A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Esw2-350g52dc
Subscribe
Esw2-350g52dc Firmware
Subscribe
Esw2-550x48dc
Subscribe
Esw2-550x48dc Firmware
Subscribe
Sf200-24
Subscribe
Sf200-24 Firmware
Subscribe
Sf200-24p
Subscribe
Sf200-24p Firmware
Subscribe
Sf200-48
Subscribe
Sf200-48 Firmware
Subscribe
Sf200-48p
Subscribe
Sf200-48p Firmware
Subscribe
Sf300-08
Subscribe
Sf300-08 Firmware
Subscribe
Sf300-24
Subscribe
Sf300-24 Firmware
Subscribe
Sf300-24mp
Subscribe
Sf300-24mp Firmware
Subscribe
Sf300-24p
Subscribe
Sf300-24p Firmware
Subscribe
Sf300-24pp
Subscribe
Sf300-24pp Firmware
Subscribe
Sf300-48
Subscribe
Sf300-48 Firmware
Subscribe
Sf300-48p
Subscribe
Sf300-48p Firmware
Subscribe
Sf300-48pp
Subscribe
Sf300-48pp Firmware
Subscribe
Sf302-08
Subscribe
Sf302-08 Firmware
Subscribe
Sf302-08mp
Subscribe
Sf302-08mp Firmware
Subscribe
Sf302-08mpp
Subscribe
Sf302-08mpp Firmware
Subscribe
Sf302-08p
Subscribe
Sf302-08p Firmware
Subscribe
Sf302-08pp
Subscribe
Sf302-08pp Firmware
Subscribe
Sf500-24
Subscribe
Sf500-24 Firmware
Subscribe
Sf500-24mp
Subscribe
Sf500-24mp Firmware
Subscribe
Sf500-24p
Subscribe
Sf500-24p Firmware
Subscribe
Sf500-48
Subscribe
Sf500-48 Firmware
Subscribe
Sf500-48mp
Subscribe
Sf500-48mp Firmware
Subscribe
Sf500-48p
Subscribe
Sf500-48p Firmware
Subscribe
Sg200-18
Subscribe
Sg200-18 Firmware
Subscribe
Sg200-26
Subscribe
Sg200-26 Firmware
Subscribe
Sg200-26p
Subscribe
Sg200-26p Firmware
Subscribe
Sg200-50
Subscribe
Sg200-50 Firmware
Subscribe
Sg200-50p
Subscribe
Sg200-50p Firmware
Subscribe
Sg300-10
Subscribe
Sg300-10 Firmware
Subscribe
Sg300-10mp
Subscribe
Sg300-10mp Firmware
Subscribe
Sg300-10mpp
Subscribe
Sg300-10mpp Firmware
Subscribe
Sg300-10p
Subscribe
Sg300-10p Firmware
Subscribe
Sg300-10pp
Subscribe
Sg300-10pp Firmware
Subscribe
Sg300-10sfp
Subscribe
Sg300-10sfp Firmware
Subscribe
Sg300-20
Subscribe
Sg300-20 Firmware
Subscribe
Sg300-28
Subscribe
Sg300-28 Firmware
Subscribe
Sg300-28mp
Subscribe
Sg300-28mp Firmware
Subscribe
Sg300-28p
Subscribe
Sg300-28p Firmware
Subscribe
Sg300-28pp
Subscribe
Sg300-28pp Firmware
Subscribe
Sg300-28sfp
Subscribe
Sg300-28sfp Firmware
Subscribe
Sg300-52
Subscribe
Sg300-52 Firmware
Subscribe
Sg300-52mp
Subscribe
Sg300-52mp Firmware
Subscribe
Sg300-52p
Subscribe
Sg300-52p Firmware
Subscribe
Sg500-28
Subscribe
Sg500-28 Firmware
Subscribe
Sg500-28mpp
Subscribe
Sg500-28mpp Firmware
Subscribe
Sg500-28p
Subscribe
Sg500-28p Firmware
Subscribe
Sg500-52
Subscribe
Sg500-52 Firmware
Subscribe
Sg500-52mp
Subscribe
Sg500-52mp Firmware
Subscribe
Sg500-52p
Subscribe
Sg500-52p Firmware
Subscribe
Sg500x-24
Subscribe
Sg500x-24 Firmware
Subscribe
Sg500x-48
Subscribe
Sg500x-48 Firmware
Subscribe
Sg500x-48mp
Subscribe
Sg500x-48mp Firmware
Subscribe
Sg500x-48p
Subscribe
Sg500x-48p Firmware
Subscribe
Sg500x24mpp
Subscribe
Sg500x24mpp Firmware
Subscribe
Sg500xg8f8t
Subscribe
Sg500xg8f8t Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10449 | A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 19 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-19T19:03:39.713Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1892
Updated: 2024-08-04T18:35:50.769Z
Status : Modified
Published: 2019-07-06T02:15:11.293
Modified: 2024-11-21T04:37:37.757
Link: CVE-2019-1892
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD