10
CVE-2019-1913
- EPSS 12.72%
- Published 07.08.2019 06:15:11
- Last modified 21.11.2024 04:37:40
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
Multiple vulnerabilities in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to overflow a buffer, which then allows the execution of arbitrary code with root privileges on the underlying operating system. The vulnerabilities are due to insufficient validation of user-supplied input and improper boundary checks when reading data into an internal buffer. An attacker could exploit these vulnerabilities by sending malicious requests to the web management interface of an affected device. Depending on the configuration of the affected switch, the malicious requests must be sent via HTTP or HTTPS.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Sf-220-24 Firmware Version < 1.1.4.4
Cisco ≫ Sf220-24p Firmware Version < 1.1.4.4
Cisco ≫ Sf220-48 Firmware Version < 1.1.4.4
Cisco ≫ Sf220-48p Firmware Version < 1.1.4.4
Cisco ≫ Sg220-26 Firmware Version < 1.1.4.4
Cisco ≫ Sg220-26p Firmware Version < 1.1.4.4
Cisco ≫ Sg220-28 Firmware Version < 1.1.4.4
Cisco ≫ Sg220-28mp Firmware Version < 1.1.4.4
Cisco ≫ Sg220-50 Firmware Version < 1.1.4.4
Cisco ≫ Sg220-50p Firmware Version < 1.1.4.4
Cisco ≫ Sg220-52 Firmware Version < 1.1.4.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 12.72% | 0.938 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
psirt@cisco.com | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.