First published: Sat Jul 06 2019(Updated: )
A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SF200-24 Firmware | <1.4.10.6 | |
Cisco SF200-24P | ||
Cisco SF200-24P Firmware | <1.4.10.6 | |
Cisco SF200-24P Firmware | ||
Cisco SF200-48 Firmware | <1.4.10.6 | |
Cisco SF200-48 Firmware | ||
Cisco SF200-48P Firmware | <1.4.10.6 | |
Cisco SF200-48P Firmware | ||
Cisco SG200-18 Firmware | <1.4.10.6 | |
Cisco SG200-18 Firmware | ||
Cisco SG200-26P Firmware | <1.4.10.6 | |
Cisco SG200-26P Firmware | ||
Cisco SG200-26 Firmware | <1.4.10.6 | |
Cisco SG200-26P Firmware | ||
Cisco SG200-50P Firmware | <1.4.10.6 | |
Cisco SG200-50FP | ||
Cisco SG200-50P Firmware | <1.4.10.6 | |
Cisco SG200-50P Firmware | ||
Cisco SG300 Series Firmware | <1.4.10.6 | |
Cisco SG300-10 Firmware | ||
Cisco SG300-10MP Firmware | <1.4.10.6 | |
Cisco SG300-10MP Firmware | ||
Cisco SG300-10MPP Firmware | <1.4.10.6 | |
Cisco SG300-10MPP Firmware | ||
Cisco SG300 Series Firmware | <1.4.10.6 | |
Cisco SG300-10SFP Firmware | ||
Cisco SG300-10P Firmware | <1.4.10.6 | |
Cisco SG300-10P Firmware | ||
Cisco SG300-10PP | <1.4.10.6 | |
Cisco SG300-10 Firmware | ||
Cisco SG300 Series Firmware | <1.4.10.6 | |
Cisco SG300-20 Firmware | ||
Cisco SG300-28P | <1.4.10.6 | |
Cisco SG300-28 Firmware | ||
Cisco SG300-28P Firmware | <1.4.10.6 | |
Cisco SG300-28P | ||
Cisco SG300-28PP Firmware | <1.4.10.6 | |
Cisco SG300-28PP Firmware | ||
Cisco SG300-28MP | <1.4.10.6 | |
Cisco SG300-28MP | ||
Cisco SG300 Series Firmware | <1.4.10.6 | |
Cisco SG300-28SFP Firmware | ||
Cisco SG300 Series Firmware | <1.4.10.6 | |
Cisco SG300-52P | ||
Cisco SG300-52P Firmware | <1.4.10.6 | |
Cisco SG300-52P Firmware | ||
Cisco SG300-52MP Firmware | <1.4.10.6 | |
Cisco SG300-52MP Firmware | ||
Cisco SF300-08 Firmware | <1.4.10.6 | |
Cisco SF300-08 Firmware | ||
Cisco SF302-08 Firmware | <1.4.10.6 | |
Cisco SF302-08 Firmware | ||
Cisco SF302-08 | <1.4.10.6 | |
Cisco SF302-08 | ||
Cisco SF302-08P | <1.4.10.6 | |
Cisco SF302-08 | ||
Cisco SF302-08 | <1.4.10.6 | |
Cisco SF302-08 | ||
Cisco SF302-08 | <1.4.10.6 | |
Cisco SF302-08 | ||
Cisco SF300-24P Firmware | <1.4.10.6 | |
Cisco SF300-24 Firmware | ||
Cisco SF300-24P | <1.4.10.6 | |
Cisco SF300-24 Firmware | ||
Cisco SF300-24MP Firmware | <1.4.10.6 | |
Cisco SF300-24MP Firmware | ||
Cisco SF300-24P | <1.4.10.6 | |
Cisco SF300-24PP Firmware | ||
Cisco SF300-48P Firmware | <1.4.10.6 | |
Cisco SF300-48P | ||
Cisco SF300-48P Firmware | <1.4.10.6 | |
Cisco SF300-48P Firmware | ||
Cisco SF300-48PP Firmware | <1.4.10.6 | |
Cisco SF300-48PP Firmware | ||
Cisco SF500-24 | <1.4.10.6 | |
Cisco SF500-24MP | ||
Cisco SF500-24P | <1.4.10.6 | |
Cisco SF500-24P Firmware | ||
Cisco 500 Series Switch Firmware | <1.4.10.6 | |
Cisco SF500-24MP Firmware | ||
Cisco SF500-48P Firmware | <1.4.10.6 | |
Cisco SF500-48 Firmware | ||
Cisco 500 Series Switch Firmware | <1.4.10.6 | |
Cisco SF500-48 Firmware | ||
Cisco 500 Series Switch Firmware | <1.4.10.6 | |
Cisco SF500-48MP Firmware | ||
Cisco SG500-28 | <1.4.10.6 | |
Cisco SG500-28PP Firmware | ||
Cisco SG500-28P | <1.4.10.6 | |
Cisco SG500-28P | ||
Cisco SG500-28PP Firmware | <1.4.10.6 | |
Cisco SG500-28MPP Firmware | ||
Cisco SG500-52P | <1.4.10.6 | |
Cisco SG500-52 Firmware | ||
Cisco SG500-52P | <1.4.10.6 | |
Cisco SG500-52P | ||
Cisco SG500-52MP | <1.4.10.6 | |
Cisco SG500-52 | ||
Cisco SG500X-24 | <1.4.10.6 | |
Cisco SG500X-24P | ||
Cisco SG500X-24MPP Firmware | <1.4.10.6 | |
Cisco SG500X-24MPP | ||
Cisco SG500X-48 | <1.4.10.6 | |
Cisco SG500X-48MP Firmware | ||
Cisco SG500X-48P | <1.4.10.6 | |
Cisco SG500X-48P | ||
Cisco SG500X-48MP Firmware | <1.4.10.6 | |
Cisco SG500X-48 | ||
Cisco SG500XG-8F8T Firmware | <1.4.10.6 | |
Cisco SG500XG-8F8T | ||
Cisco ESW2-350G-52DC | <1.4.10.6 | |
Cisco ESW2-350G-52DC | ||
Cisco ESW2-550X-48DC Firmware | <1.4.10.6 | |
Cisco ESW2-550X-48DC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1892 has been rated as high severity due to the potential for an unauthenticated remote attacker to exploit the vulnerability.
To fix CVE-2019-1892, you should upgrade your Cisco Small Business Managed Switch firmware to version 1.4.10.6 or later.
CVE-2019-1892 affects Cisco Small Business 200, 300, and 500 Series Managed Switches running specific firmware versions.
An unauthenticated remote attacker can exploit CVE-2019-1892 to cause memory corruption on the affected devices.
CVE-2019-1892 was reported on July 3, 2019.