A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.

Project Subscriptions

Vendors Products
Esw2-350g52dc Subscribe
Esw2-350g52dc Firmware Subscribe
Esw2-550x48dc Subscribe
Esw2-550x48dc Firmware Subscribe
Sf200-24 Subscribe
Sf200-24 Firmware Subscribe
Sf200-24p Subscribe
Sf200-24p Firmware Subscribe
Sf200-48 Subscribe
Sf200-48 Firmware Subscribe
Sf200-48p Subscribe
Sf200-48p Firmware Subscribe
Sf300-08 Subscribe
Sf300-08 Firmware Subscribe
Sf300-24 Subscribe
Sf300-24 Firmware Subscribe
Sf300-24mp Subscribe
Sf300-24mp Firmware Subscribe
Sf300-24p Subscribe
Sf300-24p Firmware Subscribe
Sf300-24pp Subscribe
Sf300-24pp Firmware Subscribe
Sf300-48 Subscribe
Sf300-48 Firmware Subscribe
Sf300-48p Subscribe
Sf300-48p Firmware Subscribe
Sf300-48pp Subscribe
Sf300-48pp Firmware Subscribe
Sf302-08 Subscribe
Sf302-08 Firmware Subscribe
Sf302-08mp Subscribe
Sf302-08mp Firmware Subscribe
Sf302-08mpp Subscribe
Sf302-08mpp Firmware Subscribe
Sf302-08p Subscribe
Sf302-08p Firmware Subscribe
Sf302-08pp Subscribe
Sf302-08pp Firmware Subscribe
Sf500-24 Subscribe
Sf500-24 Firmware Subscribe
Sf500-24mp Subscribe
Sf500-24mp Firmware Subscribe
Sf500-24p Subscribe
Sf500-24p Firmware Subscribe
Sf500-48 Subscribe
Sf500-48 Firmware Subscribe
Sf500-48mp Subscribe
Sf500-48mp Firmware Subscribe
Sf500-48p Subscribe
Sf500-48p Firmware Subscribe
Sg200-18 Subscribe
Sg200-18 Firmware Subscribe
Sg200-26 Subscribe
Sg200-26 Firmware Subscribe
Sg200-26p Subscribe
Sg200-26p Firmware Subscribe
Sg200-50 Subscribe
Sg200-50 Firmware Subscribe
Sg200-50p Subscribe
Sg200-50p Firmware Subscribe
Sg300-10 Subscribe
Sg300-10 Firmware Subscribe
Sg300-10mp Subscribe
Sg300-10mp Firmware Subscribe
Sg300-10mpp Subscribe
Sg300-10mpp Firmware Subscribe
Sg300-10p Subscribe
Sg300-10p Firmware Subscribe
Sg300-10pp Subscribe
Sg300-10pp Firmware Subscribe
Sg300-10sfp Subscribe
Sg300-10sfp Firmware Subscribe
Sg300-20 Subscribe
Sg300-20 Firmware Subscribe
Sg300-28 Subscribe
Sg300-28 Firmware Subscribe
Sg300-28mp Subscribe
Sg300-28mp Firmware Subscribe
Sg300-28p Subscribe
Sg300-28p Firmware Subscribe
Sg300-28pp Subscribe
Sg300-28pp Firmware Subscribe
Sg300-28sfp Subscribe
Sg300-28sfp Firmware Subscribe
Sg300-52 Subscribe
Sg300-52 Firmware Subscribe
Sg300-52mp Subscribe
Sg300-52mp Firmware Subscribe
Sg300-52p Subscribe
Sg300-52p Firmware Subscribe
Sg500-28 Subscribe
Sg500-28 Firmware Subscribe
Sg500-28mpp Subscribe
Sg500-28mpp Firmware Subscribe
Sg500-28p Subscribe
Sg500-28p Firmware Subscribe
Sg500-52 Subscribe
Sg500-52 Firmware Subscribe
Sg500-52mp Subscribe
Sg500-52mp Firmware Subscribe
Sg500-52p Subscribe
Sg500-52p Firmware Subscribe
Sg500x-24 Subscribe
Sg500x-24 Firmware Subscribe
Sg500x-48 Subscribe
Sg500x-48 Firmware Subscribe
Sg500x-48mp Subscribe
Sg500x-48mp Firmware Subscribe
Sg500x-48p Subscribe
Sg500x-48p Firmware Subscribe
Sg500x24mpp Subscribe
Sg500x24mpp Firmware Subscribe
Sg500xg8f8t Subscribe
Sg500xg8f8t Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10448 A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T19:03:24.144Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1891

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:52.041Z

cve-icon NVD

Status : Modified

Published: 2019-07-06T02:15:11.183

Modified: 2024-11-21T04:37:37.573

Link: CVE-2019-1891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses