mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
191 lines
7.4 KiB
JSON
191 lines
7.4 KiB
JSON
{
|
|
"id": "CVE-2010-2842",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2010-09-10T18:00:01.973",
|
|
"lastModified": "2010-09-13T04:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2843 and CVE-2010-3033."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados saltar las limitaciones de acceso impuestas, modificar la configuraci\u00f3n y posiblemente obtener derechos administrativos, a trav\u00e9s de vectores no espec\u00edficos, vulnerabilidad diferente a CVE-2010-2843 and CVE-2010-3033."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21290",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |