U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2020-3264

Change History

Modified Analysis by NIST 7/19/2022 7:50:53 AM

Action Type Old Value New Value
Changed CPE Configuration
AND
     OR
          *cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 18.4.5
          *cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:* versions from (including) 19.2.0 up to (excluding) 19.2.2
          *cpe:2.3:o:cisco:sd-wan_firmware:20.1.0:*:*:*:*:*:*:*
     OR
          cpe:2.3:a:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*
          cpe:2.3:a:cisco:vmanage_network_management_system:-:*:*:*:*:*:*:*
          cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 18.4.5
          *cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:* versions from (including) 19.2.0 up to (excluding) 19.2.2
          *cpe:2.3:o:cisco:sd-wan_firmware:20.1.0:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:sd-wan_firmware:20.3.0:*:*:*:*:*:*:*
     OR
          cpe:2.3:a:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*
          cpe:2.3:a:cisco:vmanage_network_management_system:-:*:*:*:*:*:*:*
          cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*
Changed Reference Type
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r No Types Assigned
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r Exploit, Third Party Advisory