7.5
CWE
119
Advisory Published
Updated

CVE-2019-1892: Cisco Small Business Series Switches Memory Corruption Vulnerability

First published: Sat Jul 06 2019(Updated: )

A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco SF200-24 Firmware<1.4.10.6
Cisco SF200-24P
Cisco SF200-24P Firmware<1.4.10.6
Cisco SF200-24P Firmware
Cisco SF200-48 Firmware<1.4.10.6
Cisco SF200-48 Firmware
Cisco SF200-48P Firmware<1.4.10.6
Cisco SF200-48P Firmware
Cisco SG200-18 Firmware<1.4.10.6
Cisco SG200-18 Firmware
Cisco SG200-26P Firmware<1.4.10.6
Cisco SG200-26P Firmware
Cisco SG200-26 Firmware<1.4.10.6
Cisco SG200-26P Firmware
Cisco SG200-50P Firmware<1.4.10.6
Cisco SG200-50FP
Cisco SG200-50P Firmware<1.4.10.6
Cisco SG200-50P Firmware
Cisco SG300 Series Firmware<1.4.10.6
Cisco SG300-10 Firmware
Cisco SG300-10MP Firmware<1.4.10.6
Cisco SG300-10MP Firmware
Cisco SG300-10MPP Firmware<1.4.10.6
Cisco SG300-10MPP Firmware
Cisco SG300 Series Firmware<1.4.10.6
Cisco SG300-10SFP Firmware
Cisco SG300-10P Firmware<1.4.10.6
Cisco SG300-10P Firmware
Cisco SG300-10PP<1.4.10.6
Cisco SG300-10 Firmware
Cisco SG300 Series Firmware<1.4.10.6
Cisco SG300-20 Firmware
Cisco SG300-28P<1.4.10.6
Cisco SG300-28 Firmware
Cisco SG300-28P Firmware<1.4.10.6
Cisco SG300-28P
Cisco SG300-28PP Firmware<1.4.10.6
Cisco SG300-28PP Firmware
Cisco SG300-28MP<1.4.10.6
Cisco SG300-28MP
Cisco SG300 Series Firmware<1.4.10.6
Cisco SG300-28SFP Firmware
Cisco SG300 Series Firmware<1.4.10.6
Cisco SG300-52P
Cisco SG300-52P Firmware<1.4.10.6
Cisco SG300-52P Firmware
Cisco SG300-52MP Firmware<1.4.10.6
Cisco SG300-52MP Firmware
Cisco SF300-08 Firmware<1.4.10.6
Cisco SF300-08 Firmware
Cisco SF302-08 Firmware<1.4.10.6
Cisco SF302-08 Firmware
Cisco SF302-08<1.4.10.6
Cisco SF302-08
Cisco SF302-08P<1.4.10.6
Cisco SF302-08
Cisco SF302-08<1.4.10.6
Cisco SF302-08
Cisco SF302-08<1.4.10.6
Cisco SF302-08
Cisco SF300-24P Firmware<1.4.10.6
Cisco SF300-24 Firmware
Cisco SF300-24P<1.4.10.6
Cisco SF300-24 Firmware
Cisco SF300-24MP Firmware<1.4.10.6
Cisco SF300-24MP Firmware
Cisco SF300-24P<1.4.10.6
Cisco SF300-24PP Firmware
Cisco SF300-48P Firmware<1.4.10.6
Cisco SF300-48P
Cisco SF300-48P Firmware<1.4.10.6
Cisco SF300-48P Firmware
Cisco SF300-48PP Firmware<1.4.10.6
Cisco SF300-48PP Firmware
Cisco SF500-24<1.4.10.6
Cisco SF500-24MP
Cisco SF500-24P<1.4.10.6
Cisco SF500-24P Firmware
Cisco 500 Series Switch Firmware<1.4.10.6
Cisco SF500-24MP Firmware
Cisco SF500-48P Firmware<1.4.10.6
Cisco SF500-48 Firmware
Cisco 500 Series Switch Firmware<1.4.10.6
Cisco SF500-48 Firmware
Cisco 500 Series Switch Firmware<1.4.10.6
Cisco SF500-48MP Firmware
Cisco SG500-28<1.4.10.6
Cisco SG500-28PP Firmware
Cisco SG500-28P<1.4.10.6
Cisco SG500-28P
Cisco SG500-28PP Firmware<1.4.10.6
Cisco SG500-28MPP Firmware
Cisco SG500-52P<1.4.10.6
Cisco SG500-52 Firmware
Cisco SG500-52P<1.4.10.6
Cisco SG500-52P
Cisco SG500-52MP<1.4.10.6
Cisco SG500-52
Cisco SG500X-24<1.4.10.6
Cisco SG500X-24P
Cisco SG500X-24MPP Firmware<1.4.10.6
Cisco SG500X-24MPP
Cisco SG500X-48<1.4.10.6
Cisco SG500X-48MP Firmware
Cisco SG500X-48P<1.4.10.6
Cisco SG500X-48P
Cisco SG500X-48MP Firmware<1.4.10.6
Cisco SG500X-48
Cisco SG500XG-8F8T Firmware<1.4.10.6
Cisco SG500XG-8F8T
Cisco ESW2-350G-52DC<1.4.10.6
Cisco ESW2-350G-52DC
Cisco ESW2-550X-48DC Firmware<1.4.10.6
Cisco ESW2-550X-48DC

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-1892?

    CVE-2019-1892 has been rated as high severity due to the potential for an unauthenticated remote attacker to exploit the vulnerability.

  • How do I fix CVE-2019-1892?

    To fix CVE-2019-1892, you should upgrade your Cisco Small Business Managed Switch firmware to version 1.4.10.6 or later.

  • Which devices are affected by CVE-2019-1892?

    CVE-2019-1892 affects Cisco Small Business 200, 300, and 500 Series Managed Switches running specific firmware versions.

  • What type of attack can exploit CVE-2019-1892?

    An unauthenticated remote attacker can exploit CVE-2019-1892 to cause memory corruption on the affected devices.

  • When was CVE-2019-1892 reported?

    CVE-2019-1892 was reported on July 3, 2019.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203