CVE-2019-1914

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
07/08/2019
Last modified:
01/10/2019

Description

A vulnerability in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious request to certain parts of the web management interface. To send the malicious request, the attacker needs a valid login session in the web management interface as a privilege level 15 user. Depending on the configuration of the affected switch, the malicious request must be sent via HTTP or HTTPS. A successful exploit could allow the attacker to execute arbitrary shell commands with the privileges of the root user.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:sf-220-24_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sf-220-24:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sf220-24p_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sf220-24p:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sf220-48_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sf220-48:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sf220-48p_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sf220-48p:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sg220-26_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sg220-26:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sg220-26p_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sg220-26p:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sg220-28_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)
cpe:2.3:h:cisco:sg220-28:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:sg220-28mp_firmware:*:*:*:*:*:*:*:* 1.1.4.4 (excluding)