{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:55:03.175","vulnerabilities":[{"cve":{"id":"CVE-2019-1826","sourceIdentifier":"psirt@cisco.com","published":"2019-04-18T02:29:05.467","lastModified":"2024-11-21T04:37:28.750","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi frames by the affected device. An attacker could exploit this vulnerability by sending malformed Wi-Fi frames to an affected device. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la característica quality of service (QoS) de Aironet Access Points (APs) de Cisco, podría permitir a un atacante identificado localmente generar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a la comprobación de entrada incorrecta en los campos de QoS dentro de las tramas Wi-Fi por el dispositivo afectado. Un atacante podría aprovechar esta vulnerabilidad enviando tramas Wi-Fi malformadas a un dispositivo afectado. Una operación con éxito  podría permitir que el atacante hiciera que el dispositivo afectado se bloqueara, resultando en una condición de DoS."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:S/C:N/I:N/A:C","baseScore":5.5,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":5.1,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:aironet_access_point_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"8BE299E5-8999-41D7-B424-6303D127A833"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*","matchCriteriaId":"1D717945-EE41-4D0F-86EF-90826EBE9C3E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*","matchCriteriaId":"99EAEA92-6589-4DFB-BC4B-8CBA425452D9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*","matchCriteriaId":"D27AB201-342D-4517-9E05-6088598F4695"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*","matchCriteriaId":"098A82FF-95F7-416A-BADD-C57CE81ACD32"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*","matchCriteriaId":"DD1D5813-9223-4B3F-9DE2-F3EF854FC927"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*","matchCriteriaId":"10D7583E-2B61-40F1-B9A6-701DA08F8CDF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*","matchCriteriaId":"945DDBE7-6233-416B-9BEE-7029F047E298"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*","matchCriteriaId":"0ED89428-750C-4C26-B2A1-E3D63F8B3F44"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*","matchCriteriaId":"C4D8A4CB-5B80-4332-BCBC-DA18AD94D215"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:aironet_access_point_firmware:8.5\\(131.3\\):*:*:*:*:*:*:*","matchCriteriaId":"40E385D0-65C6-4E42-896A-38BD6E52F3A0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*","matchCriteriaId":"24E47788-9B54-42C5-AD83-428B22674575"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*","matchCriteriaId":"A333CD0B-4729-4E64-8B52-A3F5138F5B70"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/107988","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-aap-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/107988","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-aap-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}