cve-2009-2976
Vulnerability from cvelistv5
Published
2009-08-27 17:00
Modified
2024-09-16 18:49
Severity ?
EPSS score ?
Summary
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:37.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "1022774", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022774" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-08-27T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "1022774", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022774" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2976", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf", "refsource": "MISC", "url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf" }, { "name": "1022774", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022774" }, { "name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php", "refsource": "MISC", "url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2976", "datePublished": "2009-08-27T17:00:00Z", "dateReserved": "2009-08-27T00:00:00Z", "dateUpdated": "2024-09-16T18:49:52.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E8B5553-7295-4786-9F81-B4527EAD4F0B\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.\"}, {\"lang\": \"es\", \"value\": \"Los dispositivos Cisco Aironet Lightweight Access Point (AP) env\\u00edan el contenido de ciertos paquetes de multidifusi\\u00f3n en texto plano, lo que permite a atacantes remotos descubrir las direcciones IP y MAC del Wireless LAN Controller as\\u00ed como los detalles de configuraci\\u00f3n del Punto de Acceso (AP) espiando la red wireless.\"}]", "id": "CVE-2009-2976", "lastModified": "2024-11-21T01:06:12.023", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:N/A:N\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2009-08-27T17:30:00.360", "references": "[{\"url\": \"http://securitytracker.com/id?1022774\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.airmagnet.com/news/press_releases/2009/08252009.php\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1022774\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.airmagnet.com/news/press_releases/2009/08252009.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2009-2976\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-08-27T17:30:00.360\",\"lastModified\":\"2024-11-21T01:06:12.023\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.\"},{\"lang\":\"es\",\"value\":\"Los dispositivos Cisco Aironet Lightweight Access Point (AP) env\u00edan el contenido de ciertos paquetes de multidifusi\u00f3n en texto plano, lo que permite a atacantes remotos descubrir las direcciones IP y MAC del Wireless LAN Controller as\u00ed como los detalles de configuraci\u00f3n del Punto de Acceso (AP) espiando la red wireless.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:N/A:N\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8B5553-7295-4786-9F81-B4527EAD4F0B\"}]}]}],\"references\":[{\"url\":\"http://securitytracker.com/id?1022774\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.airmagnet.com/news/press_releases/2009/08252009.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1022774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.airmagnet.com/news/press_releases/2009/08252009.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.