VAR-201302-0390

Vulnerability from variot - Updated: 2025-04-11 23:10

Cisco Small Business Wireless Access Points WAP200, WAP2000, WAP200E, and WET200 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SSID that is not properly handled during a site survey, aka Bug IDs CSCua86182, CSCua91196, CSCud36155, and CSCua86190. Cisco Small Business Wireless access point has service disruption (DoS) There are vulnerabilities that can be affected indefinitely, such as being in a state. Successful exploits may allow an attacker to cause denial-of-service conditions. This issue is tracked by Cisco Bug IDs CSCua86182, CSCua91196, CSCud36155, and CSCua86190

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201302-0390",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "small business wireless access ppoints",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "wap2000"
      },
      {
        "model": "small business wireless access ppoints",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "wap200e"
      },
      {
        "model": "small business wireless access ppoints",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "wap200"
      },
      {
        "model": "small business wireless access ppoints",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "wet200"
      },
      {
        "model": "small business wireless access point",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "wap200"
      },
      {
        "model": "small business wireless access point",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "wap2000"
      },
      {
        "model": "small business wireless access point",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "wap200e"
      },
      {
        "model": "small business wireless access point",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "wet200"
      },
      {
        "model": "small business wireless access points wap200 /wap2000 /wap200e /et200",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "small business wireless access points wet200",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "small business wireless access points wap200e",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "small business wireless access points wap2000",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "small business wireless access points wap200",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "BID",
        "id": "57973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:small_business_wireless_access_ppoints",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "57973"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-1131",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2013-1131",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 5.5,
            "id": "VHN-61133",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:A/AC:M/AU:N/C:N/I:P/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-1131",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-1131",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201302-248",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-61133",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-61133"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Small Business Wireless Access Points WAP200, WAP2000, WAP200E, and WET200 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SSID that is not properly handled during a site survey, aka Bug IDs CSCua86182, CSCua91196, CSCud36155, and CSCua86190. Cisco Small Business Wireless access point has service disruption (DoS) There are vulnerabilities that can be affected indefinitely, such as being in a state. \nSuccessful exploits may allow an attacker to cause denial-of-service conditions. \nThis issue is tracked by Cisco Bug IDs CSCua86182, CSCua91196, CSCud36155, and CSCua86190",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "BID",
        "id": "57973"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61133"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-1131",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20130213 CISCO SMALL BUSINESS WIRELESS ACCESS POINTS SSID VALIDATION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "57973",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-61133",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61133"
      },
      {
        "db": "BID",
        "id": "57973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "id": "VAR-201302-0390",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61133"
      }
    ],
    "trust": 1.3517857166666665
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:10:41.106000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Cisco Small Business Wireless Access Points SSID Validation Vulnerability",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1131"
      },
      {
        "title": "Patch for Cisco Small Business Wireless Access Points Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/31844"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-1131"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1131"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1131"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/ps10047/index.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61133"
      },
      {
        "db": "BID",
        "id": "57973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "VULHUB",
        "id": "VHN-61133"
      },
      {
        "db": "BID",
        "id": "57973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-02-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "date": "2013-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-61133"
      },
      {
        "date": "2013-02-13T00:00:00",
        "db": "BID",
        "id": "57973"
      },
      {
        "date": "2013-02-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "date": "2013-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "date": "2013-02-13T23:55:01.320000",
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-02-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "date": "2013-02-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-61133"
      },
      {
        "date": "2013-02-13T00:00:00",
        "db": "BID",
        "id": "57973"
      },
      {
        "date": "2013-02-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-001571"
      },
      {
        "date": "2013-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-1131"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Small Business Wireless Access Points Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00974"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201302-248"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…