First published: Wed Jul 17 2019(Updated: )
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SG200-50P Firmware | ||
Cisco SG200-50FP | ||
Cisco SG200-50P Firmware | ||
Cisco SG200-50P Firmware | ||
Cisco SG200-50FP Firmware | ||
Cisco SG200-50FP | ||
Cisco SG200-26FP Firmware | ||
Cisco SG200-26P Firmware | ||
Cisco SG200-26P Firmware | ||
Cisco SG200-26P Firmware | ||
Cisco SG200-26FP Firmware | ||
Cisco SG200-26FP Firmware | ||
Cisco SG200-18 Firmware | ||
Cisco SG200-18 Firmware | ||
Cisco SG200-10FP Firmware | ||
Cisco SG200-10FP Firmware | ||
Cisco SG200-08 Firmware | ||
Cisco SG200-08 Firmware | ||
Cisco SG200-08P Firmware | ||
Cisco SG200-08P | ||
Cisco SF200-24 Firmware | ||
Cisco SF200-24P | ||
Cisco SF200-24P Firmware | ||
Cisco SF200-24P | ||
Cisco SF200-24FP Firmware | ||
Cisco SF200-24FP | ||
Cisco SF200-48 Firmware | ||
Cisco SF200-48 Firmware | ||
Cisco SF200-48P Firmware | ||
Cisco SF200-48P Firmware | ||
Cisco SF302-08PP Firmware | =1.3.7.18 | |
Cisco SF302-08PP Firmware | ||
Cisco SF302-08MPP Firmware | =1.3.7.18 | |
Cisco SF302-08MPP | ||
Cisco SG300-10PP Firmware | =1.3.7.18 | |
Cisco SG300-10PP Firmware | ||
Cisco SG300-10MPP Firmware | =1.3.7.18 | |
Cisco SG300-10MPP Firmware | ||
Cisco SF300-24PP Firmware | =1.3.7.18 | |
Cisco SF300-24PP | ||
Cisco SF300-48PP Firmware | =1.3.7.18 | |
Cisco SF300-48PP Firmware | ||
Cisco SG300-28PP Firmware | =1.3.7.18 | |
Cisco SG300-28PP | ||
Cisco SF300-08 Firmware | =1.3.7.18 | |
Cisco SF300-08 Firmware | ||
Cisco SF300-48P Firmware | =1.3.7.18 | |
Cisco SF300-48P Firmware | ||
Cisco SG300-10MP Firmware | =1.3.7.18 | |
Cisco SG300-10MP Firmware | ||
Cisco SG300-10P Firmware | =1.3.7.18 | |
Cisco SG300-10P | ||
Cisco SG300-10 Firmware | =1.3.7.18 | |
Cisco SG300-10 | ||
Cisco SG300-28P Firmware | =1.3.7.18 | |
Cisco SG300-28P | ||
Cisco SF300-24P | =1.3.7.18 | |
Cisco SF300-24P | ||
Cisco SF302-08MP Firmware | =1.3.7.18 | |
Cisco SF302-08MP | ||
Cisco SG300-28 Firmware | =1.3.7.18 | |
Cisco SG300-28 | ||
Cisco SF300-48P Firmware | =1.3.7.18 | |
Cisco SF300-48 | ||
Cisco SG300-20 Firmware | =1.3.7.18 | |
Cisco SG300-20 Firmware | ||
Cisco SF302-08P Firmware | =1.3.7.18 | |
Cisco SF302-08P Firmware | ||
Cisco SG300-52 Firmware | =1.3.7.18 | |
Cisco SG300-52 | ||
Cisco SF300-24P Firmware | =1.3.7.18 | |
Cisco SF300-24 | ||
Cisco SF302-08 Firmware | =1.3.7.18 | |
Cisco SF302-08 | ||
Cisco sf300-24mp firmware | =1.3.7.18 | |
Cisco SF300-24MP | ||
Cisco SG300-10SFP Firmware | =1.3.7.18 | |
Cisco SG300-10SFP Firmware | ||
Cisco SG300-28MP | =1.3.7.18 | |
Cisco SG300-28MP | ||
Cisco SG300-52P Firmware | =1.3.7.18 | |
Cisco SG300-52P | ||
Cisco SG300-52MP Firmware | =1.3.7.18 | |
Cisco SG300-52MP | ||
Cisco SG500-28PP Firmware | ||
Cisco SG500-28MPP Firmware | ||
Cisco SG500-52MP | ||
Cisco SG500-52 | ||
Cisco SG500XG-8F8T Firmware | ||
Cisco SG500XG-8F8T Firmware | ||
Cisco SF500-24 | ||
Cisco SF500-24MP | ||
Cisco SF500-24P | ||
Cisco SF500-24P Firmware | ||
Cisco SF500-48P Firmware | ||
Cisco SF500-48 Firmware | ||
Cisco SF500-48P Firmware | ||
Cisco SF500-48 Firmware | ||
Cisco SG500-28 | ||
Cisco SG500-28PP Firmware | ||
Cisco SG500-28P | ||
Cisco SG500-28P | ||
Cisco SG500-52P | ||
Cisco SG500-52 Firmware | ||
Cisco SG500-52P | ||
Cisco SG500-52P | ||
Cisco SG500X-24 | ||
Cisco SG500X-24P | ||
Cisco SG500X-24P | ||
Cisco SG500X-24P | ||
Cisco SG500X-48 | ||
Cisco SG500X-48MP Firmware | ||
Cisco SG500X-48P | ||
Cisco SG500X-48P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1943 is classified as Medium due to the potential for remote exploitation without authentication.
To fix CVE-2019-1943, update the affected Cisco Small Business switch firmware to a version that addresses this vulnerability.
CVE-2019-1943 affects various models of Cisco Small Business 200, 300, and 500 Series Switches running vulnerable firmware versions.
CVE-2019-1943 can be exploited by an unauthenticated remote attacker to redirect users to malicious web pages.
Currently, there are no specific workarounds for CVE-2019-1943; applying the firmware update is strongly recommended.