<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PSIRT OpenVuln API: Versions not found in CSAF in Services Discussions</title>
    <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5243937#M1159</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1798792"&gt;@louis-yu&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I can see the software versions should've been filled out for this advisory. I am not sure why it isn't, is this something you have any insight into&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/358128"&gt;@PR Oxman&lt;/a&gt;?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Depending on the nature your application you either need to interpret this as "all releases", display the fixed releases portion of the advisory or parse this data from the notes section somehow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jan 2025 12:49:45 GMT</pubDate>
    <dc:creator>Torbjørn</dc:creator>
    <dc:date>2025-01-06T12:49:45Z</dc:date>
    <item>
      <title>PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5118304#M1117</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I am using the PSIRT APIs to fetch data from IOS, IOS XE, IOS XR, and NX OS. Through the API, I retrieve the CSAF URL and download the associated JSON. However, there is some missing information regarding which versions are vulnerable to the relevant advisories.&lt;BR /&gt;&lt;BR /&gt;Here are some examples:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot from 2024-05-28 10-16-34.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219323i913DFC385441796B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot from 2024-05-28 10-16-34.png" alt="Screenshot from 2024-05-28 10-16-34.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;This image represents the CSAF JSON file of &lt;STRONG&gt;cisco-sa-snmp-uwBXfqww&lt;/STRONG&gt;. As you can see, the information about product versions is displayed. However, in some cases, the versions are not specified in the CSAF.&amp;nbsp;&lt;/SPAN&gt;Specifically, for IOS XR, none of the versions are displayed. Here’s an example of a CSAF JSON file for &lt;STRONG&gt;cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="emanueledisalvia_0-1716887674371.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219324i9841D464C87812C0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="emanueledisalvia_0-1716887674371.png" alt="emanueledisalvia_0-1716887674371.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;To achieve what I want, I actually need those versions. So my question is: If I encounter cases where these versions are missing, how should I handle them? Should it be interpreted as "All versions of this family are affected"?&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Emanuele Di Salvia&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 09:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5118304#M1117</guid>
      <dc:creator>emanuele-disalvia</dc:creator>
      <dc:date>2024-05-28T09:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5118412#M1118</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1695559"&gt;@emanuele-disalvia&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The "versions affected" data seems to be provided by &lt;A href="https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" target="_self"&gt;Cisco Software Checker&lt;/A&gt;, which currently only supports checking versions of the following OSes: ASA, FMC, FTD, FXOS, IOS, IOS XE, NX-OS. AFAIK there is no other API that will give you the same information for IOS XR.&lt;/P&gt;&lt;P&gt;How to handle this comes down to your specific application/program. I believe you will either have to interpret it as "all versions are affected", or you will have to either display/parse the "Fixed releases" potion of each IOS XR advisory.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 11:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5118412#M1118</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2024-05-28T11:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5118936#M1119</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Today it is fair to say that Cisco only populates the affected version information in CSAF for products that are supported by Software Checker - IOS, IOS-XE, Cisco ASA, FMC, FTD, FXOS, IOS, IOS XE, NX-OS and NX-OS in ACI Mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; For all other products the CSAF product tree only indicates the affected product. The affected and fixed releases are typically presented in a table in the Fixed Software portion of the advisory. So if you have a product family with no product versions you need to flag for manual inspection of the advisory/CSAF.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Cisco are considering opening this up for all products (no timeframe), but for all other products it would be a snapshot only at the time of publication, rather than a dynamically updated CSAF.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 21:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5118936#M1119</guid>
      <dc:creator>PR Oxman</dc:creator>
      <dc:date>2024-05-28T21:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5243873#M1158</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/964504"&gt;@Torbjørn&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This image represents the CSAF JSON file of &lt;STRONG&gt;cisco-sa-20180620-n3k-n9k-clisnmp&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you mentioned that NX-OS is supported by software checker but there's no version displayed in the CSAF file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Should this be parsed as "all versions of NX-OS are affected"?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="louisyu_1-1736157425828.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237041i61CC9738FDAD03BC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="louisyu_1-1736157425828.png" alt="louisyu_1-1736157425828.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards, &lt;/P&gt;
&lt;P&gt;Louis&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 10:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5243873#M1158</guid>
      <dc:creator>louis-yu</dc:creator>
      <dc:date>2025-01-06T10:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5243937#M1159</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1798792"&gt;@louis-yu&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I can see the software versions should've been filled out for this advisory. I am not sure why it isn't, is this something you have any insight into&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/358128"&gt;@PR Oxman&lt;/a&gt;?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Depending on the nature your application you either need to interpret this as "all releases", display the fixed releases portion of the advisory or parse this data from the notes section somehow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 12:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5243937#M1159</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2025-01-06T12:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5244174#M1162</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/358128"&gt;@PR Oxman&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;As you mentioned that only OS that supported in softeware checker(e.g. IOS, IOS-XE, Cisco ASA, FMC, FTD, FXOS, IOS, IOS XE, NX-OS and NX-OS in ACI Mode) will display affected version number in csaf json file.&lt;/P&gt;
&lt;P&gt;I notice that there are some do support in checker but didn't display version number as it should be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ex: &lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cisco-sa-http2-reset-d8Kf32vZ&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;No 'NX-OS' version number displayed&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="louisyu_0-1736219551722.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237088iA391C5EBCEBBD694/image-size/medium?v=v2&amp;amp;px=400" role="button" title="louisyu_0-1736219551722.png" alt="louisyu_0-1736219551722.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cisco-sa-20190513-secureboot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;No 'aci' version number displayed&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="louisyu_1-1736219679979.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237089iF93EFFCEC91C6A8A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="louisyu_1-1736219679979.png" alt="louisyu_1-1736219679979.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We currently working on a project that can automatically fectch fix patch versions based on affected os name and versions in the advisory.&lt;/P&gt;
&lt;P&gt;Any suggestions will be welcome.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Louis&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 03:20:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5244174#M1162</guid>
      <dc:creator>louis-yu</dc:creator>
      <dc:date>2025-01-07T03:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT OpenVuln API: Versions not found in CSAF</title>
      <link>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5246223#M1168</link>
      <description>&lt;P&gt;Posting Michaels response for the wider audience:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hi Louis,&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Thanks for contacting the Cisco PSIRT.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The first advisory you are referencing below (&lt;A title="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ" data-outlook-id="934c10db-0198-4169-8515-23ef295275f3" target="_blank"&gt;&lt;SPAN class="outlook-search-highlight" data-markjs="true"&gt;cisco-sa-http2-reset-d8Kf32vZ&lt;/SPAN&gt;&lt;/A&gt;) is an advisory for a security vulnerability in a third-party software (TPS) component used by multiple Cisco products. For this type of advisories the first fixed releases information is available only in the table of the textual (HTML) version of the advisory and the per-product bug IDs that are referenced both in the HTML version and also the CSAF (JSON) version.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;The second advisory you referenced below (&lt;A title="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" data-outlook-id="cebcf47f-14d5-494d-9dc2-91029f618bd5" target="_blank"&gt;cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ&lt;/A&gt;) is from 2021. At that time, the Cisco Software Checker did not yet support FXOS (which is why the HTML version of the advisory contains a table for FXOS first fixed releases rather than a pointer to the Cisco Software Checker tool). Cisco Software Checker Support for FXOS was only added late August 2022.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;One of the first advisories that used Cisco Software Checker for FXOS was&amp;nbsp;&lt;A title="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9" data-outlook-id="2c0f6b1c-3fc8-4be5-8b8a-08180a47854e" target="_blank"&gt;cisco-sa-nxos-cdp-dos-ce-wWvPucC9&lt;/A&gt;. In&amp;nbsp;&lt;A title="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9/csaf/cisco-sa-nxos-cdp-dos-ce-wWvPucC9.json" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9/csaf/cisco-sa-nxos-cdp-dos-ce-wWvPucC9.json" data-outlook-id="9ef9561e-1aa2-4ce3-9773-4b0002e885d4" target="_blank"&gt;its CSAF/JSON version&lt;/A&gt;&amp;nbsp;you will find FXOS version information.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;I hope this helps. Let me know if you have further questions.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Thanks,&lt;/DIV&gt;
&lt;DIV&gt;Michael&lt;/DIV&gt;</description>
      <pubDate>Sun, 12 Jan 2025 23:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/psirt-openvuln-api-versions-not-found-in-csaf/m-p/5246223#M1168</guid>
      <dc:creator>PR Oxman</dc:creator>
      <dc:date>2025-01-12T23:07:05Z</dc:date>
    </item>
  </channel>
</rss>

