{"uuid": "128a036f-7b82-4473-b364-6fb8446f89cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20153", "type": "seen", "source": "https://t.me/cvedetector/14327", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20153 - Cisco Wireless Router SSID Spoofing Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-20153 \nPublished : Jan. 6, 2025, 4:15 a.m. | 44\u00a0minutes ago \nDescription : In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T06:03:25.000000Z"}