2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-3034" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2010-09-10T18:00:02.393" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:17:54.960" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-0575."
} ,
{
"lang" : "es" ,
"value" : "El software Cisco Wireless LAN Controller (WLC), posiblemente v6.0.x o posiblemente v4.1 hasta v6.0.x, permite a atacantes remotos saltar las ACLs (listas de control de acceso) en el controlador de CPU, y consecuentemente enviar tr\u00e1fico de red a segmentos o dispositivos no deseados, a trav\u00e9s de vectores no especificados. Es una vulnerabilidad distinta a CVE-2010-0575."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DC1E1F40-ECB6-42FB-838E-998B1893D5CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "62424F6A-2D82-45C0-A7D3-540649DA5F5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A17769C-A301-4BC9-A2B1-E442F78030C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0947448E-D8C5-423D-BDF3-36BD29A83ABE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57C6B8CB-9277-463B-84EB-AEF36EE40E7B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A97D98B-6B3C-4AD1-8096-202E44F63B72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C29D759-F433-42FB-ADA5-8FEA71085CC7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5140A4F1-713E-4478-B807-83D826DAA374"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68625A20-073A-4AC9-8C46-BCE07B185D8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2143731F-749D-45ED-B2FE-A3893C5B1F6B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2230FF3-EE71-408A-B558-74AAD024F661"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "593615BB-EDEC-4267-9D6A-B67E89BB0BD6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F555475A-7ED8-45DD-93C5-BC3BFA07851B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=21291" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=21291" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}