{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T22:19:16.626","vulnerabilities":[{"cve":{"id":"CVE-2010-0596","sourceIdentifier":"psirt@cisco.com","published":"2010-05-27T19:30:01.313","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Cisco Mediator Framework 2.2 before 2.2.1.dev.1 and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 allows remote authenticated users to read or modify the device configuration, and gain privileges, via a (1) HTTP or (2) HTTPS request, aka Bug ID CSCtb83607."},{"lang":"es","value":"Vulnerabilidad sin especificar en Cisco Mediator Framework v1.5.1 anterior a v1.5.1.build.14-eng, v2.2 anterior a v2.2.1.dev.1, y v3.0 anterior a v3.0.9.release.1 en Cisco Network Building Mediator NBM-2400 y NBM-4800 y en Richards-Zeta Mediator v2500 permite a usuarios autenticados remotamente leer o modificar la configuración del dispositivo, y obtener privilegios, a través de una petición (1) HTTP o (2) HTTPS, también conocido como Bug ID CSCtb83607."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:mediator_framework:2.2:*:*:*:*:*:*:*","matchCriteriaId":"43882C04-733C-4E82-80BA-E448727964CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:mediator_framework:3.0.8:*:*:*:*:*:*:*","matchCriteriaId":"AA5908EA-AE44-4D6A-A075-25F29018EC67"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:network_building_mediator_nbm-2400:*:*:*:*:*:*:*:*","matchCriteriaId":"B424A35F-EF83-4E78-BFD4-4FF31BF5959C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:network_building_mediator_nbm-4800:*:*:*:*:*:*:*:*","matchCriteriaId":"653E88C2-72DC-4842-A7C1-0C671A09A4B0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:richards-zeta_mediator_2500:*:*:*:*:*:*:*:*","matchCriteriaId":"E41E17D4-5C33-4F8A-A1E2-8D7FE47D8492"}]}]}],"references":[{"url":"http://secunia.com/advisories/39904","source":"psirt@cisco.com"},{"url":"http://securitytracker.com/id?1024027","source":"psirt@cisco.com"},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.kb.cert.org/vuls/id/757804","source":"psirt@cisco.com","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf","source":"psirt@cisco.com"},{"url":"http://secunia.com/advisories/39904","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1024027","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.kb.cert.org/vuls/id/757804","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}