{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T23:02:30.515","vulnerabilities":[{"cve":{"id":"CVE-2021-1400","sourceIdentifier":"psirt@cisco.com","published":"2021-05-06T13:15:09.983","lastModified":"2024-11-21T05:44:16.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."},{"lang":"es","value":"Múltiples vulnerabilidades en la interfaz de administración basada en web de determinados  Wireless Access Points de Cisco Small Business 100, 300, and 500 Series, podrían permitir a un atacante remoto autenticado conseguir información confidencial o inyectar comandos arbitrarios en un dispositivo afectado.&#xa0;Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:wap125_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.3.1","matchCriteriaId":"FA84E503-E035-44D6-8742-02953CFA6A70"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:wap125:-:*:*:*:*:*:*:*","matchCriteriaId":"EECA8468-5D7D-46DD-A967-E7EDA5FE8D4C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:wap131_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.2.17","matchCriteriaId":"AA272A22-8CDA-4F6A-B39F-40CF3FE25500"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*","matchCriteriaId":"5B3B7126-28E1-42F8-98CF-0EC156BE68D7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:wap150_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.2.4","matchCriteriaId":"21FF39B7-E738-4892-9F94-12EE46E0323A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*","matchCriteriaId":"CAB01CB7-C5BB-49D6-85A7-CECED514C7CC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:wap351_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.2.17","matchCriteriaId":"75164093-946B-49B5-922E-EBBA56A9088A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*","matchCriteriaId":"C9917176-E908-4110-A641-FED1DFF41C43"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:wap361_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.2.4","matchCriteriaId":"3CCE33DA-DB97-4C04-BB34-3757FAF4592C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:wap361:-:*:*:*:*:*:*:*","matchCriteriaId":"49477A11-78C3-4EEA-899E-5E4623D38068"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:wap581_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.3.1","matchCriteriaId":"A274C297-CB27-460B-9177-F11326B31CB8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:wap581:-:*:*:*:*:*:*:*","matchCriteriaId":"C857E391-3C62-4F37-BD86-7184F79B89B7"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN71263107/index.html","source":"psirt@cisco.com","tags":["Third Party Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://jvn.jp/en/jp/JVN71263107/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}