{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T10:19:14.603","vulnerabilities":[{"cve":{"id":"CVE-2017-3873","sourceIdentifier":"psirt@cisco.com","published":"2017-05-16T17:29:00.213","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Plug-and-Play (PnP) subsystem of the Cisco Aironet 1800, 2800, and 3800 Series Access Points running a Lightweight Access Point (AP) or Mobility Express image could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges. The vulnerability is due to insufficient validation of PnP server responses. The PnP feature is only active while the device does not contain a configuration, such as a first time boot or after a factory reset has been issued. An attacker with the ability to respond to PnP configuration requests from the affected device can exploit the vulnerability by returning malicious PnP responses. If a Cisco Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) is available on the network, the attacker would need to exploit the issue in the short window before a valid PnP response was received. If successful, the attacker could gain the ability to execute arbitrary code with root privileges on the underlying operating system of the device. Cisco has confirmed that the only vulnerable software version is 8.3.102.0. Cisco Bug IDs: CSCvb42386."},{"lang":"es","value":"Una vulnerabilidad en el subsistema Plug-and-Play (PnP) de los Puntos de Acceso Aironet 1800, 2800, y 3800 Series de Cisco que ejecutan una imagen de Lightweight Access Point (AP) o Mobility Express, podría permitir que un atacante adyacente no autenticado ejecute código arbitrario con privilegios root. La vulnerabilidad es debido a la comprobación insuficiente de las respuestas del servidor PnP. La funcionalidad PnP solo está activa mientras que el dispositivo no contenga una configuración, como un arranque por primera vez o después de que se haya emitido un restablecimiento de fábrica. Un atacante con la capacidad de responder a las peticiones de configuración PnP desde el dispositivo afectado puede explotar la vulnerabilidad mediante la devolución de respuestas PnP maliciosas. Si un Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) de Cisco está disponible en la red, el atacante necesitaría explotar el problema en la ventana corta antes de que se recibiera una respuesta válida PnP. Si tiene éxito,  el atacante podría conseguir la capacidad de ejecutar código arbitrario con privilegios root en el sistema operativo subyacente del dispositivo. Cisco ha confirmado que la única versión de software vulnerable es 8.3.102.0. ID de bug de Cisco: CSCvb42386."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:C/I:C/A:C","baseScore":7.9,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":5.5,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:aironet_access_point_firmware:8.3_102.0:*:*:*:*:*:*:*","matchCriteriaId":"314B7D2D-41BB-4041-8131-4F931FD9C8D2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*","matchCriteriaId":"4590D445-B4B6-48E6-BF55-BEA6BA763410"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*","matchCriteriaId":"848CC5CD-1982-4F31-A626-BD567E1C19F0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*","matchCriteriaId":"24E47788-9B54-42C5-AD83-428B22674575"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*","matchCriteriaId":"A333CD0B-4729-4E64-8B52-A3F5138F5B70"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*","matchCriteriaId":"098A82FF-95F7-416A-BADD-C57CE81ACD32"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*","matchCriteriaId":"DD1D5813-9223-4B3F-9DE2-F3EF854FC927"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*","matchCriteriaId":"10D7583E-2B61-40F1-B9A6-701DA08F8CDF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*","matchCriteriaId":"945DDBE7-6233-416B-9BEE-7029F047E298"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*","matchCriteriaId":"0ED89428-750C-4C26-B2A1-E3D63F8B3F44"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/98296","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038394","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cme","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98296","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038394","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cme","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}