CVE-2010-0575
Published Sep 10, 2010
Last updated 14 years ago
Overview
- Description
- Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B" } ], "operator": "OR" } ] } ]