Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD5A5BFF-E062-4663-B96C-D40DFF899EED", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.78.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2486222-1595-4FA2-80E8-8EE996C11CD8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.116.21:*:*:*:*:*:*:*", "matchCriteriaId": "D3A79CB6-6094-46AC-8574-FF6DC7FB592C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.150.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A558875-504D-4D2F-BF48-F29ABCCF6840", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.150.10:*:*:*:*:*:*:*", "matchCriteriaId": "D3C646C8-021E-4F3E-8580-C364A6FF6B8A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.171.5:*:*:*:*:*:*:*", "matchCriteriaId": "53DCF441-096D-444D-8995-FF71EC149471", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.171.6:*:*:*:*:*:*:*", "matchCriteriaId": "16AB56C1-1DB9-454E-836B-8AA56C4309FB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.185.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E918087-75F7-4742-B9B9-39FEE3A069A4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.193.5:*:*:*:*:*:*:*", "matchCriteriaId": "7BD0A4A5-A9A4-46A9-BDE0-5203864D4E5D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.195.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B431407-D4A7-4A9A-8C9F-5E8C1D162149", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:*", "matchCriteriaId": "E23E6B23-2DFC-4959-B69D-35B12A3674C5", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F9E44A7-9C79-4937-B929-D7CD48969D44", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:*", "matchCriteriaId": "D91822EB-04F3-4590-9E74-C173D332FF64", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:*", "matchCriteriaId": "328B192D-6070-46C9-9B5E-E2D19197516E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:*", "matchCriteriaId": "9AEB928B-97EC-490F-A313-B565FB67C8D7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "27C3E9DF-439E-4319-BFA3-14D756069FFD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:*", "matchCriteriaId": "546C8A02-3C19-4AE8-98D6-D24342306764", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:*", "matchCriteriaId": "D882A253-143C-4561-B0CA-209D48A995F2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AA48A99-0ED5-4FEB-8906-B68D4C5C702E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F3A8DBB-9E82-4428-9034-391F662DFA0B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CC513E-95EA-4FA0-AD70-25C51155AD26", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:*", "matchCriteriaId": "272C20B5-3EA4-4AFD-ACD6-15A8ABA73C83", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:*", "matchCriteriaId": "11F235E4-673A-4EC4-98F6-423C68919AB8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1m:*:*:*:*:*:*:*", "matchCriteriaId": "7701D5E7-9264-4A34-9467-9AB3CA5E4A8C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*", "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2m:*:*:*:*:*:*:*", "matchCriteriaId": "AD3F13F4-0E96-490D-9DA0-8B22595E9BC9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*", "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*", "matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*", "matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*", "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 3.2 before 3.2.215.0; 4.1 and 4.2 before 4.2.205.0; 4.1M and 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.188.0; and 5.2 before 5.2.193.11 allows remote attackers to cause a denial of service (device reload) via a crafted IKE packet, aka Bug ID CSCta56653."}, {"lang": "es", "value": "Vulnerabilidad no espec\u00edfica en Cisco Wireless LAN Controller (WLC), v3.2 anterior a v3.2.215.0; v4.1 y v4.2 anteriores a v4.2.205.0; v4.1M y v4.2M anteriores a v4.2.207.54M; v5.0, v5.1, y v6.0 anteriores a v6.0.188.0; y v5.2 anteriores a v5.2.193.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes IKE modificados, tambi\u00e9n conocido como Bug ID CSCta56653."}], "id": "CVE-2010-0574", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-09-10T18:00:01.800", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21287"}, {"source": "psirt@cisco.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21287"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}