A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.

Project Subscriptions

Vendors Products
Esw2-350g52dc Subscribe
Esw2-350g52dc Firmware Subscribe
Esw2-550x48dc Subscribe
Esw2-550x48dc Firmware Subscribe
Sf200-24 Subscribe
Sf200-24 Firmware Subscribe
Sf200-24p Subscribe
Sf200-24p Firmware Subscribe
Sf200-48 Subscribe
Sf200-48 Firmware Subscribe
Sf200-48p Subscribe
Sf200-48p Firmware Subscribe
Sf300-08 Subscribe
Sf300-08 Firmware Subscribe
Sf300-24 Subscribe
Sf300-24 Firmware Subscribe
Sf300-24mp Subscribe
Sf300-24mp Firmware Subscribe
Sf300-24p Subscribe
Sf300-24p Firmware Subscribe
Sf300-24pp Subscribe
Sf300-24pp Firmware Subscribe
Sf300-48 Subscribe
Sf300-48 Firmware Subscribe
Sf300-48p Subscribe
Sf300-48p Firmware Subscribe
Sf300-48pp Subscribe
Sf300-48pp Firmware Subscribe
Sf302-08 Subscribe
Sf302-08 Firmware Subscribe
Sf302-08mp Subscribe
Sf302-08mp Firmware Subscribe
Sf302-08mpp Subscribe
Sf302-08mpp Firmware Subscribe
Sf302-08p Subscribe
Sf302-08p Firmware Subscribe
Sf302-08pp Subscribe
Sf302-08pp Firmware Subscribe
Sf500-24 Subscribe
Sf500-24 Firmware Subscribe
Sf500-24mp Subscribe
Sf500-24mp Firmware Subscribe
Sf500-24p Subscribe
Sf500-24p Firmware Subscribe
Sf500-48 Subscribe
Sf500-48 Firmware Subscribe
Sf500-48mp Subscribe
Sf500-48mp Firmware Subscribe
Sf500-48p Subscribe
Sf500-48p Firmware Subscribe
Sg200-18 Subscribe
Sg200-18 Firmware Subscribe
Sg200-26 Subscribe
Sg200-26 Firmware Subscribe
Sg200-26p Subscribe
Sg200-26p Firmware Subscribe
Sg200-50 Subscribe
Sg200-50 Firmware Subscribe
Sg200-50p Subscribe
Sg200-50p Firmware Subscribe
Sg300-10 Subscribe
Sg300-10 Firmware Subscribe
Sg300-10mp Subscribe
Sg300-10mp Firmware Subscribe
Sg300-10mpp Subscribe
Sg300-10mpp Firmware Subscribe
Sg300-10p Subscribe
Sg300-10p Firmware Subscribe
Sg300-10pp Subscribe
Sg300-10pp Firmware Subscribe
Sg300-10sfp Subscribe
Sg300-10sfp Firmware Subscribe
Sg300-20 Subscribe
Sg300-20 Firmware Subscribe
Sg300-28 Subscribe
Sg300-28 Firmware Subscribe
Sg300-28mp Subscribe
Sg300-28mp Firmware Subscribe
Sg300-28p Subscribe
Sg300-28p Firmware Subscribe
Sg300-28pp Subscribe
Sg300-28pp Firmware Subscribe
Sg300-28sfp Subscribe
Sg300-28sfp Firmware Subscribe
Sg300-52 Subscribe
Sg300-52 Firmware Subscribe
Sg300-52mp Subscribe
Sg300-52mp Firmware Subscribe
Sg300-52p Subscribe
Sg300-52p Firmware Subscribe
Sg500-28 Subscribe
Sg500-28 Firmware Subscribe
Sg500-28mpp Subscribe
Sg500-28mpp Firmware Subscribe
Sg500-28p Subscribe
Sg500-28p Firmware Subscribe
Sg500-52 Subscribe
Sg500-52 Firmware Subscribe
Sg500-52mp Subscribe
Sg500-52mp Firmware Subscribe
Sg500-52p Subscribe
Sg500-52p Firmware Subscribe
Sg500x-24 Subscribe
Sg500x-24 Firmware Subscribe
Sg500x-48 Subscribe
Sg500x-48 Firmware Subscribe
Sg500x-48mp Subscribe
Sg500x-48mp Firmware Subscribe
Sg500x-48p Subscribe
Sg500x-48p Firmware Subscribe
Sg500x24mpp Subscribe
Sg500x24mpp Firmware Subscribe
Sg500xg8f8t Subscribe
Sg500xg8f8t Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10449 A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T19:03:39.713Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1892

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:50.769Z

cve-icon NVD

Status : Modified

Published: 2019-07-06T02:15:11.293

Modified: 2024-11-21T04:37:37.757

Link: CVE-2019-1892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses