Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vulnerability

cisco-sa-sg350-snmp-dos-GEFZr2Tj · High · Published · Updated

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.  This vulnerability is due to improper error handling when parsing response data for a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system. Cisco has not released and will not release software updates that address this vulnerability because the affected products are past the date for End of Software Maintenance Releases. The Cisco Product Security Incident Response Team (PSIRT) will continue to evaluate and disclose security vulnerabilities that affect these products until the Last Date of Support is reached. There are no workarounds that address this vulnerability. However, there is a mitigation. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg350-snmp-dos-GEFZr2Tj

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability. However, as a mitigation, administrators may disable the vulnerable object ID (OID) on a device.

To disable and exclude the OID, complete the following steps:

1. Create a new SNMP view excluding the affected OID. Use the following commands:

snmp-server view SNMP_DOS iso included
snmp-server view SNMP_DOS rlPethPsePortTable excluded

2. Apply the view to the SNMP community or SNMP v3 group:

For SNMP v1 or v2c, apply this configuration to all configured community strings. Use the following command:

snmp-server community mycomm view SNMP_DOS RO

For SNMPv3, apply this to all configured SNMP users. Use the following command:

snmp-server group v3group v3 auth read SNMP_DOS write SNMP_DOS

CVEsCVE-2026-20185
Cisco Bug IDsCSCwt39853
CVSS ScoreBase 7.7
Base 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Small Business Smart and Managed Switches

Related Products

Product CVE Evidence
Cisco Small Business Smart and Managed Switches CVE-2026-20185 Cisco OpenVuln
Cisco 350X Series Stackable Managed Switches CVE-2026-20185 Cisco OpenVuln
Cisco 350 Series Managed Switches CVE-2026-20185 Cisco OpenVuln