{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:25:59.766","vulnerabilities":[{"cve":{"id":"CVE-2022-20695","sourceIdentifier":"psirt@cisco.com","published":"2022-04-15T15:15:12.917","lastModified":"2024-11-21T06:43:20.707","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to bypass authentication controls and log in to the device through the management interface This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and log in to the device as an administrator. The attacker could obtain privileges that are the same level as an administrative user but it depends on the crafted credentials. Note: This vulnerability exists because of a non-default device configuration that must be present for it to be exploitable. For details about the vulnerable configuration, see the Vulnerable Products section of this advisory."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad de autenticación del software Cisco Wireless LAN Controller (WLC) podría permitir a un atacante remoto no autenticado omitir los controles de autenticación e iniciar sesión en el dispositivo mediante la interfaz de administración Esta vulnerabilidad es debido a la implementación inapropiada del algoritmo de comprobación de contraseñas. Un atacante podría aprovechar esta vulnerabilidad al iniciar sesión en un dispositivo afectado con credenciales diseñadas. Una explotación con éxito podría permitir al atacante omitir la autenticación e iniciar sesión en el dispositivo como administrador. El atacante podría alcanzar privilegios del mismo nivel que un usuario administrativo, pero depende de las credenciales diseñadas. Nota: Esta vulnerabilidad se presenta debido a una configuración del dispositivo no predeterminada que debe estar presente para que sea explotable. Para más detalles sobre la configuración vulnerable, consulte la sección Vulnerable Products de este aviso"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-303"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:wireless_lan_controller_8.10.151.0:*:*:*:*:*:*:*:*","matchCriteriaId":"3DAA4FE7-776C-457A-9408-1700FC406382"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:wireless_lan_controller_8.10.162.0:*:*:*:*:*:*:*:*","matchCriteriaId":"0C3F42D0-98D3-45B1-AEA2-8666DAC15A71"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:cisco:virtual_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"A6BF3FF9-F50A-43F7-8BFC-A583839CF068"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:3504_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"EEB12B16-B21C-4971-AC98-CE69917BB26E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:5520_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"E455D982-A20F-4E69-8702-19D1208D1F0C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:8540_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"3E99D52E-9925-4EC5-B86B-F85FB41602B3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*","matchCriteriaId":"72BFEED4-7AD7-406F-A044-BDEA98133711"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*","matchCriteriaId":"C5DB7510-2741-464A-8FC9-8419985E330F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*","matchCriteriaId":"3AE916B2-CAAD-4508-A47E-A7D4D88B077A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*","matchCriteriaId":"8191FD87-4E55-4F38-8DB0-7E6772AD075B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*","matchCriteriaId":"1D717945-EE41-4D0F-86EF-90826EBE9C3E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*","matchCriteriaId":"99EAEA92-6589-4DFB-BC4B-8CBA425452D9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*","matchCriteriaId":"D27AB201-342D-4517-9E05-6088598F4695"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*","matchCriteriaId":"F8BF9DDB-884D-47B5-A295-8BFA5207C412"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*","matchCriteriaId":"207DC80E-499C-4CA3-8A88-F027DBC64CCF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:*","matchCriteriaId":"6E3225A6-DA3C-49FE-B0F8-8AC6B7DA3347"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:*","matchCriteriaId":"0E1D6F32-3F51-4C5B-97AF-1AD8917FCB07"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:*","matchCriteriaId":"E09FEE6E-8169-4E90-ACF6-88BEE747D7A8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1830:-:*:*:*:*:*:*:*","matchCriteriaId":"093AB3A8-853B-4094-BFB5-6A8775AAA8D3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*","matchCriteriaId":"4590D445-B4B6-48E6-BF55-BEA6BA763410"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*","matchCriteriaId":"848CC5CD-1982-4F31-A626-BD567E1C19F0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*","matchCriteriaId":"751469E2-91A8-48F1-81A8-AEBF1420EECE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850:-:*:*:*:*:*:*:*","matchCriteriaId":"BE0B76A8-377E-4176-8F04-B0D468D4E767"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*","matchCriteriaId":"24E47788-9B54-42C5-AD83-428B22674575"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*","matchCriteriaId":"A333CD0B-4729-4E64-8B52-A3F5138F5B70"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*","matchCriteriaId":"80871D9C-43D5-4507-AC36-CDD7CC4A7C86"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*","matchCriteriaId":"3C28A6B0-10FF-4C6D-8527-2313E163C98E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*","matchCriteriaId":"098A82FF-95F7-416A-BADD-C57CE81ACD32"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*","matchCriteriaId":"DD1D5813-9223-4B3F-9DE2-F3EF854FC927"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*","matchCriteriaId":"7636F7E2-E386-4F8C-A0C5-F510D8E21DA4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*","matchCriteriaId":"10D7583E-2B61-40F1-B9A6-701DA08F8CDF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*","matchCriteriaId":"945DDBE7-6233-416B-9BEE-7029F047E298"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*","matchCriteriaId":"0ED89428-750C-4C26-B2A1-E3D63F8B3F44"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*","matchCriteriaId":"C4D8A4CB-5B80-4332-BCBC-DA18AD94D215"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-auth-bypass-JRNhV4fF","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-auth-bypass-JRNhV4fF","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}