Vulnslist

find the latest Cisco vulnerabilities

Cisco Small Business Series Switches Memory Corruption Vulnerability

cisco-sa-20190703-sbss-memcorrupt · High · Published · Updated

A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2019-1892
Cisco Bug IDsCSCvp43390
CVSS ScoreBase 7.5
Base 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Small Business 300 Series Managed Switches

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Small Business 300 Series Managed Switches known_affected cisco_csaf CVE-2019-1892 1

Related Products

Product CVE Evidence
Cisco Small Business 300 Series Managed Switches CVE-2019-1892 Cisco OpenVuln · family-level
200 Series Smart Switches CVE-2019-1892 Cisco OpenVuln
300 Series Managed Switches CVE-2019-1892 Cisco OpenVuln · family-level