ID

VAR-201905-0600


CVE

CVE-2019-1859


TITLE

Cisco Small Business Switches Authorization vulnerabilities in software

Trust: 0.8

sources: JVNDB: JVNDB-2019-004454

DESCRIPTION

A vulnerability in the Secure Shell (SSH) authentication process of Cisco Small Business Switches software could allow an attacker to bypass client-side certificate authentication and revert to password authentication. The vulnerability exists because OpenSSH mishandles the authentication process. An attacker could exploit this vulnerability by attempting to connect to the device via SSH. A successful exploit could allow the attacker to access the configuration as an administrative user if the default credentials are not changed. There are no workarounds available; however, if client-side certificate authentication is enabled, disable it and use strong password authentication. Client-side certificate authentication is disabled by default. Cisco Small Business Switches There is an authorization vulnerability in the software.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to bypass the authentication mechanism and gain unauthorized access. This may lead to further attacks. This issue is being tracked by Cisco bugs CSCvo28588, CSCvp35704

Trust: 1.98

sources: NVD: CVE-2019-1859 // JVNDB: JVNDB-2019-004454 // BID: 108140 // VULMON: CVE-2019-1859

AFFECTED PRODUCTS

vendor:ciscomodel:sx550x-12fscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250x-24scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg550x-24mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350-10mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf300-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-50fpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-26fpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-08scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg350xg-24tscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250x-48pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf302-08scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-52mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg550x-24mppscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250-08scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350xg-24fscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf200-24fpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg550x-24scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250-18scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf302-08mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sx550x-52scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg300-10ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg250x-48scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg300-10sfpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg350-28pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf500-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf550x-48pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf350-48pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250-10pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf500-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-52pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg250-26scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350-10pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg500x-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf550x-48scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf200-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg550x-48mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf300-48ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-28mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg350xg-2f10scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf550x-48mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg300-28scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-52scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-26scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg250-50pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg500x-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf250-48scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg300-10scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-18scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg250-50hpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350xg-48tscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf302-08ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-10fpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500xg-8f8tscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg250x-24pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf250-24pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350x-24mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sx550x-24ftscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf550x-24scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg550x-48scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg200-08pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-20scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg550x-48pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg500-52scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf250-48hpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg355-10pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350x-48scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf550x-24mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg550x-24pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350x-48mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg200-26pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-50pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf250-24scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf302-08mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg250-26hpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350x-48pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250-50scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg500x-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf350-48scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sx550x-24fscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sx550x-24scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg500-52pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-28scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-28pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg350-28scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sx550x-16ftscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250-26pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350x-24pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf550x-24pscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg250-08hpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sf200-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-52mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf350-48mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg350-28mpscope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg200-50scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg350x-24scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg200-08scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg350-10scope:ltversion:2.5.0.78

Trust: 1.0

vendor:ciscomodel:sg500x-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf302-08pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:200 series smart switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:250 series smart switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:350 series managed switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:350x series managed switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:500 series managed switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:small business 300 series managed switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:small business series stackable managed switchesscope:eqversion:5002.4.0.92

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:5001.4.2.04

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3001.4.2.04

Trust: 0.3

vendor:ciscomodel:small business series smart switchesscope:eqversion:2001.4.2.04

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:eqversion:550x2.4.5.71

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:eqversion:550x2.3.0.130

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:eqversion:550x2.2.5.68

Trust: 0.3

vendor:ciscomodel:series managed switchesscope:eqversion:350x2.4.5.71

Trust: 0.3

vendor:ciscomodel:series managed switchesscope:eqversion:3502.4.5.71

Trust: 0.3

vendor:ciscomodel:series managed switchesscope:eqversion:3502.3.0.130

Trust: 0.3

vendor:ciscomodel:series smart switchesscope:eqversion:2502.4.5.71

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:neversion:5001.4.10.6

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:neversion:3001.4.10.6

Trust: 0.3

vendor:ciscomodel:small business series smart switchesscope:neversion:2001.4.10.6

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:neversion:550x2.5.0.78

Trust: 0.3

vendor:ciscomodel:series managed switchesscope:neversion:350x2.5.0.78

Trust: 0.3

vendor:ciscomodel:series managed switchesscope:neversion:3502.5.0.78

Trust: 0.3

vendor:ciscomodel:series smart switchesscope:neversion:2502.5.0.78

Trust: 0.3

sources: BID: 108140 // JVNDB: JVNDB-2019-004454 // NVD: CVE-2019-1859

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1859
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1859
value: HIGH

Trust: 1.0

NVD: CVE-2019-1859
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-054
value: HIGH

Trust: 0.6

VULMON: CVE-2019-1859
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1859
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

ykramarz@cisco.com: CVE-2019-1859
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1859
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2019-1859 // JVNDB: JVNDB-2019-004454 // CNNVD: CNNVD-201905-054 // NVD: CVE-2019-1859 // NVD: CVE-2019-1859

PROBLEMTYPE DATA

problemtype:CWE-285

Trust: 1.8

problemtype:CWE-295

Trust: 1.0

sources: JVNDB: JVNDB-2019-004454 // NVD: CVE-2019-1859

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-054

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-054

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004454

PATCH

title:cisco-sa-20190501-scbvurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv

Trust: 0.8

title:Multiple Cisco Product Authorization Issue Vulnerability Fixing Measuresurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92197

Trust: 0.6

title:Cisco: Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20190501-scbv

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-critical-nexus-9000-flaw/144290/

Trust: 0.1

sources: VULMON: CVE-2019-1859 // JVNDB: JVNDB-2019-004454 // CNNVD: CNNVD-201905-054

EXTERNAL IDS

db:NVDid:CVE-2019-1859

Trust: 2.8

db:BIDid:108140

Trust: 1.0

db:JVNDBid:JVNDB-2019-004454

Trust: 0.8

db:AUSCERTid:ESB-2019.1536

Trust: 0.6

db:CNNVDid:CNNVD-201905-054

Trust: 0.6

db:VULMONid:CVE-2019-1859

Trust: 0.1

sources: VULMON: CVE-2019-1859 // BID: 108140 // JVNDB: JVNDB-2019-004454 // CNNVD: CNNVD-201905-054 // NVD: CVE-2019-1859

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-scbv

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1859

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1859

Trust: 0.8

url:https://www.securityfocus.com/bid/108140

Trust: 0.7

url:https://www.auscert.org.au/bulletins/80182

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/295.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-critical-nexus-9000-flaw/144290/

Trust: 0.1

sources: VULMON: CVE-2019-1859 // BID: 108140 // JVNDB: JVNDB-2019-004454 // CNNVD: CNNVD-201905-054 // NVD: CVE-2019-1859

CREDITS

Katie Sexton and Jimi Sebree of Tenable Research.,Katie Sexton and Jimi Sebree of Tenable Research for reporting these vulnerabilities.

Trust: 0.6

sources: CNNVD: CNNVD-201905-054

SOURCES

db:VULMONid:CVE-2019-1859
db:BIDid:108140
db:JVNDBid:JVNDB-2019-004454
db:CNNVDid:CNNVD-201905-054
db:NVDid:CVE-2019-1859

LAST UPDATE DATE

2024-11-23T22:33:55.680000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2019-1859date:2020-10-13T00:00:00
db:BIDid:108140date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2019-004454date:2019-06-03T00:00:00
db:CNNVDid:CNNVD-201905-054date:2020-10-28T00:00:00
db:NVDid:CVE-2019-1859date:2024-11-21T04:37:32.957

SOURCES RELEASE DATE

db:VULMONid:CVE-2019-1859date:2019-05-03T00:00:00
db:BIDid:108140date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2019-004454date:2019-06-03T00:00:00
db:CNNVDid:CNNVD-201905-054date:2019-05-01T00:00:00
db:NVDid:CVE-2019-1859date:2019-05-03T17:29:01.500