{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/799380#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nDevices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing. \r\n\r\n### Description\r\nThe Bluetooth [Core Specification](https://www.bluetooth.com/specifications/specs/core-specification/) and [Mesh Profile Specification ](https://www.bluetooth.com/specifications/specs/mesh-profile-1-0-1/) are two specifications used to define the technical and policy requirements for devices that want to operate over Bluetooth connections. Researchers at the Agence nationale de la sécurité des systèmes d'information ([ANSSI](https://www.ssi.gouv.fr/)) have identified a number of vulnerabilities in each specification that allow [impersonation attacks](https://francozappa.github.io/about-bias/publication/antonioli-20-bias/antonioli-20-bias.pdf) and AuthValue disclosures.      \r\n\r\nDevices supporting the Bluetooth Core Specification are affected by the following vulnerabilities:\r\n\r\n#### Impersonation in the Passkey Entry Protocol\r\nThe Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC), and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack that enables an active attacker to impersonate the initiating device without any previous knowledge (*CVE-2020-26558*). An attacker acting as a man-in-the-middle (MITM) in the Passkey authentication procedure could use a crafted series of responses to determine each bit of the randomly generated Passkey selected by the pairing initiator in each round of the pairing procedure, and once identified, the attacker can use these Passkey bits during the same pairing session to successfully complete the authenticated pairing procedure with the responder. Devices supporting BR/EDR Secure Simple Pairing in Bluetooth Core Specifications 2.1 through 5.2, BR/EDR Secure Connections Pairing in Bluetooth Core Specifications 4.1 through 5.2 and LE Secure Connections Pairing in Bluetooth Core Specifications 4.2 through 5.2 are affected by this vulnerability. \r\n\r\n#### Impersonation in the Pin Pairing Protocol\r\nThe Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (*CVE-2020-26555*). An attacker could connect to a victim device by spoofing the Bluetooth Device Address (BD_ADDR) of the device, reflect the the encrypted nonce, and complete BR/EDR pin-code pairing with them without knowledge of the pin code. A successful attack requires the attacking device to be within wireless range of a vulnerable device supporting BR/EDR Legacy Pairing that is Connectable and Bondable. Devices supporting the Bluetooth Core Specification versions 1.0B through 5.2 are affected by this vulnerability.\r\n\r\n\r\nDevices supporting Bluetooth Mesh Profile Specification, versions 1.0 and 1.0.1, are affected by the following vulnerabilities:\r\n\r\n#### Impersonation in Bluetooth Mesh Provisioning\r\nThe Mesh Provisioning procedure could allow an attacker without knowledge of the AuthValue, spoofing a device being provisioned, to use crafted responses to appear to possess the AuthValue and to be issued a valid NetKey and potentially an AppKey (*CVE-2020-26560*). For this attack to be successful, an attacking device needs to be within wireless range of a Mesh Provisioner and either spoof the identity of a device being provisioned over the air or be directly provisioned onto a subnet controlled by the provisioner.\r\n\r\n#### Predictable AuthValue in Bluetooth Mesh Provisioning Leads to MITM\r\nThe Mesh Provisioning procedure could allow an attacker observing or taking part in the provisioning to brute force the AuthValue if it has a fixed value, or is selected predictably or with low entropy (*CVE-2020-26557*). Identifying the AuthValue generally requires a brute-force search against the provisioning random and provisioning confirmation produced by the Provisioner. This brute-force search, for a randomly selected AuthValue, must complete before the provisioning procedure times out, which can require significant resources. If the AuthValue is not selected randomly with each new provisioning attempt, then the brute-force search can occur offline and if successful, would permit an attacker to identify the AuthValue and authenticate to both the Provisioner and provisioned devices, permitting a MITM attack on a future provisioning attempts with the same AuthValue. \r\n\r\n#### Malleable Commitment\r\nThe authentication protocol is vulnerable if the AuthValue can be identified during the provisioning procedure, even if the AuthValue is selected randomly (*CVE-2020-26556*). If an attacker can identify the AuthValue used before the provisioning procedure times out, it is possible to complete the provisioning operation and obtain a NetKey. Similar to CVE-2020-26557, identifying the AuthValue generally requires a brute-force search against the provisioning random and provisioning confirmation produced by the Provisioner. This brute-force search for a randomly selected AuthValue, which can require significant resources, must complete before the provisioning procedure times out.\r\n\r\n\r\n\r\n#### AuthValue Leak\r\nThe Mesh Provisioning procedure could allow an attacker that was provisioned without access to the AuthValue to identify the AuthValue directly without brute-forcing its value (*CVE-2020-26559*). Even when a randomly generated AuthValue with a full 128-bits of entropy is used, an attacker acquiring the Provisioner’s public key, provisioning confirmation value, and provisioning random value, and providing its public key for use in the provisioning procedure, will be able to compute the AuthValue directly.\r\n\r\n### Impact\r\n\r\n#### Impersonation in the Passkey Entry Protocol\r\nThis vulnerability could allow an attacker to authenticate to the response victim device and act as a legitimate encrypted device. The attacker cannot pair with the initiating device using this method of attack, which prevents a fully transparent man-in-the-middle attack between the initiator and responder. For this attack to be successful, an attacking device needs to be within wireless range of two vulnerable Bluetooth devices that are initiating pairing or bonding for which a BR/EDR IO Capabilities exchange or LE IO Capability in the pairing request and response results in the selection of the Passkey pairing procedure.\r\n\r\n#### Impersonation in the Pin Pairing Protocol\r\nThis vulnerability could allow an attacker to complete pairing with a known link key, encrypt communications with the vulnerable device, and access any profiles permitted by a paired or bonded remote device supporting Legacy Pairing.\r\n\r\n#### Impersonation in Bluetooth Mesh Provisioning\r\nThis vulnerability could allow an attacker to successfully authenticate without the AuthValue. Once authenticated, the attacker could perform any operation permitted to a node provisioned on the subnet until it is either denied access or a new subnet is formed without the attacking node present.\r\n\r\n#### Predictable AuthValue in Bluetooth Mesh Provisioning Leads to MITM\r\nThis vulnerability could allow an attacker to successfully brute force the AuthValue and authenticate to both the Provisioner and provisioned devices, permitting a MITM attack on a future provisioning attempt with the same AuthValue.\r\n\r\n#### Malleable Commitment\r\nThis vulnerability could allow an attacker to obtain a NetKey, which could be used to decrypt and authenticate up to the network layer, allowing the relay of messages, but no application data decryption.\r\n\r\n#### AuthValue Leak\r\nThis vulnerability could allow an attacker to compute the AuthValue and authenticate to the Provisioner and provisioned devices.\r\n\r\n### Solution\r\nBluetooth users should ensure that they have installed the latest recommended updates from device and operating system manufacturers. \r\n\r\nIn addition to the two vulnerabilities affecting the Bluetooth Core Specification, the researchers also identified a potential security vulnerability related to LE Legacy Pairing authentication in Bluetooth Core Specification versions 4.0 through 5.2. The researchers claim that an attacker can reflect the confirmation and random numbers of a peer device in LE legacy pairing to successfully complete legacy authentication phase 2 without knowledge of the temporary key (TK). Because the attacker does not acquire a TK, or valid short-term key (STK) during this attack, completing authentication phase 2 is not sufficient for an encrypted link to be established. While the Bluetooth SIG does not consider this to be a method which can provide unauthorized access to a device, they still recommend that LE implementations requiring pairing and encryption use LE Secure Connections. The Bluetooth SIG also recommends that, where possible, implementations enable and enforce Secure Connections Only Mode, ensuring that LE legacy pairing cannot be used.\r\n\r\nThe Bluetooth SIG additionally makes the following [recommendations](https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/) for each vulnerability:\r\n\r\n#### Impersonation in the Passkey Entry Protocol\r\nFor the attack to succeed the pairing device needs to accept the same public key that it provided to the remote peer as the remote peer’s public key. The Bluetooth SIG recommends that potentially vulnerable implementations restrict the public keys accepted from a remote peer device to disallow a remote peer to present the same public key chosen by the local device, and the pairing procedure should be terminated with a failure status if this occurs. \r\n\r\n#### Impersonation in the Pin Pairing Protocol\r\nThe Bluetooth SIG recommends that potentially vulnerable devices not initiate or accept connections from remote devices claiming the same BD_ADDR as the local device. They also continue to recommend that devices use Secure Simple Pairing or BR/EDR Secure Connections to avoid known vulnerabilities with legacy BR/EDR pairing.\r\n\r\n#### Impersonation in Bluetooth Mesh Provisioning\r\nThe Bluetooth SIG recommends that potentially vulnerable mesh provisioners restrict the authentication procedure and not accept provisioning both random and confirmation numbers from a remote peer that are the same as those selected by the local device.\r\n\r\n#### Predictable AuthValue in Bluetooth Mesh Provisioning Leads to MITM\r\nThe Bluetooth SIG recommends that mesh implementations enforce a randomly selected AuthValue using all of the available bits, where permitted by the implementation. A large entropy helps ensure that a brute-force of the AuthValue, even a static AuthValue, cannot normally be completed in a reasonable time.\r\n\r\n#### Malleable Commitment\r\nThe [statement from the Bluetooth SIG](https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/malleable/) notes: \"AuthValues selected using a cryptographically secure random or pseudorandom number generator and having the maximum permitted entropy (128-bits) will be most difficult to brute-force. AuthValues with reduced entropy or generated in a predictable manner will not grant the same level of protection against this vulnerability. Selecting a new AuthValue with each provisioning attempt can also make it more difficult to launch a brute-force attack by requiring the attacker to restart the search with each provisioning attempt.\"\r\n\r\n#### AuthValue Leak\r\nThe Bluetooth SIG recommends that potentially vulnerable mesh provisioners use an out-of-band mechanism to exchange the public keys.\r\n\r\n### Acknowledgements\r\nThanks to researchers at the Agence nationale de la sécurité des systèmes d'information ([ANSSI](https://www.ssi.gouv.fr/)) for reporting these vulnerabilities.\r\n\r\nThis document was written by Madison Oliver.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"Zyxel products are NOT affected because they don’t support the authentication pairing functions, the mesh profile, or do not support Bluetooth at all.","title":"Vendor statment from Zyxel"},{"category":"other","text":"we dont have bluetooth stack in our products","title":"Vendor statment from Ceragon Networks Inc"},{"category":"other","text":"Fujitsu is aware of the security vulnerabilities in Bluetooth devices under VU#799380.\r\n\r\nFujitsu products are not affected by INTEL-SA-00517, but are affected by INTEL-SA-00520, i.e. CVE-2020-26555 and CVE-2020-26558.\r\n\r\nFujitsu has already provided Software updates for Intel® Wi-Fi 6 AX201, Intel® Wireless-AC 9560, Intel® Dual Band Wireless-AC 8265 and Intel® Dual Band Wireless-AC 8260 components employed in Fujitsu mobile products and Fujitsu INTELLIEDGE.\r\n\r\nThe Fujitsu PSIRT has updated the state for Fujitsu PSS-IS-2021-060800 on https://security.ts.fujitsu.com (Security Notices) accordingly.\r\n\r\nIn case of questions regarding this Fujitsu PSIRT Security Notice, please contact the Fujitsu PSIRT (Fujitsu-PSIRT@ts.fujitsu.com).","title":"Vendor statment from Fujitsu"},{"category":"other","text":"MikroTik Bluetooth implementation does not work in a peer-to-peer scenario, where pairing is involved. MikroTik devices work in Bluetooth Advertiser and Scanner topologies, where Bluetooth devices advertise/broadcast data over Bluetooth advertising channels, and MikroTik routers just scan the air to capture the Bluetooth payloads. Once again, there is no pairing involved. Pairing scenarios are scenarios where, for example, your phone connects to your headset, making a peer-to-peer connection between the two devices. In MikroTik's case, we do not support pairing, so it does not affect us.\r\nMESH vulnerabilities also do not affect us, as MikroTik does not support this feature.","title":"Vendor statment from MikroTik"},{"category":"other","text":"No Brocade Fibre Channel Products from Broadcom products are affected by this vulnerability.","title":"Vendor statment from Brocade Communication Systems"},{"category":"other","text":"Cradlepoint's [MC20BT](https://cradlepoint.com/product/accessories/mc20bt/), Bluetooth Low Energy 5.1 Module, was released January 2021 and is compatible with [E3000](https://cradlepoint.com/product/endpoints/e3000/) and [E300](https://cradlepoint.com/product/endpoints/e300/) Enterprise Branch routers.\r\n\r\nThe MC20BT is vulnerable to CVE-2020-26558 (patched in [NCOS version 7.21.40](https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.21.40.pdf)) and VU#799380.5 (patched in [NCOS version 7.21.20](https://1242f48cc5dde3a5de18-c192e5eeeb00e48f305665dbb83b8a03.ssl.cf2.rackcdn.com/FW-ReleaseNotesNCOS7.21.20.pdf))\r\n\r\nIf you are using the MC20BT with an Enterprise series router, Cradlepoint recommends upgrade to 7.21.40 or higher. For more information regarding upgrading your Cradlepoint device, visit our knowledgebase.\r\n\r\nhttps://customer.cradlepoint.com/s/article/Best-Practice-Stairstepping-NCOS-Upgrades","title":"Vendor statment from Cradlepoint"},{"category":"other","text":"Not affected.","title":"Vendor statment from Treck"},{"category":"other","text":"Check Point doesn't use Bluetooth in its appliances.","title":"Vendor statment from Check Point"},{"category":"other","text":"illumos, nor its distributions, have a native bluetooth stack.  If a distribution has a bluetooth stack, it originated from another open-source package.","title":"Vendor statment from Illumos"},{"category":"other","text":"We do not build or install any component of the Bluetooth drivers in the BIG-IP, so those vulnerabilities do not affect F5 BIG-IP products.","title":"Vendor statment from F5 Networks"},{"category":"other","text":"Belden devices do not support Bluetooth and are not affected by these vulnerabilities.","title":"Vendor statment from Belden"},{"category":"other","text":"SmartOS is a distrubtion of illumos, and does not include a native or distribution-specific bluetooth stack.","title":"Vendor statment from Joyent"},{"category":"other","text":"HCC does not use Bluetooth stack so not affected.","title":"Vendor statment from HCC Embedded"},{"category":"other","text":"No ADTRAN products have Bluetooth enabled at this time.","title":"Vendor statment from ADTRAN"},{"category":"other","text":"Bluetooth is not a supported feature or capability in any A10 Networks, Inc products.","title":"Vendor statment from A10 Networks"},{"category":"other","text":"lwIP does not have a bluetooth stack, so we're not affected.","title":"Vendor statment from lwIP"},{"category":"other","text":"Microchip is aware of multiple Bluetooth Core specification vulnerabilities. We have determined that some CVEs affect some of our Bluetooth products. For details on impacted products and resolution plans, visit below URL","title":"Vendor statment from Microchip Technology"},{"category":"other","text":"Sierra Wireless products are affected by some of these vulnerabilities. Please check the security bulletin linked in the reference section for details on your product.\r\nSierra Wireless would like to thank the researchers at the Agence Nationale de la Sécurité des Systèmes d'information (ANSSI) for reporting these vulnerabilities, as well as the efforts of CERT/CC for coordinating the response.","title":"Vendor statment from Sierra Wireless"},{"category":"other","text":"See https://www.lancom-systems.com/service-support/instant-help/general-security-information/ for details.","title":"Vendor statment from LANCOM Systems GmbH"},{"category":"other","text":"Cisco is tracking these vulnerabilities via incident PSIRT-0503777710.\r\n\r\nCisco has investigated the impact of the aforementioned Bluetooth Specification vulnerabilities and is currently waiting for all the individual product development teams to provide Software fixes to address them.","title":"Vendor statment from Cisco"},{"category":"other","text":"AVM doesn't produce Bluetooth products. We did 18 years ago, but these devices reached their end of life status very long time ago.","title":"Vendor statment from AVM GmbH"},{"category":"other","text":"Arista products do not use bluetooth and are therefore not affected.","title":"Vendor statment from Arista Networks"},{"category":"other","text":"We are not currently using Bluetooth on any of our products.","title":"Vendor statment from Actiontec"},{"category":"other","text":"Not concerned with Bluetooth.","title":"Vendor statment from Miredo"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/799380"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/legacy-pairing/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/legacy-pairing/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-mesh/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-mesh/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/predicatable-authvalue/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/predicatable-authvalue/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/malleable/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/malleable/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/authvalue-leak/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/authvalue-leak/"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/","summary":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"},{"url":"https://www.bluetooth.com/specifications/specs/core-specification/","summary":"https://www.bluetooth.com/specifications/specs/core-specification/"},{"url":"https://www.bluetooth.com/specifications/specs/mesh-profile-1-0-1/","summary":"https://www.bluetooth.com/specifications/specs/mesh-profile-1-0-1/"},{"url":"https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/","summary":"https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/"},{"url":"https://www.novelbits.io/bluetooth-mesh-tutorial-part-3/","summary":"https://www.novelbits.io/bluetooth-mesh-tutorial-part-3/"},{"url":"https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/anssi-bluetooth-core-vulnerabilities.html","summary":"Reference(s) from vendor \"Microchip Technology\""},{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2021-004/","summary":"Reference(s) from vendor \"Sierra Wireless\""}],"title":"Devices supporting Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure","tracking":{"current_release_date":"2023-07-13T13:48:14+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#799380","initial_release_date":"2021-05-24 16:04:47.067137+00:00","revision_history":[{"date":"2023-07-13T13:48:14+00:00","number":"1.20230713134814.12","summary":"Released on 2023-07-13T13:48:14+00:00"}],"status":"final","version":"1.20230713134814.12"}},"vulnerabilities":[{"title":"The Bluetooth Mesh Profile Specification versions 1.","notes":[{"category":"summary","text":"The Bluetooth Mesh Profile Specification versions 1.0 and 1.0.1 Mesh Provisioning procedure could allow an attacker without knowledge of the AuthValue, spoofing a device being provisioned, to use crafted responses to appear to possess the AuthValue and be issued a valid NetKey and potentially an AppKey.\r\nFor this attack to be successful, an attacking device needs to be within wireless range of a Mesh Provisioner and either spoof the identity of a device being provisioned over the air or be directly provisioned onto a subnet controlled by the provisioner. After successfully authenticating without the AuthValue, the attacker can perform any operation permitted to a node provisioned on the subnet until it is either denied access or a new subnet is formed without the attacking node present."}],"cve":"CVE-2020-26560","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-11fbb95c-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-11fa8046-3825-11f1-8422-122e2785dc9f","CSAFPID-11fafcec-3825-11f1-8422-122e2785dc9f","CSAFPID-11fb381a-3825-11f1-8422-122e2785dc9f","CSAFPID-11fb7bea-3825-11f1-8422-122e2785dc9f","CSAFPID-11fbefda-3825-11f1-8422-122e2785dc9f","CSAFPID-11fc3a80-3825-11f1-8422-122e2785dc9f","CSAFPID-11fc6776-3825-11f1-8422-122e2785dc9f","CSAFPID-11fc93fe-3825-11f1-8422-122e2785dc9f","CSAFPID-11fccfc2-3825-11f1-8422-122e2785dc9f","CSAFPID-11fcfb0a-3825-11f1-8422-122e2785dc9f","CSAFPID-11fd22ba-3825-11f1-8422-122e2785dc9f","CSAFPID-11fd53a2-3825-11f1-8422-122e2785dc9f","CSAFPID-11fe375e-3825-11f1-8422-122e2785dc9f","CSAFPID-11fe7d04-3825-11f1-8422-122e2785dc9f","CSAFPID-11feb526-3825-11f1-8422-122e2785dc9f","CSAFPID-11ff1e8a-3825-11f1-8422-122e2785dc9f","CSAFPID-11ff5fc6-3825-11f1-8422-122e2785dc9f","CSAFPID-11ff9e78-3825-11f1-8422-122e2785dc9f","CSAFPID-11ffcd94-3825-11f1-8422-122e2785dc9f","CSAFPID-120007a0-3825-11f1-8422-122e2785dc9f","CSAFPID-120030f4-3825-11f1-8422-122e2785dc9f","CSAFPID-12006ce0-3825-11f1-8422-122e2785dc9f","CSAFPID-12009972-3825-11f1-8422-122e2785dc9f","CSAFPID-1200c2f8-3825-11f1-8422-122e2785dc9f","CSAFPID-12014994-3825-11f1-8422-122e2785dc9f","CSAFPID-12018cec-3825-11f1-8422-122e2785dc9f","CSAFPID-1201ca36-3825-11f1-8422-122e2785dc9f","CSAFPID-120246f0-3825-11f1-8422-122e2785dc9f"]}},{"title":"TLP:AMBER; The authentication property of the Bluetooth LE Legacy Pairing procedures is vulnerable to a reflection attack.","notes":[{"category":"summary","text":"TLP:AMBER; The authentication property of the Bluetooth LE Legacy Pairing procedures is vulnerable to a reflection attack. A remote attacker without knowledge of the token key can complete the authentication protocol."}],"ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-1204540e-3825-11f1-8422-122e2785dc9f","CSAFPID-12048bae-3825-11f1-8422-122e2785dc9f","CSAFPID-1204b5ac-3825-11f1-8422-122e2785dc9f","CSAFPID-120a2cc6-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-12034f28-3825-11f1-8422-122e2785dc9f","CSAFPID-1203cc3c-3825-11f1-8422-122e2785dc9f","CSAFPID-1204def6-3825-11f1-8422-122e2785dc9f","CSAFPID-12050782-3825-11f1-8422-122e2785dc9f","CSAFPID-120531c6-3825-11f1-8422-122e2785dc9f","CSAFPID-12055f98-3825-11f1-8422-122e2785dc9f","CSAFPID-12058644-3825-11f1-8422-122e2785dc9f","CSAFPID-1205b542-3825-11f1-8422-122e2785dc9f","CSAFPID-1205f1d8-3825-11f1-8422-122e2785dc9f","CSAFPID-12063a3a-3825-11f1-8422-122e2785dc9f","CSAFPID-120683d2-3825-11f1-8422-122e2785dc9f","CSAFPID-1206b9ec-3825-11f1-8422-122e2785dc9f","CSAFPID-12073d22-3825-11f1-8422-122e2785dc9f","CSAFPID-1207754e-3825-11f1-8422-122e2785dc9f","CSAFPID-1207d246-3825-11f1-8422-122e2785dc9f","CSAFPID-1207faf0-3825-11f1-8422-122e2785dc9f","CSAFPID-12082c50-3825-11f1-8422-122e2785dc9f","CSAFPID-120853a6-3825-11f1-8422-122e2785dc9f","CSAFPID-12087e30-3825-11f1-8422-122e2785dc9f","CSAFPID-1208b486-3825-11f1-8422-122e2785dc9f","CSAFPID-12090652-3825-11f1-8422-122e2785dc9f","CSAFPID-1209380c-3825-11f1-8422-122e2785dc9f","CSAFPID-12097c7c-3825-11f1-8422-122e2785dc9f","CSAFPID-1209e464-3825-11f1-8422-122e2785dc9f","CSAFPID-120a59c6-3825-11f1-8422-122e2785dc9f","CSAFPID-120a850e-3825-11f1-8422-122e2785dc9f","CSAFPID-120aad9a-3825-11f1-8422-122e2785dc9f","CSAFPID-120b4426-3825-11f1-8422-122e2785dc9f","CSAFPID-120b6d66-3825-11f1-8422-122e2785dc9f","CSAFPID-120bab50-3825-11f1-8422-122e2785dc9f","CSAFPID-120c0352-3825-11f1-8422-122e2785dc9f","CSAFPID-120c2d00-3825-11f1-8422-122e2785dc9f"]}},{"title":"TLP:AMBER; The Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack.","notes":[{"category":"summary","text":"TLP:AMBER; The Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack. When an attacker connects to a victim device using the address of the device and the victim initiates a Pairing, the attacker can reflect the encrypted nonce even without knowledge of the key."}],"cve":"CVE-2020-26555","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-120d2a8e-3825-11f1-8422-122e2785dc9f","CSAFPID-120d6080-3825-11f1-8422-122e2785dc9f","CSAFPID-120daa18-3825-11f1-8422-122e2785dc9f","CSAFPID-120e2fec-3825-11f1-8422-122e2785dc9f","CSAFPID-120e7a56-3825-11f1-8422-122e2785dc9f","CSAFPID-120fdf7c-3825-11f1-8422-122e2785dc9f","CSAFPID-12108620-3825-11f1-8422-122e2785dc9f","CSAFPID-12179172-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-120ce2f4-3825-11f1-8422-122e2785dc9f","CSAFPID-120ded16-3825-11f1-8422-122e2785dc9f","CSAFPID-120f157e-3825-11f1-8422-122e2785dc9f","CSAFPID-120f981e-3825-11f1-8422-122e2785dc9f","CSAFPID-12102fa4-3825-11f1-8422-122e2785dc9f","CSAFPID-1210ea34-3825-11f1-8422-122e2785dc9f","CSAFPID-12111b58-3825-11f1-8422-122e2785dc9f","CSAFPID-121168b0-3825-11f1-8422-122e2785dc9f","CSAFPID-1211c8d2-3825-11f1-8422-122e2785dc9f","CSAFPID-1212041e-3825-11f1-8422-122e2785dc9f","CSAFPID-121242e4-3825-11f1-8422-122e2785dc9f","CSAFPID-1212ac66-3825-11f1-8422-122e2785dc9f","CSAFPID-1212e712-3825-11f1-8422-122e2785dc9f","CSAFPID-12134a7c-3825-11f1-8422-122e2785dc9f","CSAFPID-12137f2e-3825-11f1-8422-122e2785dc9f","CSAFPID-1213b462-3825-11f1-8422-122e2785dc9f","CSAFPID-1214052a-3825-11f1-8422-122e2785dc9f","CSAFPID-12145ca0-3825-11f1-8422-122e2785dc9f","CSAFPID-1214c35c-3825-11f1-8422-122e2785dc9f","CSAFPID-1214fbba-3825-11f1-8422-122e2785dc9f","CSAFPID-12154ad4-3825-11f1-8422-122e2785dc9f","CSAFPID-1215a542-3825-11f1-8422-122e2785dc9f","CSAFPID-12160bc2-3825-11f1-8422-122e2785dc9f","CSAFPID-1216684c-3825-11f1-8422-122e2785dc9f","CSAFPID-1216c81e-3825-11f1-8422-122e2785dc9f","CSAFPID-12171242-3825-11f1-8422-122e2785dc9f","CSAFPID-1217509a-3825-11f1-8422-122e2785dc9f","CSAFPID-1217bef4-3825-11f1-8422-122e2785dc9f","CSAFPID-1217f2a2-3825-11f1-8422-122e2785dc9f","CSAFPID-12181b92-3825-11f1-8422-122e2785dc9f","CSAFPID-12184f72-3825-11f1-8422-122e2785dc9f"]}},{"title":"TLP:AMBER; the Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge.","notes":[{"category":"summary","text":"TLP:AMBER; the Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge."}],"cve":"CVE-2020-26558","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-1218c038-3825-11f1-8422-122e2785dc9f","CSAFPID-1219283e-3825-11f1-8422-122e2785dc9f","CSAFPID-12196ee8-3825-11f1-8422-122e2785dc9f","CSAFPID-121a0e5c-3825-11f1-8422-122e2785dc9f","CSAFPID-121a5204-3825-11f1-8422-122e2785dc9f","CSAFPID-121a9dae-3825-11f1-8422-122e2785dc9f","CSAFPID-121b4092-3825-11f1-8422-122e2785dc9f","CSAFPID-121bfe2e-3825-11f1-8422-122e2785dc9f","CSAFPID-1222006c-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-1218ea5e-3825-11f1-8422-122e2785dc9f","CSAFPID-12199c92-3825-11f1-8422-122e2785dc9f","CSAFPID-1219d0b8-3825-11f1-8422-122e2785dc9f","CSAFPID-121af2b8-3825-11f1-8422-122e2785dc9f","CSAFPID-121ba974-3825-11f1-8422-122e2785dc9f","CSAFPID-121c377c-3825-11f1-8422-122e2785dc9f","CSAFPID-121c857e-3825-11f1-8422-122e2785dc9f","CSAFPID-121ccf02-3825-11f1-8422-122e2785dc9f","CSAFPID-121d0dc8-3825-11f1-8422-122e2785dc9f","CSAFPID-121d6156-3825-11f1-8422-122e2785dc9f","CSAFPID-121e026e-3825-11f1-8422-122e2785dc9f","CSAFPID-121e3ca2-3825-11f1-8422-122e2785dc9f","CSAFPID-121e66e6-3825-11f1-8422-122e2785dc9f","CSAFPID-121eb02e-3825-11f1-8422-122e2785dc9f","CSAFPID-121f0a38-3825-11f1-8422-122e2785dc9f","CSAFPID-121f395e-3825-11f1-8422-122e2785dc9f","CSAFPID-121f84f4-3825-11f1-8422-122e2785dc9f","CSAFPID-121fb3d4-3825-11f1-8422-122e2785dc9f","CSAFPID-121ff3da-3825-11f1-8422-122e2785dc9f","CSAFPID-12201e96-3825-11f1-8422-122e2785dc9f","CSAFPID-122058ca-3825-11f1-8422-122e2785dc9f","CSAFPID-12208bd8-3825-11f1-8422-122e2785dc9f","CSAFPID-1220f33e-3825-11f1-8422-122e2785dc9f","CSAFPID-12213a60-3825-11f1-8422-122e2785dc9f","CSAFPID-1221824a-3825-11f1-8422-122e2785dc9f","CSAFPID-1221bcba-3825-11f1-8422-122e2785dc9f","CSAFPID-1222531e-3825-11f1-8422-122e2785dc9f","CSAFPID-122280b4-3825-11f1-8422-122e2785dc9f","CSAFPID-1222c290-3825-11f1-8422-122e2785dc9f","CSAFPID-122309a8-3825-11f1-8422-122e2785dc9f"]}},{"title":"The authentication protocol in the Bluetooth® Mesh Profile Specification versions 1.","notes":[{"category":"summary","text":"The authentication protocol in the Bluetooth® Mesh Profile Specification versions 1.0 and 1.0.1 is vulnerable if the AuthValue can be identified during the provisioning procedure, even if the AuthValue is selected randomly. If an attacker can identify the AuthValue used before the provisioning procedure times out, it is possible to complete the provisioning operation and obtain a NetKey."}],"cve":"CVE- 2020-26556","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-1225a3e8-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-12239152-3825-11f1-8422-122e2785dc9f","CSAFPID-1223fe44-3825-11f1-8422-122e2785dc9f","CSAFPID-12242e64-3825-11f1-8422-122e2785dc9f","CSAFPID-12248058-3825-11f1-8422-122e2785dc9f","CSAFPID-1224bc6c-3825-11f1-8422-122e2785dc9f","CSAFPID-1224f664-3825-11f1-8422-122e2785dc9f","CSAFPID-12252094-3825-11f1-8422-122e2785dc9f","CSAFPID-12256cac-3825-11f1-8422-122e2785dc9f","CSAFPID-1225dd4a-3825-11f1-8422-122e2785dc9f","CSAFPID-122610ee-3825-11f1-8422-122e2785dc9f","CSAFPID-122646cc-3825-11f1-8422-122e2785dc9f","CSAFPID-122689a2-3825-11f1-8422-122e2785dc9f","CSAFPID-1226cc8c-3825-11f1-8422-122e2785dc9f","CSAFPID-12270986-3825-11f1-8422-122e2785dc9f","CSAFPID-12276232-3825-11f1-8422-122e2785dc9f","CSAFPID-12279bb2-3825-11f1-8422-122e2785dc9f","CSAFPID-1227d000-3825-11f1-8422-122e2785dc9f","CSAFPID-12280e76-3825-11f1-8422-122e2785dc9f","CSAFPID-122847e2-3825-11f1-8422-122e2785dc9f","CSAFPID-1228aee4-3825-11f1-8422-122e2785dc9f","CSAFPID-1228f9c6-3825-11f1-8422-122e2785dc9f","CSAFPID-12292e82-3825-11f1-8422-122e2785dc9f","CSAFPID-122961cc-3825-11f1-8422-122e2785dc9f","CSAFPID-12298df0-3825-11f1-8422-122e2785dc9f","CSAFPID-1229cdce-3825-11f1-8422-122e2785dc9f","CSAFPID-122a06b8-3825-11f1-8422-122e2785dc9f","CSAFPID-122a3e80-3825-11f1-8422-122e2785dc9f","CSAFPID-122abd92-3825-11f1-8422-122e2785dc9f"]}},{"title":"The Mesh Provisioning procedure described in the Bluetooth Mesh Profile Specification versions 1.","notes":[{"category":"summary","text":"The Mesh Provisioning procedure described in the Bluetooth Mesh Profile Specification versions 1.0 and 1.0.1 could allow an attacker that was provisioned without access to the AuthValue to identify the AuthValue directly without brute-forcing its value. Even when a randomly generated AuthValue with a full 128-bits of entropy is used, an attacker acquiring the Provisioner’s public key, provisioning confirmation value, and provisioning random value and providing its public key for use in the provisioning procedure will be able to directly compute the AuthValue used."}],"cve":"CVE-2020-26559","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-122d1150-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-122bb0da-3825-11f1-8422-122e2785dc9f","CSAFPID-122c4338-3825-11f1-8422-122e2785dc9f","CSAFPID-122c7236-3825-11f1-8422-122e2785dc9f","CSAFPID-122cb872-3825-11f1-8422-122e2785dc9f","CSAFPID-122d4418-3825-11f1-8422-122e2785dc9f","CSAFPID-122d8e1e-3825-11f1-8422-122e2785dc9f","CSAFPID-122db970-3825-11f1-8422-122e2785dc9f","CSAFPID-122df930-3825-11f1-8422-122e2785dc9f","CSAFPID-122e2cf2-3825-11f1-8422-122e2785dc9f","CSAFPID-122e56b4-3825-11f1-8422-122e2785dc9f","CSAFPID-122ec400-3825-11f1-8422-122e2785dc9f","CSAFPID-122f2044-3825-11f1-8422-122e2785dc9f","CSAFPID-122fb09a-3825-11f1-8422-122e2785dc9f","CSAFPID-122fec4a-3825-11f1-8422-122e2785dc9f","CSAFPID-123027b4-3825-11f1-8422-122e2785dc9f","CSAFPID-12308aba-3825-11f1-8422-122e2785dc9f","CSAFPID-1230d1e6-3825-11f1-8422-122e2785dc9f","CSAFPID-12310918-3825-11f1-8422-122e2785dc9f","CSAFPID-123137bc-3825-11f1-8422-122e2785dc9f","CSAFPID-1231626e-3825-11f1-8422-122e2785dc9f","CSAFPID-1231b066-3825-11f1-8422-122e2785dc9f","CSAFPID-1231f7ec-3825-11f1-8422-122e2785dc9f","CSAFPID-123235cc-3825-11f1-8422-122e2785dc9f","CSAFPID-123285b8-3825-11f1-8422-122e2785dc9f","CSAFPID-1232adfe-3825-11f1-8422-122e2785dc9f","CSAFPID-1232f1b0-3825-11f1-8422-122e2785dc9f","CSAFPID-12332c66-3825-11f1-8422-122e2785dc9f","CSAFPID-1233aea2-3825-11f1-8422-122e2785dc9f"]}},{"title":"The Bluetooth Mesh Profile Specification versions 1.","notes":[{"category":"summary","text":"The Bluetooth Mesh Profile Specification versions 1.0 and 1.0.1 Mesh Provisioning procedure could allow an attacker observing or taking part in the provisioning to brute force the AuthValue if has a fixed value or is selected predictably or with low entropy. If successful, an attacker may be able to identify the AuthValue and authenticate to both the Provisioner and provisioned devices, permitting a MITM attack on a future provisioning attempt with the same AuthValue."}],"cve":"CVE-2020-26557","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#799380"}],"product_status":{"known_affected":["CSAFPID-1235febe-3825-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-12348fac-3825-11f1-8422-122e2785dc9f","CSAFPID-1234e09c-3825-11f1-8422-122e2785dc9f","CSAFPID-12355220-3825-11f1-8422-122e2785dc9f","CSAFPID-12357c0a-3825-11f1-8422-122e2785dc9f","CSAFPID-1235c214-3825-11f1-8422-122e2785dc9f","CSAFPID-12364040-3825-11f1-8422-122e2785dc9f","CSAFPID-12367e5c-3825-11f1-8422-122e2785dc9f","CSAFPID-1236b566-3825-11f1-8422-122e2785dc9f","CSAFPID-1237294c-3825-11f1-8422-122e2785dc9f","CSAFPID-1237697a-3825-11f1-8422-122e2785dc9f","CSAFPID-12379f94-3825-11f1-8422-122e2785dc9f","CSAFPID-1237cfc8-3825-11f1-8422-122e2785dc9f","CSAFPID-12381c76-3825-11f1-8422-122e2785dc9f","CSAFPID-1238ab96-3825-11f1-8422-122e2785dc9f","CSAFPID-1238dad0-3825-11f1-8422-122e2785dc9f","CSAFPID-12391cd4-3825-11f1-8422-122e2785dc9f","CSAFPID-12395410-3825-11f1-8422-122e2785dc9f","CSAFPID-12399e02-3825-11f1-8422-122e2785dc9f","CSAFPID-1239d0d4-3825-11f1-8422-122e2785dc9f","CSAFPID-123a05a4-3825-11f1-8422-122e2785dc9f","CSAFPID-123a4d02-3825-11f1-8422-122e2785dc9f","CSAFPID-123ab6f2-3825-11f1-8422-122e2785dc9f","CSAFPID-123b2fb0-3825-11f1-8422-122e2785dc9f","CSAFPID-123b6f52-3825-11f1-8422-122e2785dc9f","CSAFPID-123ba94a-3825-11f1-8422-122e2785dc9f","CSAFPID-123bf68e-3825-11f1-8422-122e2785dc9f","CSAFPID-123c3ebe-3825-11f1-8422-122e2785dc9f","CSAFPID-123cac14-3825-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-11fa8046-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-11facd58-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-11fafcec-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-11fb381a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-11fb7bea-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-11fbb95c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-11fbefda-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-11fc3a80-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-11fc6776-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-11fc93fe-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-11fccfc2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-11fcfb0a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-11fd22ba-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-11fd53a2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-11fdf050-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-11fe375e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-11fe7d04-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-11feb526-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-11ff1e8a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-11ff5fc6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-11ff9e78-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-11ffcd94-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-120007a0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-120030f4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-12006ce0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-12009972-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-1200c2f8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-12014994-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-12018cec-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-1201ca36-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-12020654-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-120246f0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-12028c50-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-12034f28-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-120395e6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fastly","product":{"name":"Fastly Products","product_id":"CSAFPID-1203cc3c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-12040616-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-1204540e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-12048bae-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-1204b5ac-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-1204def6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-12050782-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-120531c6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-12055f98-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-12058644-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-1205b542-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-1205f1d8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-12063a3a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-120683d2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-1206b9ec-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-12070366-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-12073d22-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-1207754e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-1207d246-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-1207faf0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-12082c50-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-120853a6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-12087e30-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-1208b486-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-12090652-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-1209380c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-12097c7c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-1209e464-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-120a2cc6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-120a59c6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-120a850e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-120aad9a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-120aea62-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-120b4426-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-120b6d66-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-120bab50-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-120c0352-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-120c2d00-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-120ce2f4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-120d2a8e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-120d6080-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-120daa18-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-120ded16-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-120e2fec-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-120e7a56-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-120f157e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-120f981e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-120fdf7c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-12102fa4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-12108620-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-1210ea34-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-12111b58-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-121168b0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-1211c8d2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-1212041e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fastly","product":{"name":"Fastly Products","product_id":"CSAFPID-121242e4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-12126c6a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-1212ac66-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-1212e712-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-12134a7c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-12137f2e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-1213b462-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-1214052a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-12145ca0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-1214c35c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-1214fbba-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-12154ad4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-1215a542-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-12160bc2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-1216684c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-1216c81e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-12171242-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-1217509a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-12179172-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-1217bef4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-1217f2a2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-12181b92-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-12184f72-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-1218c038-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-1218ea5e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-1219283e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-12196ee8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-12199c92-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-1219d0b8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-121a0e5c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-121a5204-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-121a9dae-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-121af2b8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-121b4092-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-121ba974-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-121bfe2e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-121c377c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-121c857e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Miredo","product":{"name":"Miredo Products","product_id":"CSAFPID-121ccf02-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-121d0dc8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fastly","product":{"name":"Fastly Products","product_id":"CSAFPID-121d6156-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-121dbcdc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-121e026e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-121e3ca2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-121e66e6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-121eb02e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-121f0a38-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-121f395e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-121f84f4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-121fb3d4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-121ff3da-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-12201e96-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-122058ca-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-12208bd8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-1220f33e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-12213a60-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-1221824a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Barracuda Networks","product":{"name":"Barracuda Networks Products","product_id":"CSAFPID-1221bcba-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-1222006c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks","product":{"name":"F5 Networks Products","product_id":"CSAFPID-1222531e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-122280b4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-1222c290-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"VMware","product":{"name":"VMware Products","product_id":"CSAFPID-122309a8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-12239152-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-1223ccbc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-1223fe44-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-12242e64-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-12248058-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-1224bc6c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-1224f664-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-12252094-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-12256cac-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-1225a3e8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-1225dd4a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-122610ee-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-122646cc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-122689a2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-1226cc8c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-12270986-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-12273604-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-12276232-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-12279bb2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-1227d000-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-12280e76-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-122847e2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-1228aee4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-1228f9c6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-12292e82-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-122961cc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-12298df0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-1229cdce-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-122a06b8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-122a3e80-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-122a7daa-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-122abd92-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-122af83e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-122bb0da-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-122bddbc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-122c4338-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-122c7236-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-122cb872-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-122d1150-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-122d4418-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-122d8e1e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-122db970-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-122df930-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-122e2cf2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-122e56b4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-122ec400-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-122f2044-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-122f7b02-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-122fb09a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-122fec4a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-123027b4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-12308aba-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-1230d1e6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-12310918-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-123137bc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-1231626e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-1231b066-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-1231f7ec-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-123235cc-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-123285b8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-1232adfe-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-1232f1b0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-12332c66-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-1233633e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-1233aea2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-1233de4a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Android Open Source Project","product":{"name":"Android Open Source Project Products","product_id":"CSAFPID-12348fac-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-1234e09c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell","product":{"name":"Dell Products","product_id":"CSAFPID-1235158a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microchip Technology","product":{"name":"Microchip Technology Products","product_id":"CSAFPID-12355220-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-12357c0a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-1235c214-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-1235febe-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-12364040-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"McAfee","product":{"name":"McAfee Products","product_id":"CSAFPID-12367e5c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-1236b566-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Green Hills Software","product":{"name":"Green Hills Software Products","product_id":"CSAFPID-1237294c-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-1237697a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-12379f94-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks","product":{"name":"Arista Networks Products","product_id":"CSAFPID-1237cfc8-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-12381c76-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"u-blox","product":{"name":"u-blox Products","product_id":"CSAFPID-12385f1a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Treck","product":{"name":"Treck Products","product_id":"CSAFPID-1238ab96-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-1238dad0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-12391cd4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belden","product":{"name":"Belden Products","product_id":"CSAFPID-12395410-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-12399e02-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sophos","product":{"name":"Sophos Products","product_id":"CSAFPID-1239d0d4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-123a05a4-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-123a4d02-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eCosCentric","product":{"name":"eCosCentric Products","product_id":"CSAFPID-123ab6f2-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-123b2fb0-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Infoblox","product":{"name":"Infoblox Products","product_id":"CSAFPID-123b6f52-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-123ba94a-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-123bf68e-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti","product":{"name":"Ubiquiti Products","product_id":"CSAFPID-123c3ebe-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat","product":{"name":"Red Hat Products","product_id":"CSAFPID-123c73b6-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-123cac14-3825-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ceragon Networks Inc","product":{"name":"Ceragon Networks Inc Products","product_id":"CSAFPID-123cea26-3825-11f1-8422-122e2785dc9f"}}]}}