{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/709991#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nThere are six new vulnerabilities in the latest release of Netatalk (3.1.12) that could allow for Remote Code Execution as well as Out-of-bounds Read.\r\n\r\n### Description\r\nBelow are the new CVEs. Per ZDI: \r\n\r\n**CVE-2022-0194**\r\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.\r\n\r\n**CVE-2022-23121**\r\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root.\r\n\r\n**CVE-2022-23122**\r\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.\r\n\r\n**CVE-2022-23124**\r\nThis vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.\r\n\r\n**CVE-2022-23125**\r\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.\r\n\r\n**CVE-2022-23123**\r\nThis vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.\r\n\r\n\r\nFor more detailed information, please review the Netatalk announcement. Also available for reference are releases detailing the information from ZDI & Western Digital. \r\n\r\n\r\nNetatalk does not regularly receive security updates, is receiving security research attention, and is difficlut to get right because reverse engineering a proprietary protocol. WD has removed Netatalk code from NAS firmware. We suggest Samba+vfs_fruit for longer term use (more likely to get security updates in a timely way).\r\n(see samba vfs_fruit vuls).\r\n\r\n\r\n\r\n### Impact\r\nAn unauthenticated, remote attacker can execute arbitrary code on affected installations of Netatalk.\r\n\r\n### Solution\r\nNetatalk has released version [3.1.13](https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html). \r\n\r\n### Acknowledgements\r\nThanks to ZDI, Western Digital, and Netatalk for researching and coordinating these vulnerabilities. \r\n\r\nThis document was written by James Stanley and Art Manion.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"We do not utilize this apple based filing protocol on our products as per our internal review, and thus are not affected.","title":"Vendor statment from Digi International"},{"category":"other","text":"The Netatalk application in the OpenWrt package feed was updated to version 3.1.13  in OpenWrt 19.07 and OpenWrt 21.02 branch. Updated ipkg files were generated. Netatalk is not included in the default images. Netatalk was removed from OpenWrt master and OpenWrt 22.03.\r\n\r\nhttps://github.com/openwrt/packages/commit/951ef67479dbf52af124671d367dd5e1a6d16121\r\nhttps://github.com/openwrt/packages/commit/165c5625a3c696a37665d62b849eaa85b4d3815a","title":"Vendor statment from OpenWRT"},{"category":"other","text":"SmartOS does not ship netatalk.  Users can get netatalk from pkgsrc, but this case is a problem for pkgsrc, not SmartOS.","title":"Vendor statment from Joyent"},{"category":"other","text":"netatalk is not part of basic illumos.  Some distributions MAY have it, but illumos itself does not.","title":"Vendor statment from Illumos"},{"category":"other","text":"pfSense software does not include Netatalk in the base installation or or in any add-on packages.","title":"Vendor statment from pfSense"},{"category":"other","text":"Cradlepoint does not implement Netatalk in any of its products or services.","title":"Vendor statment from Cradlepoint"},{"category":"other","text":"No Brocade Fibre Channel Products from Broadcom products are currently known to be affected by this vulnerability.","title":"Vendor statment from Brocade Communication Systems"},{"category":"other","text":"F5 Networks does not use netatalk in our products.","title":"Vendor statment from F5 Networks"},{"category":"other","text":"There is no Netatalk in the ICR-xxxx products.","title":"Vendor statment from Advantech Czech"},{"category":"other","text":"AVM doesn't utilize software from the netatalk project within its products.","title":"Vendor statment from AVM GmbH"},{"category":"other","text":"Do not use Netatalk in our RTOS","title":"Vendor statment from eCosCentric"},{"category":"other","text":"Check Point doesn't use Netatalk.","title":"Vendor statment from Check Point"},{"category":"other","text":"Though HardenedBSD provides netatalk3 in ports/packages, HardenedBSD does not distribute netatalk code in the base operating system. As such, HardenedBSD is not affected.","title":"Vendor statment from HardenedBSD"},{"category":"other","text":"Red Hat products are not affected by the listed CVE(s) associated with this issue.","title":"Vendor statment from Red Hat"},{"category":"other","text":"Phoenix Contact products do not support or implement Netatalk.","title":"Vendor statment from Phoenix Contact"},{"category":"other","text":"Muonics does not use Netatalk in any of its products and is thus not vulnerable.","title":"Vendor statment from Muonics Inc."}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/709991"},{"url":"https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html","summary":"https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html"},{"url":"https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities","summary":"https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities"}],"title":"Netatalk contains multiple error and memory management vulnerabilities","tracking":{"current_release_date":"2023-04-04T14:19:11+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#709991","initial_release_date":"2022-01-10 00:00:00+00:00","revision_history":[{"date":"2023-04-04T14:19:11+00:00","number":"1.20230404141911.4","summary":"Released on 2023-04-04T14:19:11+00:00"}],"status":"final","version":"1.20230404141911.4"}},"vulnerabilities":[{"title":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk.","notes":[{"category":"summary","text":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root."}],"cve":"CVE-2022-0194","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#709991"}],"product_status":{"known_affected":["CSAFPID-b18441e0-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1848646-3b92-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-b17f311e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b17f86f0-3b92-11f1-8422-122e2785dc9f","CSAFPID-b17fd902-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1801e80-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1805936-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18096a8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b180ce20-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1810b88-3b92-11f1-8422-122e2785dc9f","CSAFPID-b181398c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1817e92-3b92-11f1-8422-122e2785dc9f","CSAFPID-b181b89e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1820f38-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1824552-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1829106-3b92-11f1-8422-122e2785dc9f","CSAFPID-b182c220-3b92-11f1-8422-122e2785dc9f","CSAFPID-b182ec3c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1832986-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1835366-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1837ea4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b183b32e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b183dd04-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1841418-3b92-11f1-8422-122e2785dc9f","CSAFPID-b184bfe4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b184ed7a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1852470-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1854c84-3b92-11f1-8422-122e2785dc9f","CSAFPID-b185b2be-3b92-11f1-8422-122e2785dc9f"]}},{"title":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk.","notes":[{"category":"summary","text":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root."}],"cve":"CVE-2022-23121","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#709991"}],"product_status":{"known_affected":["CSAFPID-b18a9b12-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18ac84e-3b92-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-b18623b6-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18654c6-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1868f2c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b186d090-3b92-11f1-8422-122e2785dc9f","CSAFPID-b187167c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1876b04-3b92-11f1-8422-122e2785dc9f","CSAFPID-b187a948-3b92-11f1-8422-122e2785dc9f","CSAFPID-b187f4ac-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18831e2-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18864f0-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1889f06-3b92-11f1-8422-122e2785dc9f","CSAFPID-b188c71a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b188f4ce-3b92-11f1-8422-122e2785dc9f","CSAFPID-b189207a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18953e2-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1897c46-3b92-11f1-8422-122e2785dc9f","CSAFPID-b189a496-3b92-11f1-8422-122e2785dc9f","CSAFPID-b189e0f0-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18a114c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18a3c30-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18a745c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18af710-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18b21a4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18b50d4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18b9576-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18c1c44-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18c5b78-3b92-11f1-8422-122e2785dc9f"]}},{"title":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk.","notes":[{"category":"summary","text":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root."}],"cve":"CVE-2022-23122","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#709991"}],"product_status":{"known_affected":["CSAFPID-b1915a10-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1918328-3b92-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-b18ce43a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18d1f86-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18d5b40-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18d8e58-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18db766-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18de268-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18e1396-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18e62ba-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18e96cc-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18ed3b2-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18f21be-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18f5eea-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18fa044-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18fca88-3b92-11f1-8422-122e2785dc9f","CSAFPID-b18ff418-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1903644-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1906a42-3b92-11f1-8422-122e2785dc9f","CSAFPID-b190a5b6-3b92-11f1-8422-122e2785dc9f","CSAFPID-b190d4dc-3b92-11f1-8422-122e2785dc9f","CSAFPID-b191009c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1912ebe-3b92-11f1-8422-122e2785dc9f","CSAFPID-b191c4fa-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1920802-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1923eee-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19274b8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19310da-3b92-11f1-8422-122e2785dc9f","CSAFPID-b193749e-3b92-11f1-8422-122e2785dc9f"]}},{"title":"This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk.","notes":[{"category":"summary","text":"This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root."}],"cve":"CVE-2022-23124","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#709991"}],"product_status":{"known_affected":["CSAFPID-b1987048-3b92-11f1-8422-122e2785dc9f","CSAFPID-b198a7a2-3b92-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-b193d916-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1940382-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19449e6-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19475b0-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1949efa-3b92-11f1-8422-122e2785dc9f","CSAFPID-b194dc80-3b92-11f1-8422-122e2785dc9f","CSAFPID-b195084a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1956efc-3b92-11f1-8422-122e2785dc9f","CSAFPID-b195b1fa-3b92-11f1-8422-122e2785dc9f","CSAFPID-b195e15c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1961550-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1964ef8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19683e6-3b92-11f1-8422-122e2785dc9f","CSAFPID-b196bab4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b196fa56-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1972e4a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1976fa4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1979ed4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b197dcbe-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1980928-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1983402-3b92-11f1-8422-122e2785dc9f","CSAFPID-b198d60a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b198fcf2-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19924ac-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1994f54-3b92-11f1-8422-122e2785dc9f","CSAFPID-b199ac60-3b92-11f1-8422-122e2785dc9f","CSAFPID-b199df0a-3b92-11f1-8422-122e2785dc9f"]}},{"title":"This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk.","notes":[{"category":"summary","text":"This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root."}],"cve":"CVE-2022-23123","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#709991"}],"product_status":{"known_affected":["CSAFPID-b19aa70a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19f2e92-3b92-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-b19a5250-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19a7a6e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19ae918-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19b47e6-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19b8864-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19bd6e8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19c0d20-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19c4498-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19c7210-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19c9aba-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19ce268-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19d0b94-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19d4d66-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19d8358-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19dc17e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19df540-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19e332a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19e5d96-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19e84d8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19ebd68-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19ef4ea-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19f6eac-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19fae94-3b92-11f1-8422-122e2785dc9f","CSAFPID-b19feaa8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a02554-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a0ca54-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a0f394-3b92-11f1-8422-122e2785dc9f"]}},{"title":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk.","notes":[{"category":"summary","text":"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability.\r\n\r\nThe specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root."}],"cve":"CVE-2022-23125","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#709991"}],"product_status":{"known_affected":["CSAFPID-b1a63a7a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a670c6-3b92-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-b1a17d5a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a1b0b8-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a1d8a4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a20310-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a22d54-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a26f1c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a2b54e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a2df56-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a30882-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a32fce-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a35ef4-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a388fc-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a3c768-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a400a2-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a4610a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a4a886-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a4dd38-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a5052e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a5470a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a57ebe-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a5b08c-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a5fb82-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a6c49a-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a71936-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a75658-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a7bb3e-3b92-11f1-8422-122e2785dc9f","CSAFPID-b1a7eb54-3b92-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-b17f311e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-b17f86f0-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-b17fd902-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-b1801e80-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-b1805936-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-b18096a8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-b180ce20-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-b1810b88-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-b181398c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Advantech Czech","product":{"name":"Advantech Czech Products","product_id":"CSAFPID-b1817e92-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-b181b89e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-b1820f38-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-b1824552-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-b1829106-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-b182c220-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-b182ec3c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-b1832986-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell SecureWorks","product":{"name":"Dell SecureWorks Products","product_id":"CSAFPID-b1835366-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-b1837ea4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-b183b32e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-b183dd04-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-b1841418-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-b18441e0-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-b1848646-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-b184bfe4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-b184ed7a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Muonics Inc.","product":{"name":"Muonics Inc. Products","product_id":"CSAFPID-b1852470-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-b1854c84-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-b185793e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-b185b2be-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-b18623b6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-b18654c6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-b1868f2c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-b186d090-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-b187167c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-b1876b04-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-b187a948-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-b187f4ac-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Advantech Czech","product":{"name":"Advantech Czech Products","product_id":"CSAFPID-b18831e2-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-b18864f0-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-b1889f06-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-b188c71a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-b188f4ce-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-b189207a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-b18953e2-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-b1897c46-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell SecureWorks","product":{"name":"Dell SecureWorks Products","product_id":"CSAFPID-b189a496-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-b189e0f0-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-b18a114c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-b18a3c30-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-b18a745c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-b18a9b12-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-b18ac84e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-b18af710-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-b18b21a4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Muonics Inc.","product":{"name":"Muonics Inc. Products","product_id":"CSAFPID-b18b50d4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-b18b9576-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-b18be9a4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-b18c1c44-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-b18c5b78-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-b18ce43a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-b18d1f86-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-b18d5b40-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-b18d8e58-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-b18db766-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-b18de268-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-b18e1396-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-b18e62ba-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-b18e96cc-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Advantech Czech","product":{"name":"Advantech Czech Products","product_id":"CSAFPID-b18ed3b2-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-b18f21be-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-b18f5eea-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-b18fa044-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-b18fca88-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-b18ff418-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-b1903644-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell SecureWorks","product":{"name":"Dell SecureWorks Products","product_id":"CSAFPID-b1906a42-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-b190a5b6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-b190d4dc-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-b191009c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-b1912ebe-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-b1915a10-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-b1918328-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-b191c4fa-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-b1920802-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Muonics Inc.","product":{"name":"Muonics Inc. Products","product_id":"CSAFPID-b1923eee-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-b19274b8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-b192b45a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-b19310da-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-b193749e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-b193d916-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-b1940382-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-b19449e6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-b19475b0-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-b1949efa-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-b194dc80-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-b195084a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-b1956efc-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Advantech Czech","product":{"name":"Advantech Czech Products","product_id":"CSAFPID-b195b1fa-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-b195e15c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-b1961550-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-b1964ef8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-b19683e6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-b196bab4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-b196fa56-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-b1972e4a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell SecureWorks","product":{"name":"Dell SecureWorks Products","product_id":"CSAFPID-b1976fa4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-b1979ed4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-b197dcbe-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-b1980928-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-b1983402-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-b1987048-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-b198a7a2-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-b198d60a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-b198fcf2-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Muonics Inc.","product":{"name":"Muonics Inc. Products","product_id":"CSAFPID-b19924ac-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-b1994f54-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-b1997b82-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-b199ac60-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-b199df0a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-b19a5250-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-b19a7a6e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-b19aa70a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-b19ae918-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-b19b47e6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-b19b8864-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-b19bd6e8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-b19c0d20-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-b19c4498-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Advantech Czech","product":{"name":"Advantech Czech Products","product_id":"CSAFPID-b19c7210-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-b19c9aba-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-b19ce268-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-b19d0b94-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-b19d4d66-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-b19d8358-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-b19dc17e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-b19df540-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell SecureWorks","product":{"name":"Dell SecureWorks Products","product_id":"CSAFPID-b19e332a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-b19e5d96-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-b19e84d8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-b19ebd68-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-b19ef4ea-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-b19f2e92-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-b19f6eac-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-b19fae94-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Muonics Inc.","product":{"name":"Muonics Inc. Products","product_id":"CSAFPID-b19feaa8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-b1a02554-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-b1a07e64-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-b1a0ca54-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-b1a0f394-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-b1a17d5a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-b1a1b0b8-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Paessler","product":{"name":"Paessler Products","product_id":"CSAFPID-b1a1d8a4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-b1a20310-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Peplink","product":{"name":"Peplink Products","product_id":"CSAFPID-b1a22d54-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Digi International","product":{"name":"Digi International Products","product_id":"CSAFPID-b1a26f1c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-b1a2b54e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-b1a2df56-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-b1a30882-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Advantech Czech","product":{"name":"Advantech Czech Products","product_id":"CSAFPID-b1a32fce-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-b1a35ef4-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-b1a388fc-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-b1a3c768-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-b1a400a2-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-b1a4610a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-b1a4a886-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-b1a4dd38-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell SecureWorks","product":{"name":"Dell SecureWorks Products","product_id":"CSAFPID-b1a5052e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-b1a5470a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-b1a57ebe-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-b1a5b08c-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-b1a5fb82-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-b1a63a7a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-b1a670c6-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-b1a6c49a-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Muonics Inc.","product":{"name":"Muonics Inc. Products","product_id":"CSAFPID-b1a71936-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-b1a75658-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-b1a791ea-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-b1a7bb3e-3b92-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-b1a7eb54-3b92-11f1-8422-122e2785dc9f"}}]}}