{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/434904#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nDnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.\r\n\r\nThese vulnerabilities are also tracked as [ICS-VU-668462](https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01) and referred to as [DNSpooq](https://www.jsof-tech.com/disclosures/dnspooq).\r\n\r\n### Description\r\n[Dnsmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html) is widely used open-source software that provides DNS forwarding and caching (and also a DHCP server). Dnsmasq is common in Internet-of-Things (IoT) and other embedded devices.\r\n\r\nJSOF reported multiple memory corruption vulnerabilities in dnsmasq due to  boundary checking errors in DNSSEC handling code.\r\n\r\n* CVE-2020-25681: A heap-based buffer overflow in dnsmasq in the way it sorts RRSets before validating them with DNSSEC data in an unsolicited DNS response\r\n* CVE-2020-25682: A buffer overflow vulnerability in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data\r\n* CVE-2020-25683: A heap-based buffer overflow in get_rdata subroutine of dnsmasq, when DNSSEC is enabled and before it validates the received DNS entries\r\n*  CVE-2020-25687: A heap-based buffer overflow in sort_rrset subroutine of dnsmasq, when DNSSEC is enabled and before it validates the received DNS entries\r\n\r\nJSOF also reported vulnerabilities in DNS response validation that can result in DNS cache poisoning.\r\n\r\n* CVE-2020-25684: Dnsmasq does not validate the combination of address/port and the query-id fields of DNS request when accepting DNS responses\r\n* CVE-2020-25685: Dnsmasq uses a weak hashing algorithm (CRC32) when compiled without DNSSEC to validate DNS responses\r\n* CVE-2020-25686: Dnsmasq does not check for an existing pending request for the same name and forwards a new request thus allowing an attacker to perform a [\"Birthday Attack\"](https://tools.ietf.org/html/rfc5452#section-5) scenario to forge replies and potentially poison the DNS cache\r\n\r\nNote: These cache poisoning scenarios and defenses are discussed in [IETF RFC5452](https://tools.ietf.org/html/rfc5452).\r\n\r\n### Impact\r\nThe memory corruption vulnerabilities can be triggered by a remote attacker using crafted DNS responses that can lead to denial of service, information exposure, and potentially remote code execution. The DNS response validation vulnerabilities allow an attacker to use unsolicited DNS responses to poison the DNS cache and redirect users to arbitrary sites.\r\n\r\n### Solution\r\n#### Apply updates\r\nThese vulnerabilities are addressed in [dnsmasq 2.83](http://www.thekelleys.org.uk/dnsmasq/?C=M;O=D). Users of IoT and embedded devices that use dnsmasq should contact their vendors.\r\n\r\n#### Follow security best-practices\r\nConsider the following security best-practices to protect DNS infrastructure:\r\n\r\n* Protect your DNS clients using [stateful-inspection firewall](https://www.govinfo.gov/content/pkg/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855/pdf/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855.pdf) that provide DNS  security (e.g., \r\nstateful firewalls and NAT devices can block unsolicited DNS responses, DNS application layer inspection can prevent forwarding of anomalous DNS packets).\r\n* Provide secure DNS recursion service with features such as DNSSEC validation and the interim [0x20-bit encoding](https://astrolavos.gatech.edu/articles/increased_dns_resistance.pdf) as part of enterprise DNS services where applicable. \r\n* Prevent exposure of IoT devices and lightweight devices directly over the Internet to minimize abuse of DNS.\r\n* Implement a [Secure By Default](https://en.wikipedia.org/wiki/Secure_by_default) configuration suitable for your operating environment (e.g., disable caching on embedded IoT devices when an upstream caching resolver is available).\r\n\r\n### Acknowledgements\r\nMoshe Kol and Shlomi Oberman of [JSOF](https://jsof-tech.com) researched and reported these vulnerabilities. Simon Kelley (author of dnsmasq) worked closely with collaborative vendors (Cisco, Google, Pi-Hole, Redhat) to develop patches to address these security vulnerabilities. GitHub also supported these collaboration efforts providing support to use their [GitHub Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/about-github-security-advisories) platform for collaboration.\r\n\r\nThis document was written by Vijay Sarvepalli.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"The Juniper SIRT has investigated the impact of these vulnerabilities on Juniper products.\r\nJuniper Networks Junos OS, Space, and Contrail products are unaffected by these vulnerabilities.\r\n\r\nJuniper Mist Access Points (APs) ship with Dnsmasq and are only affected by the vulnerabilities via DNS (CVE-2020-25684, CVE-2020-25685, CVE-2020-25686) 4.0/CVSS:3.1.\r\n\r\nThe Wi-Fi mPIM (Mini-PIM) card for SRX branch devices ship with Dnsmasq enabled by default and is reachable from the network. \r\nOnly vulnerabilities (CVE-2020-25684, CVE-2020-25685, CVE-2020-25686): 4.0/CVSS:3.1 via DNS affect this card.\r\n\r\nCode fixes are underway for Mist and the Mini-PIM card and customers should upgrade when those fixes are available.\r\n\r\nSecurity Incident Response Team\r\nJuniper Networks","title":"Vendor statment from Juniper Networks"},{"category":"other","text":"The package dnsmasq and/or associated binaries are not installed on F5 products, therefore they are not affected by these vulnerabilities.","title":"Vendor statment from F5 Networks"},{"category":"other","text":"Cradlepoint devices running NetCloud OS (NCOS) use dnsmasq for domain resolution, domain caching and DHCP services on the local LAN. DNS is a configurable service within NCOS therefore possible configuration states and potential impacts are listed.\r\n\r\n**Affected Components:** NCOS versions up to 7.21.20\r\n\r\n**Recommendations:**\r\n<br>Promptly test and upgrade to the latest NCOS version upon release\r\n<br>Disable (do not enable) DNSSEC until patched\r\n<br>Authenticate clients to the LAN using 802.1X\r\n<br>Do not configure firewall to expose DNS services (UDP port 53) on WAN interfaces\r\n\r\n### Default Configuration: DNSSEC disabled\r\n**Cradlepoint Severity:** Low/Medium (dependent upon environment)\r\n<br>**Potentially Impacted:** Local LAN users, clients and services\r\n<br>**Potential attack path:** Local LAN\r\n<br>**Associated CVEs:** CVE-2020-25684, CVE-2020-25685, CVE-2020-25686\r\n\r\n### Modified Configuration: DNSSEC enabled\r\n**Cradlepoint Severity:** Medium/High (dependent upon environment) \r\n<br>**Potentially Impacted:** Device and sub-services; Local LAN users, clients and services\r\n<br>**Potential attack path:** Local LAN\r\n<br>**Associated CVEs:** CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687\r\n\r\n### Modified Configuration: DNS services exposed on WAN\r\n**Cradlepoint Severity:** Critical (dependent upon environment)\r\n<br>**Potentially Impacted:** See above\r\n<br>**Potential attack paths:** \r\nWAN interfaces; Local LAN\r\n<br>**Associated CVEs:** See above","title":"Vendor statment from Cradlepoint"},{"category":"other","text":"Sierra Wireless products are affected by some of these vulnerabilities. Please check the security bulletin linked in the reference section for details on your product.\r\nSierra Wireless would like to thank JSOF for discovering and responsibly reporting these issues, as well as the efforts of CERT/CC for coordinating the response.","title":"Vendor statment from Sierra Wireless"},{"category":"other","text":"Digi International has patched this in firmware versions 21.2.X.X on all of our DAL based products, which includes:\r\nDigi AnywhereUSB Plus 2\r\nDigi AnywhereUSB Plus 8\r\nDigi AnywhereUSB Plus 8 WiFi\r\nDigi AnywhereUSB Plus 24\r\nDigi AnywhereUSB Plus 24 WiFi\r\nDigi Connect EZ1 (mini)\r\nDigi Connect EZ2\r\nDigi Connect EZ4\r\nDigi ConnectIT4\r\nDigi ConnectIT16\r\nDigi ConnectIT48\r\nDigi ConnectIT-Mini\r\nDigi EX15\r\nDigi EX15-PR\r\nDigi EX15W\r\nDigi EX15W-PR\r\nDigi EX12\r\nDigi EX12-PR\r\nDigi IX10\r\nDigi IX14\r\nDigi IX15\r\nDigi IX20\r\n\r\nDigi IX20-PR\r\nDigi IX20W\r\nDigi IX20W-PR\r\nDigi LR54\r\nDigi LR54W\r\nDigi TX54-Dual-Cellular\r\nDigi TX54-Dual-Cellular-PR\r\nDigi TX54-Dual-Wi-Fi\r\nDigi TX54-Single-Cellular\r\nDigi TX54-Single-Cellular-PR\r\nDigi TX64\r\nDigi TX64-PR\r\nDigi TX64-Rail-Single-Cellular-PR\r\nDigi VirtualDAL\r\nDigi VirtualDAL-PR\r\nAcceleratedConcepts 6350-SR\r\nAcceleratedConcepts 6355-SR\r\nAcceleratedConcepts 6330-MX\r\nAcceleratedConcepts 6335-MX\r\nAcceleratedConcepts 6310-DX\r\nAcceleratedConcepts 5400-RM\r\nAcceleratedConcepts 5401-RM\r\nAcceleratedConcepts 6300-CX","title":"Vendor statment from Digi International"},{"category":"other","text":"While Android does have Dnsmasq code but it is used in a limited capacity and cannot be attacked or exploited in the manner described in this report.","title":"Vendor statment from Android Open Source Project"},{"category":"other","text":"Treck does not use Dnsmasq.","title":"Vendor statment from Treck"},{"category":"other","text":"OpenWrt shipps the following variants:\r\n* dnsmasq\r\n* dnsmasq-dhcpv6\r\n* dnsmasq-full\r\n\r\nOnly dnsmasq-full has support for DNSSEC and only this variant is affected by the problems in the DNSSEC code as far as we understand them. The other problems affect all variants.\r\nThe default installation contains  the dnsmasq package only, but the user can install the other variants.","title":"Vendor statment from OpenWRT"},{"category":"other","text":"Fujitsu is aware of the security vulnerabilities in software dnsmasq, also known as \"DNSpooq\". \r\n\r\nAffected products are Fujitsu INTELLIEDGE, Fujitsu ServerView Services for ISM, Fujitsu SOA SysRollout Service, Fujitsu SOA Profile Management Service, Fujitsu ISM (Core) and Fujitsu FlexFrame Orchestrator (SAP). Updates are pending or already available.\r\n\r\nThe Fujitsu PSIRT has updated the state for Fujitsu PSIRT-IS-2021-011900 on https://security.ts.fujitsu.com (Security Notices) accordingly.\r\n\r\nIn case of questions regarding this Fujitsu PSIRT Security Notice, please contact the Fujitsu PSIRT (Fujitsu-PSIRT@ts.fujitsu.com).","title":"Vendor statment from Fujitsu Europe"},{"category":"other","text":"Not Affected.","title":"Vendor statment from F-Secure Corporation"},{"category":"other","text":"NetBSD does not ship dnsmasq and is not affected.\r\n\r\npkgsrc users, on any platform, who have elected to install net/dnsmasq may be affected, and were informed back in 2020 through the pkg-vulnerabilities database.","title":"Vendor statment from NetBSD"},{"category":"other","text":"D-Link has been informed that DNSmasq, a popular caching DNS server and DHCP server, is vulnerable to DNS cache poisoning attacks. We have promptly started our investigation to determine whether D-Link routers are affected, and we will provide updates as soon as we have more information.\r\n\r\nD-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures. Please check the D-Link website for updates.","title":"Vendor statment from D-Link Systems Inc."},{"category":"other","text":"The Zephyr project consists of a core RTOS, numerous additional modules, and an extensive suite of test builds and test cases. This vulnerability does not directly affect the RTOS, or the additional modules. However, some of the test cases use the dnsmasq tool, which could render these testing environment vulnerable. In these test cases, the dnsmasq tool is used strictly by RTOS+test code running within the QEMU simulation environment. Attacks on dnsmasq could result in test failures causing a denial of service to the project (due to incorrect failures).","title":"Vendor statment from Zephyr Project"},{"category":"other","text":"Netgear has released fixes for multiple Dnsmasq security vulnerabilities on the following product affected models:\r\nRAX40 running firmware versions prior to v1.0.3.88\r\nRAX35 running firmware versions prior to v1.0.3.88\r\n\r\nNETGEAR strongly recommends that you download the latest firmware as soon as possible.\r\n\r\nYou and follow the steps mentioned in the security advisory to upgrade it to the latest version.\r\nhttps://kb.netgear.com/000062628/Security-Advisory-for-Multiple-Dnsmasq-Vulnerabilities-on-Some-Routers-PSV-2020-0463\r\n\r\nThanks,\r\nRachit Dogra","title":"Vendor statment from NETGEAR"},{"category":"other","text":"As a best practice for IBM Z, IBM strongly recommends that clients obtain access to the IBM Z and LinuxONE Security Portal and subscribe to the Security Portal’s automatic notification process to get access to the latest service information on security and system integrity related APARs for z/OS and z/VM.","title":"Vendor statment from IBM Corporation (zseries)"},{"category":"other","text":"Siemens is aware of the security vulnerabilities in the Open Source component DNSmasq, as disclosed on 2021-01-19 and also known as \"DNSpooq\".\r\n\r\nThe impact to Siemens products is described in the Security Advisory SSA-646763, published on the Siemens ProductCERT page (https://www.siemens.com/cert/advisories).\r\n\r\nIn case of questions regarding this Security Advisory, please contact Siemens ProductCERT (productcert@siemens.com).","title":"Vendor statment from Siemens"},{"category":"other","text":"Sophos Red devices are impacted. More information to follow","title":"Vendor statment from Sophos"},{"category":"other","text":"Espressif doesn't use dnsmasq in any product SDKs or other published software, so is not affected.","title":"Vendor statment from Espressif Systems"},{"category":"other","text":"Check Point Gaia is not vulnerable.\r\n\r\nCheck Point SMB is vulnerable to CVE-2020-25686, CVE-2020-25684, CVE-2020-25685 on internal (LAN, Wi-Fi) networks. And updated firware is available at https://supportcenter.checkpoint.com/","title":"Vendor statment from Check Point"},{"category":"other","text":"lwIP does not use dnsmasq code. We've had similar bugs like 1 and 2 here in the past (with their own CVE), but these have been fixed quite a while ago.","title":"Vendor statment from lwIP"},{"category":"other","text":"No Brocade Fibre Channel Products from Broadcom are currently known to be affected by these vulnerabilities.","title":"Vendor statment from Brocade Communication Systems"},{"category":"other","text":"FreeBSD does not ship with dnsmasq as part of the base system. dnsmasq is available as part of the FreeBSD ports/pkg system, but the responsibility for analysis of risk lies with the administrator that chooses to install and configure dnsmasq.","title":"Vendor statment from FreeBSD"},{"category":"other","text":"we do not use dnsmasq in our products","title":"Vendor statment from Actiontec"},{"category":"other","text":"eero products do not use the affected functionality of the affected software products, and so are unaffected by these vulnerabilities.","title":"Vendor statment from eero"},{"category":"other","text":"LANCOM Systems products are not affected by these vulnerabilities.","title":"Vendor statment from LANCOM Systems GmbH"},{"category":"other","text":"Do not use/supply Dnsmasq","title":"Vendor statment from eCosCentric"},{"category":"other","text":"Dnsmasq not used in MikroTik software","title":"Vendor statment from MikroTik"},{"category":"other","text":"dnsmasq is not used.","title":"Vendor statment from Miredo"},{"category":"other","text":"Dnsmasq is not used in current and supported A10 Networks, Inc products.","title":"Vendor statment from A10 Networks"},{"category":"other","text":"AVM doesn't use the dnsmasq project within its firmwares.","title":"Vendor statment from AVM GmbH"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/434904"},{"url":"https://www.kb.cert.org/vuls/id/800113","summary":"https://www.kb.cert.org/vuls/id/800113"},{"url":"https://kb.cert.org/vuls/id/973527","summary":"https://kb.cert.org/vuls/id/973527"},{"url":"https://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRICIII_9-12-12_WG4-FINAL-Report-DNS-Best-Practices.pdf","summary":"https://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRICIII_9-12-12_WG4-FINAL-Report-DNS-Best-Practices.pdf"},{"url":"https://astrolavos.gatech.edu/articles/increased_dns_resistance.pdf","summary":"https://astrolavos.gatech.edu/articles/increased_dns_resistance.pdf"},{"url":"https://www.icann.org/news/blog/security-best-practices-dnssec-validation","summary":"https://www.icann.org/news/blog/security-best-practices-dnssec-validation"},{"url":"http://www.thekelleys.org.uk/dnsmasq/doc.html","summary":"http://www.thekelleys.org.uk/dnsmasq/doc.html"},{"url":"https://www.jsof-tech.com/disclosures/dnspooq","summary":"https://www.jsof-tech.com/disclosures/dnspooq"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g","summary":"Reference(s) from vendor \"Cisco\""},{"url":"https://cradlepoint.com/about-us/trust/","summary":"Reference(s) from vendor \"Cradlepoint\""},{"url":"https://sierrawireless.com/security","summary":"Reference(s) from vendor \"Sierra Wireless\""},{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2021-002/","summary":"Reference(s) from vendor \"Sierra Wireless\""},{"url":"https://ftp1.digi.com/support/firmware/dal/ConnectIT/ConnectIT_21.2.39.67_93001322.pdf","summary":"Reference(s) from vendor \"Digi International\""},{"url":"https://openwrt.org/advisory/2021-01-19-1","summary":"Reference(s) from vendor \"OpenWRT\""},{"url":"https://kb.netgear.com/000062628/Security-Advisory-for-Multiple-Dnsmasq-Vulnerabilities-on-Some-Routers-PSV-2020-0463","summary":"Reference(s) from vendor \"NETGEAR\""},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-646763.pdf","summary":"Reference(s) from vendor \"Siemens\""},{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"Reference(s) from vendor \"Sophos\""},{"url":"https://access.redhat.com/security/vulnerabilities/RHSB-2021-001","summary":"Reference(s) from vendor \"Red Hat\""},{"url":"https://www.synology.com/security/advisory/Synology_SA_21_01","summary":"Reference(s) from vendor \"Synology\""}],"title":"Dnsmasq is vulnerable to memory corruption and cache poisoning","tracking":{"current_release_date":"2024-08-19T18:19:41+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#434904","initial_release_date":"2021-01-19 17:25:26.246669+00:00","revision_history":[{"date":"2024-08-19T18:19:41+00:00","number":"1.20240819181941.15","summary":"Released on 2024-08-19T18:19:41+00:00"}],"status":"final","version":"1.20240819181941.15"}},"vulnerabilities":[{"title":"A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled\r\nand before it validates the received DNS entries.","notes":[{"category":"summary","text":"A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled\r\nand before it validates the received DNS entries. A remote attacker, who can\r\ncreate valid DNS replies, could use this flaw to cause an overflow in a\r\nheap-allocated memory. This flaw is caused by the lack of length checks in\r\nrfc1035.c:extract_name(), which could be abused to make the code execute\r\nmemcpy() with a negative size in get_rdata() and cause a crash in dnsmasq,\r\nresulting in a Denial of Service."}],"cve":"CVE-2020-25683","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"},{"url":"https://access.redhat.com/security/cve/cve-2020-25683","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"}],"product_status":{"known_affected":["CSAFPID-41525960-39e5-11f1-8422-122e2785dc9f","CSAFPID-4152aa28-39e5-11f1-8422-122e2785dc9f","CSAFPID-41542ae2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4154bd72-39e5-11f1-8422-122e2785dc9f","CSAFPID-4155b880-39e5-11f1-8422-122e2785dc9f","CSAFPID-4157300c-39e5-11f1-8422-122e2785dc9f","CSAFPID-4157d8cc-39e5-11f1-8422-122e2785dc9f","CSAFPID-415a0e4e-39e5-11f1-8422-122e2785dc9f","CSAFPID-415adbc6-39e5-11f1-8422-122e2785dc9f","CSAFPID-415b228e-39e5-11f1-8422-122e2785dc9f","CSAFPID-415b7518-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-414eb51c-39e5-11f1-8422-122e2785dc9f","CSAFPID-414efa68-39e5-11f1-8422-122e2785dc9f","CSAFPID-414fa33c-39e5-11f1-8422-122e2785dc9f","CSAFPID-414fe130-39e5-11f1-8422-122e2785dc9f","CSAFPID-4150325c-39e5-11f1-8422-122e2785dc9f","CSAFPID-415080a4-39e5-11f1-8422-122e2785dc9f","CSAFPID-41511ac8-39e5-11f1-8422-122e2785dc9f","CSAFPID-4151bb5e-39e5-11f1-8422-122e2785dc9f","CSAFPID-415204b0-39e5-11f1-8422-122e2785dc9f","CSAFPID-4152f334-39e5-11f1-8422-122e2785dc9f","CSAFPID-41532aac-39e5-11f1-8422-122e2785dc9f","CSAFPID-41536828-39e5-11f1-8422-122e2785dc9f","CSAFPID-4153a59a-39e5-11f1-8422-122e2785dc9f","CSAFPID-4153ded4-39e5-11f1-8422-122e2785dc9f","CSAFPID-4154701a-39e5-11f1-8422-122e2785dc9f","CSAFPID-4154f8d2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41553040-39e5-11f1-8422-122e2785dc9f","CSAFPID-41557ae6-39e5-11f1-8422-122e2785dc9f","CSAFPID-415600ec-39e5-11f1-8422-122e2785dc9f","CSAFPID-41563bde-39e5-11f1-8422-122e2785dc9f","CSAFPID-4156c306-39e5-11f1-8422-122e2785dc9f","CSAFPID-4157852a-39e5-11f1-8422-122e2785dc9f","CSAFPID-415823b8-39e5-11f1-8422-122e2785dc9f","CSAFPID-41587bce-39e5-11f1-8422-122e2785dc9f","CSAFPID-41590a94-39e5-11f1-8422-122e2785dc9f","CSAFPID-41595e7c-39e5-11f1-8422-122e2785dc9f","CSAFPID-415996b2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4159dd02-39e5-11f1-8422-122e2785dc9f","CSAFPID-415a454e-39e5-11f1-8422-122e2785dc9f","CSAFPID-415a7136-39e5-11f1-8422-122e2785dc9f","CSAFPID-415aacdc-39e5-11f1-8422-122e2785dc9f","CSAFPID-415bb49c-39e5-11f1-8422-122e2785dc9f","CSAFPID-415c0208-39e5-11f1-8422-122e2785dc9f","CSAFPID-415c3b42-39e5-11f1-8422-122e2785dc9f","CSAFPID-415cb02c-39e5-11f1-8422-122e2785dc9f","CSAFPID-415ce498-39e5-11f1-8422-122e2785dc9f","CSAFPID-415d2192-39e5-11f1-8422-122e2785dc9f","CSAFPID-415d5f7c-39e5-11f1-8422-122e2785dc9f","CSAFPID-415d8a10-39e5-11f1-8422-122e2785dc9f","CSAFPID-415ddfb0-39e5-11f1-8422-122e2785dc9f"]}},{"title":"A heap-based buffer overflow was discovered in dnsmasq in the way it sorts\r\nRRSets before validating them with DNSSEC data.","notes":[{"category":"summary","text":"A heap-based buffer overflow was discovered in dnsmasq in the way it sorts\r\nRRSets before validating them with DNSSEC data. An attacker on the network,\r\nwho can forge DNS replies such as that they are accepted as valid, could use\r\nthis flaw to cause an overflow with arbitrary data in a heap-allocated memory,\r\npossibly executing code on the machine."}],"cve":"CVE-2020-25681","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"},{"url":"https://access.redhat.com/security/cve/cve-2020-25681","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"}],"product_status":{"known_affected":["CSAFPID-4161d836-39e5-11f1-8422-122e2785dc9f","CSAFPID-41620496-39e5-11f1-8422-122e2785dc9f","CSAFPID-4163e4f0-39e5-11f1-8422-122e2785dc9f","CSAFPID-416417b8-39e5-11f1-8422-122e2785dc9f","CSAFPID-4164a372-39e5-11f1-8422-122e2785dc9f","CSAFPID-41674276-39e5-11f1-8422-122e2785dc9f","CSAFPID-4167b008-39e5-11f1-8422-122e2785dc9f","CSAFPID-4169800e-39e5-11f1-8422-122e2785dc9f","CSAFPID-416a5a9c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416a8a8a-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-415e74ca-39e5-11f1-8422-122e2785dc9f","CSAFPID-415ebe76-39e5-11f1-8422-122e2785dc9f","CSAFPID-415f6b46-39e5-11f1-8422-122e2785dc9f","CSAFPID-415fba9c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416004f2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4160603c-39e5-11f1-8422-122e2785dc9f","CSAFPID-4160ed40-39e5-11f1-8422-122e2785dc9f","CSAFPID-416128f0-39e5-11f1-8422-122e2785dc9f","CSAFPID-41619b0a-39e5-11f1-8422-122e2785dc9f","CSAFPID-4162433e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41627584-39e5-11f1-8422-122e2785dc9f","CSAFPID-4162aa54-39e5-11f1-8422-122e2785dc9f","CSAFPID-416310f2-39e5-11f1-8422-122e2785dc9f","CSAFPID-416341f8-39e5-11f1-8422-122e2785dc9f","CSAFPID-41636f7a-39e5-11f1-8422-122e2785dc9f","CSAFPID-4163b17e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41646542-39e5-11f1-8422-122e2785dc9f","CSAFPID-4164f78c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416593cc-39e5-11f1-8422-122e2785dc9f","CSAFPID-4165dbc0-39e5-11f1-8422-122e2785dc9f","CSAFPID-416626f2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41667c60-39e5-11f1-8422-122e2785dc9f","CSAFPID-4167028e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41677c6e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41681354-39e5-11f1-8422-122e2785dc9f","CSAFPID-41684c84-39e5-11f1-8422-122e2785dc9f","CSAFPID-4168a436-39e5-11f1-8422-122e2785dc9f","CSAFPID-4168e374-39e5-11f1-8422-122e2785dc9f","CSAFPID-41690eee-39e5-11f1-8422-122e2785dc9f","CSAFPID-41694864-39e5-11f1-8422-122e2785dc9f","CSAFPID-4169b02e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4169f228-39e5-11f1-8422-122e2785dc9f","CSAFPID-416a1f64-39e5-11f1-8422-122e2785dc9f","CSAFPID-416ab5e6-39e5-11f1-8422-122e2785dc9f","CSAFPID-416adc6a-39e5-11f1-8422-122e2785dc9f","CSAFPID-416b3c78-39e5-11f1-8422-122e2785dc9f","CSAFPID-416bb2b6-39e5-11f1-8422-122e2785dc9f","CSAFPID-416bec68-39e5-11f1-8422-122e2785dc9f","CSAFPID-416c3f9c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416c7520-39e5-11f1-8422-122e2785dc9f"]}},{"title":"A flaw was found when receiving a query, where dnsmasq does not check for an\r\nexisting pending request for the same name and forwards a new request.","notes":[{"category":"summary","text":"A flaw was found when receiving a query, where dnsmasq does not check for an\r\nexisting pending request for the same name and forwards a new request. By\r\ndefault, a maximum of 150 pending queries can be sent to upstream servers, so\r\nthere can be at most 150 queries for the same name. This flaw allows an\r\noff-path attacker on the network to substantially reduce the number of\r\nattempts that would have to be performed to forge a reply and have it accepted\r\nby dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of\r\nRFC5452. If chained with CVE-2020-25684, the attack complexity of a successful\r\nattack is reduced."}],"cve":"CVE-2020-25686","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8. Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV) are indirectly affected as well.","category":"external"},{"url":"https://access.redhat.com/security/cve/cve-2020-25686","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8. Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV) are indirectly affected as well.","category":"external"}],"product_status":{"known_affected":["CSAFPID-416e07fa-39e5-11f1-8422-122e2785dc9f","CSAFPID-416e6f1a-39e5-11f1-8422-122e2785dc9f","CSAFPID-416f9b4c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416fda1c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41702d96-39e5-11f1-8422-122e2785dc9f","CSAFPID-417067ac-39e5-11f1-8422-122e2785dc9f","CSAFPID-4170ca94-39e5-11f1-8422-122e2785dc9f","CSAFPID-41716f80-39e5-11f1-8422-122e2785dc9f","CSAFPID-4171b7d8-39e5-11f1-8422-122e2785dc9f","CSAFPID-41723b40-39e5-11f1-8422-122e2785dc9f","CSAFPID-417323f2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4173b6be-39e5-11f1-8422-122e2785dc9f","CSAFPID-41754a60-39e5-11f1-8422-122e2785dc9f","CSAFPID-41763d8a-39e5-11f1-8422-122e2785dc9f","CSAFPID-417682f4-39e5-11f1-8422-122e2785dc9f","CSAFPID-417767fa-39e5-11f1-8422-122e2785dc9f","CSAFPID-417790d6-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-416d0abc-39e5-11f1-8422-122e2785dc9f","CSAFPID-416d32bc-39e5-11f1-8422-122e2785dc9f","CSAFPID-416d6d40-39e5-11f1-8422-122e2785dc9f","CSAFPID-416d9a72-39e5-11f1-8422-122e2785dc9f","CSAFPID-416dcc72-39e5-11f1-8422-122e2785dc9f","CSAFPID-416e406c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416eae1c-39e5-11f1-8422-122e2785dc9f","CSAFPID-416ee224-39e5-11f1-8422-122e2785dc9f","CSAFPID-416f2112-39e5-11f1-8422-122e2785dc9f","CSAFPID-416f5c18-39e5-11f1-8422-122e2785dc9f","CSAFPID-41709fa6-39e5-11f1-8422-122e2785dc9f","CSAFPID-4170f6d6-39e5-11f1-8422-122e2785dc9f","CSAFPID-4171465e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4171f5b8-39e5-11f1-8422-122e2785dc9f","CSAFPID-417284ba-39e5-11f1-8422-122e2785dc9f","CSAFPID-41740452-39e5-11f1-8422-122e2785dc9f","CSAFPID-41744f02-39e5-11f1-8422-122e2785dc9f","CSAFPID-41749692-39e5-11f1-8422-122e2785dc9f","CSAFPID-4174d1ac-39e5-11f1-8422-122e2785dc9f","CSAFPID-4175d552-39e5-11f1-8422-122e2785dc9f","CSAFPID-41760b1c-39e5-11f1-8422-122e2785dc9f","CSAFPID-4176dfe2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41771f84-39e5-11f1-8422-122e2785dc9f","CSAFPID-4177c344-39e5-11f1-8422-122e2785dc9f","CSAFPID-41780782-39e5-11f1-8422-122e2785dc9f","CSAFPID-4178331a-39e5-11f1-8422-122e2785dc9f"]}},{"title":"A buffer overflow vulnerability was discovered in the way dnsmasq extract\r\nnames from DNS packets before validating them with DNSSEC data.","notes":[{"category":"summary","text":"A buffer overflow vulnerability was discovered in the way dnsmasq extract\r\nnames from DNS packets before validating them with DNSSEC data. An attacker on\r\nthe network, who can create valid DNS replies, could use this flaw to cause an\r\noverflow with arbitrary data in a heap-allocated memory, possibly executing\r\ncode on the machine. The flaw is in rfc1035.c:extract_name() function, which\r\nwrites data to the memory pointed by name assuming MAXDNAME*2 bytes are\r\navailable in the buffer. However, in some code execution paths it is possible\r\nextract_name() gets passed an offset from the base buffer, thus reducing in\r\npractice the number of available bytes that can be written in the buffer."}],"cve":"CVE-2020-25682","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?vector=(AV:N/AC:H/Au:N/C:N/I:P/A:P/E:POC/RL:U/RC:C)","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"},{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"},{"url":"https://access.redhat.com/security/cve/cve-2020-25682","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"}],"product_status":{"known_affected":["CSAFPID-417b4ea6-39e5-11f1-8422-122e2785dc9f","CSAFPID-417bd6f0-39e5-11f1-8422-122e2785dc9f","CSAFPID-417d5f20-39e5-11f1-8422-122e2785dc9f","CSAFPID-417d9ea4-39e5-11f1-8422-122e2785dc9f","CSAFPID-417e1c94-39e5-11f1-8422-122e2785dc9f","CSAFPID-41810418-39e5-11f1-8422-122e2785dc9f","CSAFPID-418195d6-39e5-11f1-8422-122e2785dc9f","CSAFPID-4183fa2e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4184e5ba-39e5-11f1-8422-122e2785dc9f","CSAFPID-4185244e-39e5-11f1-8422-122e2785dc9f","CSAFPID-418568e6-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-4178c212-39e5-11f1-8422-122e2785dc9f","CSAFPID-41790254-39e5-11f1-8422-122e2785dc9f","CSAFPID-4179480e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4179b6ae-39e5-11f1-8422-122e2785dc9f","CSAFPID-4179ebc4-39e5-11f1-8422-122e2785dc9f","CSAFPID-417a3340-39e5-11f1-8422-122e2785dc9f","CSAFPID-417acb8e-39e5-11f1-8422-122e2785dc9f","CSAFPID-417b0a22-39e5-11f1-8422-122e2785dc9f","CSAFPID-417b8ee8-39e5-11f1-8422-122e2785dc9f","CSAFPID-417c15ca-39e5-11f1-8422-122e2785dc9f","CSAFPID-417c4d38-39e5-11f1-8422-122e2785dc9f","CSAFPID-417c9874-39e5-11f1-8422-122e2785dc9f","CSAFPID-417cd000-39e5-11f1-8422-122e2785dc9f","CSAFPID-417d0548-39e5-11f1-8422-122e2785dc9f","CSAFPID-417d2fdc-39e5-11f1-8422-122e2785dc9f","CSAFPID-417ddfe0-39e5-11f1-8422-122e2785dc9f","CSAFPID-417e6776-39e5-11f1-8422-122e2785dc9f","CSAFPID-417f0820-39e5-11f1-8422-122e2785dc9f","CSAFPID-417f93ee-39e5-11f1-8422-122e2785dc9f","CSAFPID-417fe902-39e5-11f1-8422-122e2785dc9f","CSAFPID-41802426-39e5-11f1-8422-122e2785dc9f","CSAFPID-4180b918-39e5-11f1-8422-122e2785dc9f","CSAFPID-41815526-39e5-11f1-8422-122e2785dc9f","CSAFPID-4181d38e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41820be2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4182a944-39e5-11f1-8422-122e2785dc9f","CSAFPID-4183130c-39e5-11f1-8422-122e2785dc9f","CSAFPID-418364e2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4183ab0a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41843ff2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41848b88-39e5-11f1-8422-122e2785dc9f","CSAFPID-4185a036-39e5-11f1-8422-122e2785dc9f","CSAFPID-4185e99c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41862a4c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41866778-39e5-11f1-8422-122e2785dc9f","CSAFPID-4186e09a-39e5-11f1-8422-122e2785dc9f","CSAFPID-418725b4-39e5-11f1-8422-122e2785dc9f","CSAFPID-418768f8-39e5-11f1-8422-122e2785dc9f","CSAFPID-4187aebc-39e5-11f1-8422-122e2785dc9f","CSAFPID-4187d95a-39e5-11f1-8422-122e2785dc9f"]}},{"title":"When getting a reply from a forwarded query, dnsmasq checks in\r\nforward.","notes":[{"category":"summary","text":"When getting a reply from a forwarded query, dnsmasq checks in\r\nforward.c:reply_query() which one is the forwarded query that matches the\r\nreply, by only using a weak hash of the query name. Due to the weak hash\r\n(CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) an off-path\r\nattacker can find several different domains all having the same hash,\r\nsubstantially reducing the number of attempts he would have to perform to\r\nforge a reply and get it accepted by dnsmasq. This is in contrast with\r\nRFC5452, which specifies that query name is one of the attributes of a query\r\nthat must be used to match a reply. This flaw could be abused to perform a DNS\r\nCache Poisoning attack. If chained with CVE-2020-25684 the attack complexity\r\nof a successful attack is reduced."}],"cve":"CVE-2020-25685","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://access.redhat.com/security/cve/cve-2020-25685","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8. Red Hat Enterprise Linux 8 provides dnsmasq compiled with DNSSEC support, thus SHA-1 is used as a hash for query names instead of CRC32, making collisions harder to find. Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV) are indirectly affected as well.","category":"external"},{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","category":"external"}],"product_status":{"known_affected":["CSAFPID-4188d03a-39e5-11f1-8422-122e2785dc9f","CSAFPID-418b4fcc-39e5-11f1-8422-122e2785dc9f","CSAFPID-418c51e2-39e5-11f1-8422-122e2785dc9f","CSAFPID-418cd982-39e5-11f1-8422-122e2785dc9f","CSAFPID-418d2662-39e5-11f1-8422-122e2785dc9f","CSAFPID-418d669a-39e5-11f1-8422-122e2785dc9f","CSAFPID-418dbf82-39e5-11f1-8422-122e2785dc9f","CSAFPID-418e5c80-39e5-11f1-8422-122e2785dc9f","CSAFPID-418eb824-39e5-11f1-8422-122e2785dc9f","CSAFPID-418ef6d6-39e5-11f1-8422-122e2785dc9f","CSAFPID-418fde7a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41903adc-39e5-11f1-8422-122e2785dc9f","CSAFPID-419163da-39e5-11f1-8422-122e2785dc9f","CSAFPID-419247a0-39e5-11f1-8422-122e2785dc9f","CSAFPID-419385a2-39e5-11f1-8422-122e2785dc9f","CSAFPID-4193ceb8-39e5-11f1-8422-122e2785dc9f","CSAFPID-4194f3d8-39e5-11f1-8422-122e2785dc9f","CSAFPID-41957b50-39e5-11f1-8422-122e2785dc9f","CSAFPID-4195e586-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-4188626c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41890a1e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41894d1c-39e5-11f1-8422-122e2785dc9f","CSAFPID-4189948e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4189c79c-39e5-11f1-8422-122e2785dc9f","CSAFPID-418a2bb0-39e5-11f1-8422-122e2785dc9f","CSAFPID-418a69ae-39e5-11f1-8422-122e2785dc9f","CSAFPID-418af932-39e5-11f1-8422-122e2785dc9f","CSAFPID-418b918a-39e5-11f1-8422-122e2785dc9f","CSAFPID-418bc010-39e5-11f1-8422-122e2785dc9f","CSAFPID-418c145c-39e5-11f1-8422-122e2785dc9f","CSAFPID-418c938c-39e5-11f1-8422-122e2785dc9f","CSAFPID-418d9020-39e5-11f1-8422-122e2785dc9f","CSAFPID-418dff38-39e5-11f1-8422-122e2785dc9f","CSAFPID-418e8412-39e5-11f1-8422-122e2785dc9f","CSAFPID-418fa0d6-39e5-11f1-8422-122e2785dc9f","CSAFPID-41900b98-39e5-11f1-8422-122e2785dc9f","CSAFPID-419078da-39e5-11f1-8422-122e2785dc9f","CSAFPID-4190b4e4-39e5-11f1-8422-122e2785dc9f","CSAFPID-41919fa8-39e5-11f1-8422-122e2785dc9f","CSAFPID-4191ddec-39e5-11f1-8422-122e2785dc9f","CSAFPID-41921956-39e5-11f1-8422-122e2785dc9f","CSAFPID-4192a6b4-39e5-11f1-8422-122e2785dc9f","CSAFPID-4192f1e6-39e5-11f1-8422-122e2785dc9f","CSAFPID-41934aec-39e5-11f1-8422-122e2785dc9f","CSAFPID-41941e18-39e5-11f1-8422-122e2785dc9f","CSAFPID-419461c0-39e5-11f1-8422-122e2785dc9f","CSAFPID-4194b58a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41953410-39e5-11f1-8422-122e2785dc9f","CSAFPID-4195b19c-39e5-11f1-8422-122e2785dc9f","CSAFPID-419612ae-39e5-11f1-8422-122e2785dc9f","CSAFPID-419645f8-39e5-11f1-8422-122e2785dc9f"]}},{"title":"A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled\r\nand before it validates the received DNS entries.","notes":[{"category":"summary","text":"A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled\r\nand before it validates the received DNS entries. A remote attacker, who can\r\ncreate valid DNS replies, could use this flaw to cause an overflow in a\r\nheap-allocated memory. This flaw is caused by the lack of length checks in\r\nrfc1035.c:extract_name(), which could be abused to make the code execute\r\nmemcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq,\r\nresulting in a Denial of Service."}],"cve":"CVE-2020-25687","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://access.redhat.com/security/cve/cve-2020-25687","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 8, but it does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 because they are not compiled with DNSSEC support.","category":"external"},{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","category":"external"}],"product_status":{"known_affected":["CSAFPID-4197318e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41985c9e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4199c3d6-39e5-11f1-8422-122e2785dc9f","CSAFPID-419ae2d4-39e5-11f1-8422-122e2785dc9f","CSAFPID-419b0c8c-39e5-11f1-8422-122e2785dc9f","CSAFPID-419b8eaa-39e5-11f1-8422-122e2785dc9f","CSAFPID-419e8308-39e5-11f1-8422-122e2785dc9f","CSAFPID-419f8e2e-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-4196be8e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41970042-39e5-11f1-8422-122e2785dc9f","CSAFPID-4197750e-39e5-11f1-8422-122e2785dc9f","CSAFPID-4197ab96-39e5-11f1-8422-122e2785dc9f","CSAFPID-4197d792-39e5-11f1-8422-122e2785dc9f","CSAFPID-41980e4c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41988624-39e5-11f1-8422-122e2785dc9f","CSAFPID-4198f8a2-39e5-11f1-8422-122e2785dc9f","CSAFPID-419925c0-39e5-11f1-8422-122e2785dc9f","CSAFPID-419969c2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41999c1c-39e5-11f1-8422-122e2785dc9f","CSAFPID-419a0f62-39e5-11f1-8422-122e2785dc9f","CSAFPID-419a3e56-39e5-11f1-8422-122e2785dc9f","CSAFPID-419a7074-39e5-11f1-8422-122e2785dc9f","CSAFPID-419aa242-39e5-11f1-8422-122e2785dc9f","CSAFPID-419b4fc6-39e5-11f1-8422-122e2785dc9f","CSAFPID-419bdf7c-39e5-11f1-8422-122e2785dc9f","CSAFPID-419c9976-39e5-11f1-8422-122e2785dc9f","CSAFPID-419ce160-39e5-11f1-8422-122e2785dc9f","CSAFPID-419d0cc6-39e5-11f1-8422-122e2785dc9f","CSAFPID-419d404c-39e5-11f1-8422-122e2785dc9f","CSAFPID-419d7ee0-39e5-11f1-8422-122e2785dc9f","CSAFPID-419db4fa-39e5-11f1-8422-122e2785dc9f","CSAFPID-419df172-39e5-11f1-8422-122e2785dc9f","CSAFPID-419e32a4-39e5-11f1-8422-122e2785dc9f","CSAFPID-419ec76e-39e5-11f1-8422-122e2785dc9f","CSAFPID-419f11d8-39e5-11f1-8422-122e2785dc9f","CSAFPID-419f489c-39e5-11f1-8422-122e2785dc9f","CSAFPID-419fd1cc-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a02c6c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a0bfe2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a108d0-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a14638-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a18cec-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a1dce2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a215b8-39e5-11f1-8422-122e2785dc9f"]}},{"title":"A flaw was found when getting a reply from a forwarded query, where dnsmasq\r\nchecks in forward.","notes":[{"category":"summary","text":"A flaw was found when getting a reply from a forwarded query, where dnsmasq\r\nchecks in forward.c:reply_query() if the reply destination address/port is\r\nused by the pending forwarded queries. However, it does not use the\r\naddress/port to retrieve the exact forwarded query, substantially reducing the\r\nnumber of attempts an attacker on the network would have to perform to forge a\r\nreply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which\r\nspecifies a query's attributes that all must be used to match a reply. This\r\nflaw allows an attacker to perform a DNS Cache Poisoning attack. If chained\r\nwith CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful\r\nattack can be reduced."}],"cve":"CVE-2020-25684","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#434904"}],"references":[{"url":"https://access.redhat.com/security/cve/cve-2020-25684","summary":"This issue affects the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8. Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV) are indirectly affected as well.","category":"external"},{"url":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","summary":"https://community.sophos.com/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red","category":"external"}],"product_status":{"known_affected":["CSAFPID-41a3831c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a3eeba-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a46b74-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a4c740-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a5262c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a54fe4-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a59db4-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a69980-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a6d33c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a74eac-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a805c2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a86d5a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a972ae-39e5-11f1-8422-122e2785dc9f","CSAFPID-41aa9e72-39e5-11f1-8422-122e2785dc9f","CSAFPID-41abbece-39e5-11f1-8422-122e2785dc9f","CSAFPID-41acb95a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ad4bc2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41adc6c4-39e5-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-41a29268-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a2d566-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a30270-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a33592-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a35c8e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a3ad88-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a41a2a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a442de-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a49522-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a5dafe-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a62798-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a663a2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a70870-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a77bf2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a8a69e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a9286c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a9a4d6-39e5-11f1-8422-122e2785dc9f","CSAFPID-41a9f152-39e5-11f1-8422-122e2785dc9f","CSAFPID-41aa5674-39e5-11f1-8422-122e2785dc9f","CSAFPID-41aadf9a-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ab3742-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ab6e9c-39e5-11f1-8422-122e2785dc9f","CSAFPID-41abfcc2-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ac6608-39e5-11f1-8422-122e2785dc9f","CSAFPID-41acf7bc-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ad7f8e-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ae0832-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ae5774-39e5-11f1-8422-122e2785dc9f","CSAFPID-41ae7fb0-39e5-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-414eb51c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-414efa68-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-414f4d42-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-414fa33c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-414fe130-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-4150325c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-415080a4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-4150cb18-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-41511ac8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-41517ba8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-4151bb5e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-415204b0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-41525960-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-4152aa28-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-4152f334-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-41532aac-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-41536828-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-4153a59a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-4153ded4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-41542ae2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-4154701a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-4154bd72-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-4154f8d2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-41553040-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-41557ae6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-4155b880-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Vantiva","product":{"name":"Vantiva Products","product_id":"CSAFPID-415600ec-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-41563bde-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"IBM Corporation (zseries)","product":{"name":"IBM Corporation (zseries) Products","product_id":"CSAFPID-41568152-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-4156c306-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zephyr Project","product":{"name":"Zephyr Project Products","product_id":"CSAFPID-4157300c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-4157852a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Wind River","product":{"name":"Wind River Products","product_id":"CSAFPID-4157d8cc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-415823b8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-41587bce-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Thales Group","product":{"name":"Thales Group Products","product_id":"CSAFPID-4158d150-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-41590a94-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-41595e7c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"FreeBSD","product":{"name":"FreeBSD Products","product_id":"CSAFPID-415996b2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-4159dd02-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-415a0e4e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-415a454e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-415a7136-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-415aacdc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-415adbc6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-415b228e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-415b7518-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-415bb49c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Mbed TLS","product":{"name":"Mbed TLS Products","product_id":"CSAFPID-415c0208-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-415c3b42-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-415c6e8c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-415cb02c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-415ce498-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-415d2192-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-415d5f7c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-415d8a10-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-415ddfb0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-415e74ca-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-415ebe76-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-415f1790-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-415f6b46-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-415fba9c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-416004f2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-4160603c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-41609872-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-4160ed40-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-416128f0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Vantiva","product":{"name":"Vantiva Products","product_id":"CSAFPID-41616090-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-41619b0a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-4161d836-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-41620496-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-4162433e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-41627584-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-4162aa54-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-416310f2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-416341f8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-41636f7a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-4163b17e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-4163e4f0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-416417b8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-41646542-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-4164a372-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-4164f78c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-416534ae-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-416593cc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-4165dbc0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-416626f2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-41667c60-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"IBM Corporation (zseries)","product":{"name":"IBM Corporation (zseries) Products","product_id":"CSAFPID-4166c256-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-4167028e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zephyr Project","product":{"name":"Zephyr Project Products","product_id":"CSAFPID-41674276-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-41677c6e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Wind River","product":{"name":"Wind River Products","product_id":"CSAFPID-4167b008-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-41681354-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-41684c84-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Thales Group","product":{"name":"Thales Group Products","product_id":"CSAFPID-416876b4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-4168a436-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-4168e374-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"FreeBSD","product":{"name":"FreeBSD Products","product_id":"CSAFPID-41690eee-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-41694864-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-4169800e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-4169b02e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-4169f228-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-416a1f64-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-416a5a9c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-416a8a8a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-416ab5e6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Mbed TLS","product":{"name":"Mbed TLS Products","product_id":"CSAFPID-416adc6a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-416b3c78-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-416b83e0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-416bb2b6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-416bec68-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-416c3f9c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-416c7520-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-416d0abc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-416d32bc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-416d6d40-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-416d9a72-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-416dcc72-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-416e07fa-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-416e406c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-416e6f1a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-416eae1c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-416ee224-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-416f2112-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-416f5c18-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-416f9b4c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-416fda1c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-41702d96-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-417067ac-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-41709fa6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-4170ca94-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-4170f6d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-4171465e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-41716f80-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-4171b7d8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-4171f5b8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-41723b40-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-417284ba-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-4172c484-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-417323f2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-41736330-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-4173b6be-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-41740452-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-41744f02-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-41749692-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-4174d1ac-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-417512d4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-41754a60-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-4175a0be-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-4175d552-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-41760b1c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-41763d8a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-417682f4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-4176dfe2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-41771f84-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-417767fa-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-417790d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-4177c344-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-41780782-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-4178331a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-4178c212-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-41790254-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-4179480e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-4179b6ae-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-4179ebc4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-417a3340-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-417a7d0a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-417acb8e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-417b0a22-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Vantiva","product":{"name":"Vantiva Products","product_id":"CSAFPID-417b4ea6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-417b8ee8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-417bd6f0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-417c15ca-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-417c4d38-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-417c9874-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-417cd000-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-417d0548-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-417d2fdc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-417d5f20-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-417d9ea4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-417ddfe0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-417e1c94-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-417e6776-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-417ecc7a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-417f0820-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-417f49d4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-417f93ee-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-417fe902-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-41802426-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"IBM Corporation (zseries)","product":{"name":"IBM Corporation (zseries) Products","product_id":"CSAFPID-41807d36-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-4180b918-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zephyr Project","product":{"name":"Zephyr Project Products","product_id":"CSAFPID-41810418-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-41815526-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Wind River","product":{"name":"Wind River Products","product_id":"CSAFPID-418195d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-4181d38e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-41820be2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Thales Group","product":{"name":"Thales Group Products","product_id":"CSAFPID-4182620e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-4182a944-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-4183130c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"FreeBSD","product":{"name":"FreeBSD Products","product_id":"CSAFPID-418364e2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-4183ab0a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-4183fa2e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-41843ff2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-41848b88-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-4184e5ba-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-4185244e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-418568e6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-4185a036-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-4185e99c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Mbed TLS","product":{"name":"Mbed TLS Products","product_id":"CSAFPID-41862a4c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-41866778-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-4186b69c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-4186e09a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-418725b4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-418768f8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-4187aebc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-4187d95a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-4188626c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-41889ef8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-4188d03a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-41890a1e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-41894d1c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-4189948e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-4189c79c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-4189efec-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-418a2bb0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-418a69ae-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Vantiva","product":{"name":"Vantiva Products","product_id":"CSAFPID-418aae6e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-418af932-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-418b4fcc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Mbed TLS","product":{"name":"Mbed TLS Products","product_id":"CSAFPID-418b918a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-418bc010-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-418c145c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-418c51e2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-418c938c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-418cd982-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-418d2662-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-418d669a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-418d9020-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-418dbf82-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-418dff38-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-418e2e68-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-418e5c80-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-418e8412-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-418eb824-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-418ef6d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"IBM Corporation (zseries)","product":{"name":"IBM Corporation (zseries) Products","product_id":"CSAFPID-418f5072-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-418fa0d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zephyr Project","product":{"name":"Zephyr Project Products","product_id":"CSAFPID-418fde7a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-41900b98-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Wind River","product":{"name":"Wind River Products","product_id":"CSAFPID-41903adc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-419078da-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-4190b4e4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Thales Group","product":{"name":"Thales Group Products","product_id":"CSAFPID-419115f6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-419163da-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-41919fa8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"FreeBSD","product":{"name":"FreeBSD Products","product_id":"CSAFPID-4191ddec-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-41921956-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-419247a0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-4192a6b4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-4192f1e6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-41934aec-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-419385a2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-4193ceb8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-41941e18-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-419461c0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-4194b58a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-4194f3d8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-41953410-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-41957b50-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-4195b19c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-4195e586-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-419612ae-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-419645f8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-4196be8e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-41970042-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-4197318e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-4197750e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-4197ab96-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-4197d792-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-41980e4c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-41985c9e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-41988624-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-4198b5ea-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-4198f8a2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-419925c0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-419969c2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-41999c1c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-4199c3d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-419a0f62-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-419a3e56-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-419a7074-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-419aa242-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-419ae2d4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-419b0c8c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-419b4fc6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-419b8eaa-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-419bdf7c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-419c4430-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-419c9976-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-419ce160-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-419d0cc6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-419d404c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-419d7ee0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-419db4fa-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-419df172-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-419e32a4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-419e8308-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-419ec76e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-419f11d8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-419f489c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-419f8e2e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-419fd1cc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-41a02c6c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-41a06c0e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-41a0bfe2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-41a108d0-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-41a14638-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-41a18cec-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-41a1dce2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-41a215b8-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LiteSpeed Technologies","product":{"name":"LiteSpeed Technologies Products","product_id":"CSAFPID-41a29268-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-41a2d566-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-41a30270-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-41a33592-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-41a35c8e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-41a3831c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-41a3ad88-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu Europe","product":{"name":"Fujitsu Europe Products","product_id":"CSAFPID-41a3eeba-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-41a41a2a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pulse Secure","product":{"name":"Pulse Secure Products","product_id":"CSAFPID-41a442de-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-41a46b74-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Espressif Systems","product":{"name":"Espressif Systems Products","product_id":"CSAFPID-41a49522-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-41a4c740-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-41a5262c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-41a54fe4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-41a59db4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-41a5dafe-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-41a62798-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-41a663a2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-41a69980-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-41a6d33c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-41a70870-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NETGEAR","product":{"name":"NETGEAR Products","product_id":"CSAFPID-41a74eac-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-41a77bf2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-41a7c396-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-41a805c2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"netsnmp","product":{"name":"netsnmp Products","product_id":"CSAFPID-41a84064-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-41a86d5a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-41a8a69e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zephyr Project","product":{"name":"Zephyr Project Products","product_id":"CSAFPID-41a8fb58-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-41a9286c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Wind River","product":{"name":"Wind River Products","product_id":"CSAFPID-41a972ae-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-41a9a4d6-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-41a9f152-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Blackberry QNX","product":{"name":"Blackberry QNX Products","product_id":"CSAFPID-41aa5674-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Pi-Hole","product":{"name":"Pi-Hole Products","product_id":"CSAFPID-41aa9e72-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-41aadf9a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-41ab3742-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-41ab6e9c-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-41abbece-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-41abfcc2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Afero","product":{"name":"Afero Products","product_id":"CSAFPID-41ac6608-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-41acb95a-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-41acf7bc-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-41ad4bc2-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-41ad7f8e-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-41adc6c4-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-41ae0832-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-41ae5774-39e5-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-41ae7fb0-39e5-11f1-8422-122e2785dc9f"}}]}}