First published: Sat Jul 06 2019(Updated: )
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SF200-24 Firmware | <1.4.10.6 | |
Cisco SF200-24P | ||
Cisco SF200-24P Firmware | <1.4.10.6 | |
Cisco SF200-24P | ||
Cisco SF200-48 Firmware | <1.4.10.6 | |
Cisco SF200-48 Firmware | ||
Cisco SF200-48P Firmware | <1.4.10.6 | |
Cisco SF200-48P Firmware | ||
Cisco SG200-18 Firmware | <1.4.10.6 | |
Cisco SG200-18 Firmware | ||
Cisco SG200-26FP Firmware | <1.4.10.6 | |
Cisco SG200-26P Firmware | ||
Cisco SG200-26P Firmware | <1.4.10.6 | |
Cisco SG200-26P Firmware | ||
Cisco SG200-50P Firmware | <1.4.10.6 | |
Cisco SG200-50FP | ||
Cisco SG200-50P Firmware | <1.4.10.6 | |
Cisco SG200-50P Firmware | ||
Cisco SG300-10 Firmware | <1.4.10.6 | |
Cisco SG300-10 | ||
Cisco SG300-10MP Firmware | <1.4.10.6 | |
Cisco SG300-10MP Firmware | ||
Cisco SG300-10MPP Firmware | <1.4.10.6 | |
Cisco SG300-10MPP Firmware | ||
Cisco SG300-10SFP Firmware | <1.4.10.6 | |
Cisco SG300-10SFP Firmware | ||
Cisco SG300-10P Firmware | <1.4.10.6 | |
Cisco SG300-10P | ||
Cisco SG300-10PP Firmware | <1.4.10.6 | |
Cisco SG300-10PP Firmware | ||
Cisco SG300-20 Firmware | <1.4.10.6 | |
Cisco SG300-20 Firmware | ||
Cisco SG300-28 Firmware | <1.4.10.6 | |
Cisco SG300-28 | ||
Cisco SG300-28P Firmware | <1.4.10.6 | |
Cisco SG300-28P | ||
Cisco SG300-28PP Firmware | <1.4.10.6 | |
Cisco SG300-28PP | ||
Cisco SG300-28MP | <1.4.10.6 | |
Cisco SG300-28MP | ||
Cisco SG300-28SFP Firmware | <1.4.10.6 | |
Cisco SG300-28SFP | ||
Cisco SG300-52 Firmware | <1.4.10.6 | |
Cisco SG300-52 | ||
Cisco SG300-52P Firmware | <1.4.10.6 | |
Cisco SG300-52P | ||
Cisco SG300-52MP Firmware | <1.4.10.6 | |
Cisco SG300-52MP | ||
Cisco SF300-08 Firmware | <1.4.10.6 | |
Cisco SF300-08 Firmware | ||
Cisco SF302-08 Firmware | <1.4.10.6 | |
Cisco SF302-08 | ||
Cisco SF302-08MP Firmware | <1.4.10.6 | |
Cisco SF302-08MP | ||
Cisco SF302-08P Firmware | <1.4.10.6 | |
Cisco SF302-08P Firmware | ||
Cisco SF302-08PP Firmware | <1.4.10.6 | |
Cisco SF302-08PP Firmware | ||
Cisco SF302-08MPP Firmware | <1.4.10.6 | |
Cisco SF302-08MPP | ||
Cisco SF300-24P Firmware | <1.4.10.6 | |
Cisco SF300-24 | ||
Cisco SF300-24P | <1.4.10.6 | |
Cisco SF300-24P | ||
Cisco sf300-24mp firmware | <1.4.10.6 | |
Cisco SF300-24MP | ||
Cisco SF300-24PP Firmware | <1.4.10.6 | |
Cisco SF300-24PP | ||
Cisco SF300-48P Firmware | <1.4.10.6 | |
Cisco SF300-48 | ||
Cisco SF300-48P Firmware | <1.4.10.6 | |
Cisco SF300-48P Firmware | ||
Cisco SF300-48PP Firmware | <1.4.10.6 | |
Cisco SF300-48PP Firmware | ||
Cisco SF500-24 | <1.4.10.6 | |
Cisco SF500-24MP | ||
Cisco SF500-24P | <1.4.10.6 | |
Cisco SF500-24P Firmware | ||
Cisco SF500-24MP Firmware | <1.4.10.6 | |
Cisco SF500-24MP Firmware | ||
Cisco SF500-48P Firmware | <1.4.10.6 | |
Cisco SF500-48 Firmware | ||
Cisco SF500-48P Firmware | <1.4.10.6 | |
Cisco SF500-48 Firmware | ||
Cisco SF500-48MP | <1.4.10.6 | |
Cisco SF500-48MP Firmware | ||
Cisco SG500-28 | <1.4.10.6 | |
Cisco SG500-28PP Firmware | ||
Cisco SG500-28P | <1.4.10.6 | |
Cisco SG500-28P | ||
Cisco SG500-28PP Firmware | <1.4.10.6 | |
Cisco SG500-28MPP Firmware | ||
Cisco SG500-52P | <1.4.10.6 | |
Cisco SG500-52 Firmware | ||
Cisco SG500-52P | <1.4.10.6 | |
Cisco SG500-52P | ||
Cisco SG500-52MP | <1.4.10.6 | |
Cisco SG500-52 | ||
Cisco SG500X-24 | <1.4.10.6 | |
Cisco SG500X-24P | ||
Cisco SG500X-24MPP Firmware | <1.4.10.6 | |
Cisco SG500X-24MPP | ||
Cisco SG500X-48 | <1.4.10.6 | |
Cisco SG500X-48MP Firmware | ||
Cisco SG500X-48P | <1.4.10.6 | |
Cisco SG500X-48P | ||
Cisco SG500X-48MP Firmware | <1.4.10.6 | |
Cisco SG500X-48 | ||
Cisco SG500XG-8F8T Firmware | <1.4.10.6 | |
Cisco SG500XG-8F8T | ||
Cisco ESW2-350G-52DC | <1.4.10.6 | |
Cisco ESW2-350G-52DC | ||
Cisco ESW2-550X-48DC Firmware | <1.4.10.6 | |
Cisco ESW2-550X-48DC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1891 has a CVSS score that indicates it allows an unauthenticated remote attacker to create a denial-of-service condition.
To remedy CVE-2019-1891, upgrade the affected Cisco Small Business Managed Switches to firmware version 1.4.10.6 or later.
CVE-2019-1891 affects various models in the Cisco Small Business 200, 300, and 500 Series Managed Switches.
Yes, CVE-2019-1891 can be exploited by unauthenticated remote attackers, resulting in a denial-of-service attack.
No, CVE-2019-1891 does not require any authentication to exploit.