7.5
CVE-2019-1891
- EPSS 0.67%
- Veröffentlicht 06.07.2019 02:15:11
- Zuletzt bearbeitet 21.11.2024 04:37:37
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Sf200-24 Firmware Version < 1.4.10.6
Cisco ≫ Sf200-24p Firmware Version < 1.4.10.6
Cisco ≫ Sf200-48 Firmware Version < 1.4.10.6
Cisco ≫ Sf200-48p Firmware Version < 1.4.10.6
Cisco ≫ Sg200-18 Firmware Version < 1.4.10.6
Cisco ≫ Sg200-26 Firmware Version < 1.4.10.6
Cisco ≫ Sg200-26p Firmware Version < 1.4.10.6
Cisco ≫ Sg200-50 Firmware Version < 1.4.10.6
Cisco ≫ Sg200-50p Firmware Version < 1.4.10.6
Cisco ≫ Sg300-10 Firmware Version < 1.4.10.6
Cisco ≫ Sg300-10mp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-10mpp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-10sfp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-10p Firmware Version < 1.4.10.6
Cisco ≫ Sg300-10pp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-20 Firmware Version < 1.4.10.6
Cisco ≫ Sg300-28 Firmware Version < 1.4.10.6
Cisco ≫ Sg300-28p Firmware Version < 1.4.10.6
Cisco ≫ Sg300-28pp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-28mp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-28sfp Firmware Version < 1.4.10.6
Cisco ≫ Sg300-52 Firmware Version < 1.4.10.6
Cisco ≫ Sg300-52p Firmware Version < 1.4.10.6
Cisco ≫ Sg300-52mp Firmware Version < 1.4.10.6
Cisco ≫ Sf300-08 Firmware Version < 1.4.10.6
Cisco ≫ Sf302-08 Firmware Version < 1.4.10.6
Cisco ≫ Sf302-08mp Firmware Version < 1.4.10.6
Cisco ≫ Sf302-08p Firmware Version < 1.4.10.6
Cisco ≫ Sf302-08pp Firmware Version < 1.4.10.6
Cisco ≫ Sf302-08mpp Firmware Version < 1.4.10.6
Cisco ≫ Sf300-24 Firmware Version < 1.4.10.6
Cisco ≫ Sf300-24p Firmware Version < 1.4.10.6
Cisco ≫ Sf300-24mp Firmware Version < 1.4.10.6
Cisco ≫ Sf300-24pp Firmware Version < 1.4.10.6
Cisco ≫ Sf300-48 Firmware Version < 1.4.10.6
Cisco ≫ Sf300-48p Firmware Version < 1.4.10.6
Cisco ≫ Sf300-48pp Firmware Version < 1.4.10.6
Cisco ≫ Sf500-24 Firmware Version < 1.4.10.6
Cisco ≫ Sf500-24p Firmware Version < 1.4.10.6
Cisco ≫ Sf500-24mp Firmware Version < 1.4.10.6
Cisco ≫ Sf500-48 Firmware Version < 1.4.10.6
Cisco ≫ Sf500-48p Firmware Version < 1.4.10.6
Cisco ≫ Sf500-48mp Firmware Version < 1.4.10.6
Cisco ≫ Sg500-28 Firmware Version < 1.4.10.6
Cisco ≫ Sg500-28p Firmware Version < 1.4.10.6
Cisco ≫ Sg500-28mpp Firmware Version < 1.4.10.6
Cisco ≫ Sg500-52 Firmware Version < 1.4.10.6
Cisco ≫ Sg500-52p Firmware Version < 1.4.10.6
Cisco ≫ Sg500-52mp Firmware Version < 1.4.10.6
Cisco ≫ Sg500x-24 Firmware Version < 1.4.10.6
Cisco ≫ Sg500x24mpp Firmware Version < 1.4.10.6
Cisco ≫ Sg500x-48 Firmware Version < 1.4.10.6
Cisco ≫ Sg500x-48p Firmware Version < 1.4.10.6
Cisco ≫ Sg500x-48mp Firmware Version < 1.4.10.6
Cisco ≫ Sg500xg8f8t Firmware Version < 1.4.10.6
Cisco ≫ Esw2-350g52dc Firmware Version < 1.4.10.6
Cisco ≫ Esw2-550x48dc Firmware Version < 1.4.10.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.67% | 0.689 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
psirt@cisco.com | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.