Search criteria
3 vulnerabilities found for esw2-350g52dc by cisco
VAR-201905-0529
Vulnerability from variot - Updated: 2024-11-23 22:58A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability. plural Cisco The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. CiscoSmallBusinessSwitch is the core series switch of cisco. The vulnerability stems from a network system or product that does not properly validate the input data. This issue is being tracked by Cisco Bug IDs CSCvn49346, CSCvn93730
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201905-0529",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "esw2-350g52dc",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sx550x-12f",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg550x-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg350-10mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf300-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250x-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf302-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg550x-24mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg250-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg550x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg250-18",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf302-08mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sx550x-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg300-10pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250x-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg300-10sfp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg350-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf500-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf550x-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf350-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg250-10p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf500-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250-26",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg350-10p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg500x-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf550x-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf200-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg550x-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf300-48pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf550x-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg300-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-26",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250-50p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg500x-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf250-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg300-10",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-18",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x24mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250-50hp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg250x-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf250-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sx550x-24ft",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf550x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg550x-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg550x-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg300-20",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf250-48hp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg355-10p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "esw2-550x48dc",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg550x-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf550x-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg200-26p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-50p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf250-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf302-08mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250-26hp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg500xg8f8t",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg250-50",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg500x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf350-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sx550x-24f",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sx550x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg500-52p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28sfp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg350-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sx550x-16ft",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg250-26p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf550x-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg250-08hp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sf200-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf350-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg350-28mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg200-50",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg350-10",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "2.5.0.78"
},
{
"model": "sg500x-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "small business esw2 series managed switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx200 series managed switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx250 series switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx300 series managed switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx350 series switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx500 series managed switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx550 series switch",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx200 series managed switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx300 series managed switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx500 series managed switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "small business esw2 series managed switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx250 series switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx350 series switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "small business sx550 series switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "sx550 switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "sx500 switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "sx350 switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "sx300 switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "sx250 switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "sx200 switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "small business series stackable managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5002.4.0.94"
},
{
"model": "esw2 series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "BID",
"id": "108335"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:esw2_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sx200_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sx250_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sx300_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sx350_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sx500_series_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sx550_series_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Patrick S. Stuckenberger of August Manser AG",
"sources": [
{
"db": "BID",
"id": "108335"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
}
],
"trust": 0.9
},
"cve": "CVE-2019-1806",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CVE-2019-1806",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-14709",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.1,
"id": "CVE-2019-1806",
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ykramarz@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.1,
"id": "CVE-2019-1806",
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-1806",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-1806",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2019-1806",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-1806",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2019-14709",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201905-675",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability. plural Cisco The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. CiscoSmallBusinessSwitch is the core series switch of cisco. The vulnerability stems from a network system or product that does not properly validate the input data. \nThis issue is being tracked by Cisco Bug IDs CSCvn49346, CSCvn93730",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-1806"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "BID",
"id": "108335"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-1806",
"trust": 3.3
},
{
"db": "BID",
"id": "108335",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2019-14709",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.1752",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "BID",
"id": "108335"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"id": "VAR-201905-0529",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
}
],
"trust": 1.2853298625
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
}
]
},
"last_update_date": "2024-11-23T22:58:40.702000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20190515-sb-snmpdos",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"title": "Patches for multiple Cisco product input verification error vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/161529"
},
{
"title": "Multiple Cisco Product input verification error vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92799"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-770",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 1.0
},
{
"problemtype": "CWE-400",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "http://www.securityfocus.com/bid/108335"
},
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-sb-snmpdos"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-1806"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1806"
},
{
"trust": 0.6,
"url": "https://web.nvd.nist.gov//vuln/detail/cve-2019-1806"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/81090"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "BID",
"id": "108335"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"db": "BID",
"id": "108335"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
},
{
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-05-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"date": "2019-05-15T00:00:00",
"db": "BID",
"id": "108335"
},
{
"date": "2019-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"date": "2019-05-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-675"
},
{
"date": "2019-05-15T22:29:00.247000",
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-05-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-14709"
},
{
"date": "2019-05-15T00:00:00",
"db": "BID",
"id": "108335"
},
{
"date": "2019-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-004726"
},
{
"date": "2019-10-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201905-675"
},
{
"date": "2024-11-21T04:37:25.137000",
"db": "NVD",
"id": "CVE-2019-1806"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Cisco Product depletion vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-004726"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201905-675"
}
],
"trust": 0.6
}
}
VAR-201907-0237
Vulnerability from variot - Updated: 2024-11-23 22:48A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This issue is being tracked by Cisco Bug IDs CSCvp43403, and CSCvp43417
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201907-0237",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "esw2-350g52dc",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "esw2-550x48dc",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-26p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-50p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10sfp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500xg8f8t",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28sfp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-26",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-18",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-50",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x24mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-20",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sf200-24p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sf200-48",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sf200-48p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-18",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-26",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-26p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-50",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-50p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg300-10",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business series stackable managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5001.4.9.0"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5001.4.2.04"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.7"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.9.0"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.2.04"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.0.88"
},
{
"model": "small business series managed switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.8.06"
},
{
"model": "small business series managed switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.2.7.76"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2001.4.2.04"
},
{
"model": "small business series managed switches",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "5001.4.10.6"
},
{
"model": "small business series managed switches",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.10.6"
},
{
"model": "small business series managed switches",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "2001.4.10.6"
}
],
"sources": [
{
"db": "BID",
"id": "109039"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:sf200-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sf200-24p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sf200-48_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sf200-48p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-18_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-26_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-26p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-50_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-50p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg300-10_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "109039"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
}
],
"trust": 0.9
},
"cve": "CVE-2019-1891",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2019-1891",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-1891",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-1891",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2019-1891",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-1891",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201907-235",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. \nThis issue is being tracked by Cisco Bug IDs CSCvp43403, and CSCvp43417",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-1891"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "BID",
"id": "109039"
}
],
"trust": 1.89
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-1891",
"trust": 2.7
},
{
"db": "BID",
"id": "109039",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006440",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2019.2440",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235",
"trust": 0.6
}
],
"sources": [
{
"db": "BID",
"id": "109039"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"id": "VAR-201907-0237",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.33338292999999997
},
"last_update_date": "2024-11-23T22:48:22.054000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20190703-sbss-dos",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-dos"
},
{
"title": "Cisco\u00a0Small Business 200 , 300 and 500 Series Managed Switches Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94424"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-sbss-dos"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-1891"
},
{
"trust": 0.9,
"url": "http://www.cisco.com/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1891"
},
{
"trust": 0.6,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-sbss-memcorrupt"
},
{
"trust": 0.6,
"url": "https://www.securityfocus.com/bid/109039"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.2440/"
}
],
"sources": [
{
"db": "BID",
"id": "109039"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "109039"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
},
{
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-07-03T00:00:00",
"db": "BID",
"id": "109039"
},
{
"date": "2019-07-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"date": "2019-07-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-235"
},
{
"date": "2019-07-06T02:15:11.183000",
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-07-03T00:00:00",
"db": "BID",
"id": "109039"
},
{
"date": "2019-07-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006440"
},
{
"date": "2019-07-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-235"
},
{
"date": "2024-11-21T04:37:37.573000",
"db": "NVD",
"id": "CVE-2019-1891"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Cisco Small Business Series Managed Switch Vulnerability related to input validation in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006440"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-235"
}
],
"trust": 0.6
}
}
VAR-201907-0231
Vulnerability from variot - Updated: 2024-11-23 22:48A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. Cisco Small Business 200 , 300 , 500 Series Managed Switch Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. are all products of Cisco. This issue is being tracked by Cisco Bug ID CSCvp43390
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201907-0231",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "esw2-350g52dc",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "esw2-550x48dc",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-26p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-50p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10sfp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500xg8f8t",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28sfp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-48pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf300-24",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-26",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-28p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-18",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-52mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08pp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-48mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg200-50",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x24mpp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf500-24mp",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500x-48",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-20",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg300-10p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf302-08p",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sg500-52",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.10.6"
},
{
"model": "sf200-24",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sf200-24p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sf200-48",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sf200-48p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-18",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-26",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-26p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-50",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg200-50p",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "sg300-10",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "small business series",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "200\u003c1.4.10.6"
},
{
"model": "small business series",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "300\u003c1.4.10.6"
},
{
"model": "small business series",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "500\u003c1.4.10.6"
},
{
"model": "small business series stackable managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5001.4.9.0"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5001.4.2.04"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.7"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.9.0"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.2.04"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.0.88"
},
{
"model": "small business series managed switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.8.06"
},
{
"model": "small business series managed switch",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.2.7.76"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2001.4.9.04"
},
{
"model": "small business series managed switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2001.4.2.04"
},
{
"model": "small business series managed switches",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "5001.4.10.6"
},
{
"model": "small business series managed switches",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.4.10.6"
},
{
"model": "small business series managed switches",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "2001.4.10.6"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "BID",
"id": "109042"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:sf200-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sf200-24p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sf200-48_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sf200-48p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-18_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-26_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-26p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-50_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg200-50p_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:sg300-10_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco.",
"sources": [
{
"db": "BID",
"id": "109042"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
}
],
"trust": 0.9
},
"cve": "CVE-2019-1892",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2019-1892",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-22321",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-1892",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-1892",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2019-1892",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-1892",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-22321",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201907-236",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. Cisco Small Business 200 , 300 , 500 Series Managed Switch Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. are all products of Cisco. \nThis issue is being tracked by Cisco Bug ID CSCvp43390",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-1892"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "BID",
"id": "109042"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-1892",
"trust": 3.3
},
{
"db": "BID",
"id": "109042",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-22321",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.2440",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "BID",
"id": "109042"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"id": "VAR-201907-0231",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
}
],
"trust": 1.0514219533333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
}
]
},
"last_update_date": "2024-11-23T22:48:22.019000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20190703-sbss-memcorrupt",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt"
},
{
"title": "Patch for Cisco Small Business 200, 300, and 500 Series Managed Switches buffer overflow vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/213517"
},
{
"title": "Cisco\u00a0Small Business 200 , 300 and 500 Series Managed Switches Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94425"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-1892"
},
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-sbss-memcorrupt"
},
{
"trust": 0.9,
"url": "http://www.cisco.com/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1892"
},
{
"trust": 0.6,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-sbss-dos"
},
{
"trust": 0.6,
"url": "https://www.securityfocus.com/bid/109042"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.2440/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "BID",
"id": "109042"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"db": "BID",
"id": "109042"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
},
{
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-04-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"date": "2019-07-03T00:00:00",
"db": "BID",
"id": "109042"
},
{
"date": "2019-07-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"date": "2019-07-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-236"
},
{
"date": "2019-07-06T02:15:11.293000",
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-04-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-22321"
},
{
"date": "2019-07-03T00:00:00",
"db": "BID",
"id": "109042"
},
{
"date": "2019-07-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006441"
},
{
"date": "2019-07-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-236"
},
{
"date": "2024-11-21T04:37:37.757000",
"db": "NVD",
"id": "CVE-2019-1892"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Cisco Small Business Series Managed Switch Product buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006441"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-236"
}
],
"trust": 0.6
}
}