5.3
CVE-2021-40127
- EPSS 0.15%
- Published 04.11.2021 16:15:09
- Last modified 21.11.2024 06:23:38
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Sf200-24 Firmware Version-
Cisco ≫ Sf200-24fp Firmware Version-
Cisco ≫ Sf200-24p Firmware Version-
Cisco ≫ Sf200-48 Firmware Version-
Cisco ≫ Sf200-48p Firmware Version-
Cisco ≫ Sf200e-24 Firmware Version-
Cisco ≫ Sf200e-24p Firmware Version-
Cisco ≫ Sf200e-48 Firmware Version-
Cisco ≫ Sf200e-48p Firmware Version-
Cisco ≫ Sg200-08 Firmware Version-
Cisco ≫ Sg200-08p Firmware Version-
Cisco ≫ Sg200-10fp Firmware Version-
Cisco ≫ Sg200-18 Firmware Version-
Cisco ≫ Sg200-26 Firmware Version-
Cisco ≫ Sg200-26fp Firmware Version-
Cisco ≫ Sg200-26p Firmware Version-
Cisco ≫ Sg200-50 Firmware Version-
Cisco ≫ Sg200-50fp Firmware Version-
Cisco ≫ Sg200-50p Firmware Version-
Cisco ≫ Sf300-08 Firmware Version1.4.11.02
Cisco ≫ Sf300-24 Firmware Version1.4.11.02
Cisco ≫ Sf300-24mp Firmware Version1.4.11.02
Cisco ≫ Sf300-24p Firmware Version1.4.11.02
Cisco ≫ Sf300-24pp Firmware Version1.4.11.02
Cisco ≫ Sf300-48 Firmware Version1.4.11.02
Cisco ≫ Sf300-48p Firmware Version1.4.11.02
Cisco ≫ Sf300-48pp Firmware Version1.4.11.02
Cisco ≫ Sf302-08 Firmware Version1.4.11.02
Cisco ≫ Sf302-08mp Firmware Version1.4.11.02
Cisco ≫ Sf302-08mpp Firmware Version1.4.11.02
Cisco ≫ Sf302-08p Firmware Version1.4.11.02
Cisco ≫ Sf302-08pp Firmware Version1.4.11.02
Cisco ≫ Sg300-10 Firmware Version1.4.11.02
Cisco ≫ Sg300-10mp Firmware Version1.4.11.02
Cisco ≫ Sg300-10mpp Firmware Version1.4.11.02
Cisco ≫ Sg300-10p Firmware Version1.4.11.02
Cisco ≫ Sg300-10pp Firmware Version1.4.11.02
Cisco ≫ Sg300-sfp Firmware Version1.4.11.02
Cisco ≫ Sg300-20 Firmware Version1.4.11.02
Cisco ≫ Sg300-28 Firmware Version1.4.11.02
Cisco ≫ Sg300-28mp Firmware Version1.4.11.02
Cisco ≫ Sg300-28p Firmware Version1.4.11.02
Cisco ≫ Sg300-28pp Firmware Version1.4.11.02
Cisco ≫ Sg300-28sfp Firmware Version1.4.11.02
Cisco ≫ Sg300-52 Firmware Version1.4.11.02
Cisco ≫ Sg300-52mp Firmware Version1.4.11.02
Cisco ≫ Sg300-52p Firmware Version1.4.11.02
Cisco ≫ Sf500-24 Firmware Version-
Cisco ≫ Sf500-24mp Firmware Version-
Cisco ≫ Sf500-24p Firmware Version-
Cisco ≫ Sf500-48 Firmware Version-
Cisco ≫ Sf500-48mp Firmware Version-
Cisco ≫ Sf500-48p Firmware Version-
Cisco ≫ Sg500-28 Firmware Version-
Cisco ≫ Sg500-28mpp Firmware Version-
Cisco ≫ Sg500-28p Firmware Version-
Cisco ≫ Sg500-52 Firmware Version-
Cisco ≫ Sg500-52mp Firmware Version-
Cisco ≫ Sg500-52p Firmware Version-
Cisco ≫ Sg500x-24 Firmware Version-
Cisco ≫ Sg500x-24mpp Firmware Version-
Cisco ≫ Sg500x-24p Firmware Version-
Cisco ≫ Sg500x-48 Firmware Version-
Cisco ≫ Sg500x-48mpp Firmware Version-
Cisco ≫ Sg500x-48p Firmware Version-
Cisco ≫ Sg500xg-8f8t Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.15% | 0.366 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
psirt@cisco.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.