10

CVE-2019-1913

Multiple vulnerabilities in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to overflow a buffer, which then allows the execution of arbitrary code with root privileges on the underlying operating system. The vulnerabilities are due to insufficient validation of user-supplied input and improper boundary checks when reading data into an internal buffer. An attacker could exploit these vulnerabilities by sending malicious requests to the web management interface of an affected device. Depending on the configuration of the affected switch, the malicious requests must be sent via HTTP or HTTPS.

Data is provided by the National Vulnerability Database (NVD)
CiscoSf-220-24 Firmware Version < 1.1.4.4
   CiscoSf-220-24 Version-
CiscoSf220-24p Firmware Version < 1.1.4.4
   CiscoSf220-24p Version-
CiscoSf220-48 Firmware Version < 1.1.4.4
   CiscoSf220-48 Version-
CiscoSf220-48p Firmware Version < 1.1.4.4
   CiscoSf220-48p Version-
CiscoSg220-26 Firmware Version < 1.1.4.4
   CiscoSg220-26 Version-
CiscoSg220-26p Firmware Version < 1.1.4.4
   CiscoSg220-26p Version-
CiscoSg220-28 Firmware Version < 1.1.4.4
   CiscoSg220-28 Version-
CiscoSg220-28mp Firmware Version < 1.1.4.4
   CiscoSg220-28mp Version-
CiscoSg220-50 Firmware Version < 1.1.4.4
   CiscoSg220-50 Version-
CiscoSg220-50p Firmware Version < 1.1.4.4
   CiscoSg220-50p Version-
CiscoSg220-52 Firmware Version < 1.1.4.4
   CiscoSg220-52 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 12.72% 0.938
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
psirt@cisco.com 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.