CVE-2019-1892
06.07.2019, 02:15
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | sf200-24_firmware | 𝑥 < 1.4.10.6 |
cisco | sf200-24p_firmware | 𝑥 < 1.4.10.6 |
cisco | sf200-48_firmware | 𝑥 < 1.4.10.6 |
cisco | sf200-48p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg200-18_firmware | 𝑥 < 1.4.10.6 |
cisco | sg200-26_firmware | 𝑥 < 1.4.10.6 |
cisco | sg200-26p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg200-50_firmware | 𝑥 < 1.4.10.6 |
cisco | sg200-50p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-10_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-10mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-10mpp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-10sfp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-10p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-10pp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-20_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-28_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-28p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-28pp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-28mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-28sfp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-52_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-52p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg300-52mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-08_firmware | 𝑥 < 1.4.10.6 |
cisco | sf302-08_firmware | 𝑥 < 1.4.10.6 |
cisco | sf302-08mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf302-08p_firmware | 𝑥 < 1.4.10.6 |
cisco | sf302-08pp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf302-08mpp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-24_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-24p_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-24mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-24pp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-48_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-48p_firmware | 𝑥 < 1.4.10.6 |
cisco | sf300-48pp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf500-24_firmware | 𝑥 < 1.4.10.6 |
cisco | sf500-24p_firmware | 𝑥 < 1.4.10.6 |
cisco | sf500-24mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sf500-48_firmware | 𝑥 < 1.4.10.6 |
cisco | sf500-48p_firmware | 𝑥 < 1.4.10.6 |
cisco | sf500-48mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500-28_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500-28p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500-28mpp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500-52_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500-52p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500-52mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500x-24_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500x24mpp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500x-48_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500x-48p_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500x-48mp_firmware | 𝑥 < 1.4.10.6 |
cisco | sg500xg8f8t_firmware | 𝑥 < 1.4.10.6 |
cisco | esw2-350g52dc_firmware | 𝑥 < 1.4.10.6 |
cisco | esw2-550x48dc_firmware | 𝑥 < 1.4.10.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration