{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:27:01.282","vulnerabilities":[{"cve":{"id":"CVE-2021-1542","sourceIdentifier":"psirt@cisco.com","published":"2021-06-16T18:15:08.473","lastModified":"2024-11-21T05:44:35.087","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory."},{"lang":"es","value":"Múltiples vulnerabilidades en la interfaz de administración basada en web de Cisco Small Business 220 Series Smart Switches podrían permitir a un atacante hacer lo siguiente: Secuestrar una sesión de usuario, Ejecutar comandos arbitrarios como usuario root en el sistema operativo subyacente, Conducir un ataque de tipo cross-site scripting (XSS), Conducir un ataque de inyección HTML. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sf220-24_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"592CAF99-2CD8-46F2-8715-9930F22A4DE8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sf220-24:-:*:*:*:*:*:*:*","matchCriteriaId":"7CBD8429-E036-4934-AF6A-3B5095F87ADF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sf220-24p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"513E4F52-6493-4A92-90CA-8A92CC9ECA8C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sf220-24p:-:*:*:*:*:*:*:*","matchCriteriaId":"02258A44-A9BA-471B-AEEC-BDCBD44D6BD0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sf220-48_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"DE41D686-C6AB-46E5-899C-523BC9E216C7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sf220-48:-:*:*:*:*:*:*:*","matchCriteriaId":"AC0EB976-563C-41B9-9F3F-2584721EDAA7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sf220-48p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"9CAA3662-6E4A-4842-A667-31634AF59437"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sf220-48p:-:*:*:*:*:*:*:*","matchCriteriaId":"AAA7BE42-9570-4550-991A-4B6821D8F723"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sg220-26_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"02042FA3-B98E-4BED-BB2F-B50E010D9EFC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sg220-26:-:*:*:*:*:*:*:*","matchCriteriaId":"69CE90A1-9914-457B-9E23-E63765275D62"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sg220-26p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"D704F371-A2A4-417B-825E-E083AC8EBC89"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sg220-26p:-:*:*:*:*:*:*:*","matchCriteriaId":"F70FBA10-934C-45F6-A01D-4BAD5F421C96"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sg220-28mp_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"458DC6B7-781D-4AA9-90D1-773C7DCFBE59"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sg220-28mp:-:*:*:*:*:*:*:*","matchCriteriaId":"67CDEE3C-5A58-45A4-B092-07CA9418131F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sg220-50_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"C1478637-D8E5-477C-B487-C3D0AD623B90"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sg220-50:-:*:*:*:*:*:*:*","matchCriteriaId":"E024644E-83BD-49CA-8E27-8977B15713BE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sg220-50p_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0.6","matchCriteriaId":"52346644-43C4-45C5-905E-6A3F95806FF4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:sg220-50p:-:*:*:*:*:*:*:*","matchCriteriaId":"808746E3-4A3D-44F3-8510-52D699F7D3C2"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}