{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:06:21.141","vulnerabilities":[{"cve":{"id":"CVE-2022-20810","sourceIdentifier":"psirt@cisco.com","published":"2022-09-30T19:15:11.703","lastModified":"2024-11-21T06:43:36.007","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Simple Network Management Protocol (SNMP) of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an authenticated, remote attacker to access sensitive information. This vulnerability is due to insufficient restrictions that allow a sensitive configuration detail to be disclosed. An attacker could exploit this vulnerability by retrieving data through SNMP read-only community access. A successful exploit could allow the attacker to view Service Set Identifier (SSID) preshared keys (PSKs) that are configured on the affected device."},{"lang":"es","value":"Una vulnerabilidad en el Protocolo simple de administración de redes (SNMP) del software Cisco IOS XE Wireless Controller para la familia Catalyst 9000 podría permitir a un atacante remoto autenticado acceder a información confidencial. Esta vulnerabilidad es debido a una insuficiencia de restricciones que permiten divulgar un detalle de configuración confidencial. Un atacante podría explotar esta vulnerabilidad al recuperar datos mediante el acceso a la comunidad de sólo lectura de SNMP. Una explotación con éxito podría permitir al atacante visualizar las claves precompartidas (PSK) del Identificador de Conjunto de Servicios (SSID) que están configuradas en el dispositivo afectado"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-202"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*","matchCriteriaId":"B7D95E8A-8F0B-44E5-B266-09E10BAAEC55"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*","matchCriteriaId":"A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*","matchCriteriaId":"1B9ED0E5-CB20-4106-9CF2-8EB587B33543"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"8E283C34-43AE-49A5-A72B-32DEA185ABD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*","matchCriteriaId":"2B0E620C-8E09-4F7C-A326-26013173B993"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"ADB3AF13-5324-42CD-8EDB-6F730BF46214"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*","matchCriteriaId":"FF93F1C8-669F-4ECB-8D81-ECDA7B550175"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*","matchCriteriaId":"2E0BA345-B7D7-4975-9199-4DC7875BBFD0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*","matchCriteriaId":"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*","matchCriteriaId":"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"78706517-83F4-4D44-A6EC-B78ADCEABAC0"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cwlc-snmpidv-rnyyQzUZ","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cwlc-snmpidv-rnyyQzUZ","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}