* Configuration 53 :cpe:/o:siemens:simatic_rf166c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf166c:-:*:*:*:*:*:*:* Configuration 54 :cpe:/o:siemens:simatic_rf185c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf185c:-:*:*:*:*:*:*:* Configuration 55 :cpe:/o:siemens:simatic_rf186c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf186c:-:*:*:*:*:*:*:* Configuration 56 :cpe:/o:siemens:simatic_rf186ci_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf186ci:-:*:*:*:*:*:*:* Configuration 57 :cpe:/o:siemens:simatic_rf188c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf188c:-:*:*:*:*:*:*:* Configuration 58 :cpe:/o:siemens:simatic_rf188ci_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf188ci:-:*:*:*:*:*:*:* Configuration 59 :cpe:/o:siemens:simatic_rf360r_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_rf360r:-:*:*:*:*:*:*:* Configuration 60 :cpe:/o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:* Configuration 61 :cpe:/o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:* Configuration 62 :cpe:/o:siemens:simatic_s7-1200_cpu_1212fc_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:* Configuration 63 :cpe:/o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:* Configuration 64 :cpe:/o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:* Configuration 65 :cpe:/o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:* Configuration 66 :cpe:/o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:* Configuration 67 :cpe:/o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:* Configuration 68 :cpe:/o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:* Configuration 69 :cpe:/o:siemens:simatic_s7-1500_cpu_1518-4_pn/dp_mfp_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:simatic_s7-1500_cpu_1518-4_pn/dp_mfp:-:*:*:*:*:*:*:* Configuration 70 :cpe:/o:siemens:sinamics_connect_300_firmware:*:*:*:*:*:*:*:* AND cpe:/h:siemens:sinamics_connect_300:-:*:*:*:*:*:*:* Configuration 71 :cpe:/o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:* (Version >= 2.0 and < 2.2)AND cpe:/h:siemens:tim_1531_irc:-:*:*:*:*:*:*:* Configuration 72 :cpe:/a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:* OR cpe:/a:siemens:sinema_server:14.0:sp2_update1:*:*:*:*:*:* OR cpe:/a:siemens:sinema_server:14.0:sp1:*:*:*:*:*:* OR cpe:/a:siemens:sinema_server:14.0:sp2:*:*:*:*:*:* OR cpe:/a:siemens:sinema_server:14.0:-:*:*:*:*:*:* OR cpe:/a:siemens:simatic_logon:*:*:*:*:*:*:*:* (Version >= 1.6.0.2 OR cpe:/a:siemens:simatic_logon:1.5:sp3_update_1:*:*:*:*:*:* OR cpe:/a:siemens:simatic_wincc_telecontrol:-:*:*:*:*:*:*:* OR cpe:/a:siemens:sinec_nms:1.0:sp1:*:*:*:*:*:* OR cpe:/a:siemens:sinec_nms:1.0:-:*:*:*:*:*:* OR cpe:/a:siemens:sinec_pni:-:*:*:*:*:*:*:* OR cpe:/a:siemens:sinema_server:14.0:sp2_update2:*:*:*:*:*:* OR cpe:/a:siemens:sinumerik_opc_ua_server:*:*:*:*:*:*:*:* OR cpe:/a:siemens:tia_administrator:*:*:*:*:*:*:*:* Configuration 73 :cpe:/a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* (Version < 1.0.1.1)Configuration 74 :cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 14.0.0 and <= 14.14.0)OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 10.0.0 and <= 10.12.0) OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 12.0.0 and <= 12.12.0) OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 14.15.0 and < 14.16.1) OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 12.13.0 and < 12.22.1) OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 10.13.0 and <= 10.24.0) OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 15.0.0 and < 15.14.0) Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:* Configuration CCN 1 :cpe:/a:openssl:openssl:1.1.1:*:*:*:*:*:*:* AND cpe:/a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.1:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:* OR cpe:/a:cisco:prime_infrastructure:-:*:*:*:*:*:*:* OR cpe:/a:cisco:video_surveillance_media_server:-:*:*:*:*:*:*:* OR cpe:/a:ibm:netcool/system_service_monitor:4.0.1:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:* OR cpe:/a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:* OR cpe:/a:cisco:meeting_server:-:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_clearquest:9.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:workload_scheduler:9.4:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_clearcase:9.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:* OR cpe:/a:nodejs:node.js:10:*:*:*:*:*:*:* OR cpe:/a:ibm:workload_automation:9.4:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_connect:express:1.5.0:*:*:*:unix:*:*:* OR cpe:/a:ibm:integration_bus:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:* OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:* OR cpe:/h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:* OR cpe:/h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:* OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:* OR cpe:/a:nodejs:node.js:12:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.0.1:*:*:*:*:*:*:* OR cpe:/a:cisco:managed_services_accelerator:-:*:*:*:*:*:*:* OR cpe:/a:ibm:mq_for_hpe_nonstop:8.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:mq_for_hpe_nonstop:8.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:elastic_storage_server:6.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:workload_automation:9.5:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:* OR cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:* OR cpe:/a:ibm:business_automation_workflow:18.0:*:*:*:*:*:*:* OR cpe:/a:ibm:business_automation_workflow:19.0:*:*:*:*:*:*:* OR cpe:/a:ibm:business_automation_workflow:20.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_clearquest:9.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_clearquest:9.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.4:*:standard:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.5:*:standard:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.7:*:*:*:*:*:*:* OR cpe:/a:ibm:api_connect:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:mq_appliance:9.2.0.0:*:*:*:continuous_delivery:*:*:* OR cpe:/h:cisco:webex_room_phone:-:*:*:*:*:*:*:* OR cpe:/a:ibm:datapower_gateway:10.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:mq_appliance:9.2.0.1:*:*:*:continuous_delivery:*:*:* OR cpe:/a:ibm:spectrum_control:5.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.6.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.5.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:workload_scheduler:9.5:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:api_connect:5.0.8.11:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.7.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.7.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:datapower_gateway:10.0.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:datapower_gateway:10.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
openssl openssl *
debian debian linux 9.0
debian debian linux 10.0
freebsd freebsd 12.2 p1
freebsd freebsd 12.2 p2
freebsd freebsd 12.2 -
netapp santricity smi-s provider -
netapp snapcenter -
netapp oncommand workflow automation -
netapp storagegrid -
netapp oncommand insight -
netapp ontap select deploy administration utility -
netapp active iq unified manager -
netapp cloud volumes ontap mediator -
netapp e-series performance analyzer -
tenable tenable.sc *
tenable nessus *
tenable nessus network monitor 5.11.1
tenable nessus network monitor 5.12.0
tenable nessus network monitor 5.12.1
tenable nessus network monitor 5.13.0
tenable nessus network monitor 5.11.0
tenable log correlation engine *
fedoraproject fedora 34
mcafee web gateway cloud service 10.1.1
mcafee web gateway cloud service 9.2.10
mcafee web gateway cloud service 8.2.19
mcafee web gateway 10.1.1
mcafee web gateway 9.2.10
mcafee web gateway 8.2.19
checkpoint quantum security management firmware r80.40
checkpoint quantum security management firmware r81
checkpoint quantum security management -
checkpoint multi-domain management firmware r80.40
checkpoint multi-domain management firmware r81
checkpoint multi-domain management -
checkpoint quantum security gateway firmware r80.40
checkpoint quantum security gateway firmware r81
checkpoint quantum security gateway -
oracle peoplesoft enterprise peopletools 8.57
oracle jd edwards world security a9.4
oracle primavera unifier *
oracle peoplesoft enterprise peopletools 8.58
oracle primavera unifier 19.12
oracle enterprise manager for storage management 13.4.0.0
oracle primavera unifier 20.12
oracle zfs storage appliance kit 8.8
oracle secure global desktop 5.6
oracle graalvm 20.3.1.2
oracle graalvm 21.0.0.2
oracle graalvm 19.3.5
oracle mysql server *
oracle mysql server *
oracle mysql workbench *
oracle peoplesoft enterprise peopletools 8.59
oracle essbase 21.2
oracle mysql connectors *
oracle jd edwards enterpriseone tools *
oracle primavera unifier 21.12
oracle secure backup *
oracle communications communications policy management 12.6.0.0.0
sonicwall sma100 firmware *
sonicwall sma100 -
sonicwall capture client 3.5
sonicwall sonicos 7.0.1.0
siemens ruggedcom rcm1224 firmware *
siemens ruggedcom rcm1224 -
siemens scalance lpe9403 firmware *
siemens scalance lpe9403 -
siemens scalance m-800 firmware *
siemens scalance m-800 -
siemens scalance s602 firmware *
siemens scalance s602 -
siemens scalance s612 firmware *
siemens scalance s612 -
siemens scalance s615 firmware *
siemens scalance s615 -
siemens scalance s623 firmware *
siemens scalance s623 -
siemens scalance s627-2m firmware *
siemens scalance s627-2m -
siemens scalance sc-600 firmware *
siemens scalance sc-600 -
siemens scalance w700 firmware *
siemens scalance w700 -
siemens scalance w1700 firmware *
siemens scalance w1700 -
siemens scalance xb-200 firmware *
siemens scalance xb-200 -
siemens scalance xc-200 firmware *
siemens scalance xc-200 -
siemens scalance xf-200ba firmware *
siemens scalance xf-200ba -
siemens scalance xm-400 firmware *
siemens scalance xm-400 -
siemens scalance xp-200 firmware *
siemens scalance xp-200 -
siemens scalance xr-300wg firmware *
siemens scalance xr-300wg -
siemens scalance xr524-8c firmware *
siemens scalance xr524-8c -
siemens scalance xr526-8c firmware *
siemens scalance xr526-8c -
siemens scalance xr528-6m firmware *
siemens scalance xr528-6m -
siemens scalance xr552-12 firmware *
siemens scalance xr552-12 -
siemens simatic cloud connect 7 firmware -
siemens simatic cloud connect 7 firmware *
siemens simatic cloud connect 7 -
siemens simatic cp 1242-7 gprs v2 firmware -
siemens simatic cp 1242-7 gprs v2 firmware *
siemens simatic cp 1242-7 gprs v2 -
siemens simatic hmi basic panels 2nd generation firmware *
siemens simatic hmi basic panels 2nd generation -
siemens simatic hmi comfort outdoor panels firmware *
siemens simatic hmi comfort outdoor panels -
siemens simatic hmi ktp mobile panels firmware *
siemens simatic hmi ktp mobile panels -
siemens simatic mv500 firmware *
siemens simatic mv500 -
siemens simatic net cp 1243-1 firmware *
siemens simatic net cp 1243-1 -
siemens simatic net cp1243-7 lte eu firmware *
siemens simatic net cp1243-7 lte eu -
siemens simatic net cp1243-7 lte us firmware *
siemens simatic net cp1243-7 lte us -
siemens simatic net cp 1243-8 irc firmware *
siemens simatic net cp 1243-8 irc -
siemens simatic net cp 1542sp-1 irc firmware *
siemens simatic net cp 1542sp-1 irc -
siemens simatic net cp 1543-1 firmware *
siemens simatic net cp 1543-1 -
siemens simatic net cp 1543sp-1 firmware *
siemens simatic net cp 1543sp-1 -
siemens simatic net cp 1545-1 firmware *
siemens simatic net cp 1545-1 -
siemens simatic pcs 7 telecontrol firmware *
siemens simatic pcs 7 telecontrol -
siemens simatic pcs neo firmware *
siemens simatic pcs neo -
siemens simatic pdm firmware *
siemens simatic pdm -
siemens simatic process historian opc ua server firmware *
siemens simatic process historian opc ua server -
siemens simatic rf166c firmware *
siemens simatic rf166c -
siemens simatic rf185c firmware *
siemens simatic rf185c -
siemens simatic rf186c firmware *
siemens simatic rf186c -
siemens simatic rf186ci firmware *
siemens simatic rf186ci -
siemens simatic rf188c firmware *
siemens simatic rf188c -
siemens simatic rf188ci firmware *
siemens simatic rf188ci -
siemens simatic rf360r firmware *
siemens simatic rf360r -
siemens simatic s7-1200 cpu 1211c firmware *
siemens simatic s7-1200 cpu 1211c -
siemens simatic s7-1200 cpu 1212c firmware *
siemens simatic s7-1200 cpu 1212c -
siemens simatic s7-1200 cpu 1212fc firmware *
siemens simatic s7-1200 cpu 1212fc -
siemens simatic s7-1200 cpu 1214 fc firmware *
siemens simatic s7-1200 cpu 1214 fc -
siemens simatic s7-1200 cpu 1214c firmware *
siemens simatic s7-1200 cpu 1214c -
siemens simatic s7-1200 cpu 1214 fc firmware *
siemens simatic s7-1200 cpu 1214 fc -
siemens simatic s7-1200 cpu 1215 fc firmware *
siemens simatic s7-1200 cpu 1215 fc -
siemens simatic s7-1200 cpu 1215c firmware *
siemens simatic s7-1200 cpu 1215c -
siemens simatic s7-1200 cpu 1217c firmware *
siemens simatic s7-1200 cpu 1217c -
siemens simatic s7-1500 cpu 1518-4 pn/dp mfp firmware *
siemens simatic s7-1500 cpu 1518-4 pn/dp mfp -
siemens sinamics connect 300 firmware *
siemens sinamics connect 300 -
siemens tim 1531 irc firmware *
siemens tim 1531 irc -
siemens simatic wincc runtime advanced *
siemens sinema server 14.0 sp2_update1
siemens sinema server 14.0 sp1
siemens sinema server 14.0 sp2
siemens sinema server 14.0 -
siemens simatic logon *
siemens simatic logon 1.5 sp3_update_1
siemens simatic wincc telecontrol -
siemens sinec nms 1.0 sp1
siemens sinec nms 1.0 -
siemens sinec pni -
siemens sinema server 14.0 sp2_update2
siemens sinumerik opc ua server *
siemens tia administrator *
siemens sinec infrastructure network services *
nodejs node.js *
nodejs node.js *
nodejs node.js *
nodejs node.js *
nodejs node.js *
nodejs node.js *
nodejs node.js *
openssl openssl 1.1.1
ibm rational clearcase 8.0.1
ibm business process manager 8.5
ibm rational clearcase 8.0.0
ibm i 7.1
ibm i 7.2
cisco prime infrastructure -
cisco video surveillance media server -
ibm netcool/system service monitor 4.0.1
ibm i 7.3
ibm api connect 5.0.0.0
cisco evolved programmable network manager *
cisco meeting server -
ibm rational clearquest 9.0.1
ibm workload scheduler 9.4
ibm business process manager 8.6
ibm rational clearcase 9.0.1
ibm qradar security information and event manager 7.3
nodejs node.js 10
ibm workload automation 9.4
ibm sterling connect:express 1.5.0
ibm integration bus 10.0.0
ibm app connect 11.0.0.0
ibm integration bus 10.0.0.0
cisco ip conference phone 7832 -
cisco ip conference phone 8832 -
ibm i 7.4
nodejs node.js 12
ibm spectrum control 5.3.1
ibm spectrum control 5.3.2
ibm spectrum control 5.3.3
ibm spectrum control 5.3.0.1
cisco managed services accelerator -
ibm mq for hpe nonstop 8.1.0
ibm mq for hpe nonstop 8.0.4
ibm elastic storage server 6.0.0
ibm workload automation 9.5
ibm cloud private 3.2.1 cd
nodejs node.js 14.0
ibm qradar security information and event manager 7.4 -
ibm business automation workflow 18.0
ibm business automation workflow 19.0
ibm business automation workflow 20.0
ibm rational clearquest 9.0.0
ibm rational clearquest 9.0.2
ibm cloud private 3.2.2 cd
ibm spectrum control 5.3.4
ibm spectrum control 5.3.5
ibm spectrum control 5.3.6
ibm spectrum control 5.3.7
ibm api connect 10.0.0
ibm security verify access 10.0.0
ibm mq appliance 9.2.0.0
cisco webex room phone -
ibm datapower gateway 10.0.1.0
ibm mq appliance 9.2.0.1
ibm spectrum control 5.4.1
ibm security verify access 10.0.2.0
ibm cloud pak for security 1.6.0.0
ibm cloud pak for security 1.5.0.1
ibm cloud pak for security 1.5.0.0
ibm workload scheduler 9.5
ibm cloud pak for security 1.6.0.1
ibm app connect enterprise 12.0.1.0
ibm api connect 5.0.8.11
ibm cloud pak for security 1.7.0.0
ibm cloud pak for security 1.7.1.0
ibm datapower gateway 10.0.2.0
ibm datapower gateway 10.0.1.3
ibm cloud pak for security 1.7.2.0
ibm security verify access 10.0.1.0