CVE-2019-1892
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
06/07/2019
Last modified:
09/10/2019
Description
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) | |
cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:* | 1.4.10.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page