Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*", "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*", "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*", "matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*", "matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*", "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-3033."}, {"lang": "es", "value": "El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados saltar las limitaciones de acceso impuestas, modificar la configuraci\u00f3n y posiblemente obtener derechos administrativos, a trav\u00e9s de vectores no espec\u00edficos, vulnerabilidad diferente a CVE-2010-2842 and CVE-2010-3033."}], "id": "CVE-2010-2843", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-09-10T18:00:02.020", "references": [{"source": "psirt@cisco.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21290"}, {"source": "psirt@cisco.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21290"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}