ID

VAR-201907-0231


CVE

CVE-2019-1892


TITLE

plural Cisco Small Business Series Managed Switch Product buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-006441

DESCRIPTION

A vulnerability in the Secure Sockets Layer (SSL) input packet processor of Cisco Small Business 200, 300, and 500 Series Managed Switches could allow an unauthenticated, remote attacker to cause a memory corruption on an affected device. The vulnerability is due to improper validation of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS packet to the management web interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a denial of service (DoS) condition. Cisco Small Business 200 , 300 , 500 Series Managed Switch Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. are all products of Cisco. This issue is being tracked by Cisco Bug ID CSCvp43390

Trust: 2.43

sources: NVD: CVE-2019-1892 // JVNDB: JVNDB-2019-006441 // CNVD: CNVD-2020-22321 // BID: 109042

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-22321

AFFECTED PRODUCTS

vendor:ciscomodel:esw2-350g52dcscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-08scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf302-08scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-52mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:esw2-550x48dcscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-26pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-50pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf302-08mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf302-08mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10sfpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500xg8f8tscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500x-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-52pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-52pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28sfpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-48ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf300-24scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-28mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-28scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-52scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-28scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-26scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-28pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500x-48mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500x-48pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-18scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-52mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf302-08ppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-48mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg200-50scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500x24mppscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf500-24mpscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500x-48scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-20scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg300-10pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf302-08pscope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sg500-52scope:ltversion:1.4.10.6

Trust: 1.0

vendor:ciscomodel:sf200-24scope: - version: -

Trust: 0.8

vendor:ciscomodel:sf200-24pscope: - version: -

Trust: 0.8

vendor:ciscomodel:sf200-48scope: - version: -

Trust: 0.8

vendor:ciscomodel:sf200-48pscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-18scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-26scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-26pscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-50scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-50pscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg300-10scope: - version: -

Trust: 0.8

vendor:ciscomodel:small business seriesscope:eqversion:200<1.4.10.6

Trust: 0.6

vendor:ciscomodel:small business seriesscope:eqversion:300<1.4.10.6

Trust: 0.6

vendor:ciscomodel:small business seriesscope:eqversion:500<1.4.10.6

Trust: 0.6

vendor:ciscomodel:small business series stackable managed switchesscope:eqversion:5001.4.9.0

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:5001.4.2.04

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3001.4.7

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3001.4.9.0

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3001.4.2.04

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3001.4.0.88

Trust: 0.3

vendor:ciscomodel:small business series managed switchscope:eqversion:3001.4.8.06

Trust: 0.3

vendor:ciscomodel:small business series managed switchscope:eqversion:3001.2.7.76

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:2001.4.9.04

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:2001.4.2.04

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:neversion:5001.4.10.6

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:neversion:3001.4.10.6

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:neversion:2001.4.10.6

Trust: 0.3

sources: CNVD: CNVD-2020-22321 // BID: 109042 // JVNDB: JVNDB-2019-006441 // NVD: CVE-2019-1892

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1892
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1892
value: HIGH

Trust: 1.0

NVD: CVE-2019-1892
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-22321
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201907-236
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-1892
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-22321
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-1892
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 2.8

sources: CNVD: CNVD-2020-22321 // JVNDB: JVNDB-2019-006441 // CNNVD: CNNVD-201907-236 // NVD: CVE-2019-1892 // NVD: CVE-2019-1892

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2019-006441 // NVD: CVE-2019-1892

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-236

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201907-236

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006441

PATCH

title:cisco-sa-20190703-sbss-memcorrupturl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-sbss-memcorrupt

Trust: 0.8

title:Patch for Cisco Small Business 200, 300, and 500 Series Managed Switches buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/213517

Trust: 0.6

title:Cisco Small Business 200 , 300 and 500 Series Managed Switches Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94425

Trust: 0.6

sources: CNVD: CNVD-2020-22321 // JVNDB: JVNDB-2019-006441 // CNNVD: CNNVD-201907-236

EXTERNAL IDS

db:NVDid:CVE-2019-1892

Trust: 3.3

db:BIDid:109042

Trust: 0.9

db:JVNDBid:JVNDB-2019-006441

Trust: 0.8

db:CNVDid:CNVD-2020-22321

Trust: 0.6

db:AUSCERTid:ESB-2019.2440

Trust: 0.6

db:CNNVDid:CNNVD-201907-236

Trust: 0.6

sources: CNVD: CNVD-2020-22321 // BID: 109042 // JVNDB: JVNDB-2019-006441 // CNNVD: CNNVD-201907-236 // NVD: CVE-2019-1892

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-1892

Trust: 2.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-sbss-memcorrupt

Trust: 1.9

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1892

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190703-sbss-dos

Trust: 0.6

url:https://www.securityfocus.com/bid/109042

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2440/

Trust: 0.6

sources: CNVD: CNVD-2020-22321 // BID: 109042 // JVNDB: JVNDB-2019-006441 // CNNVD: CNNVD-201907-236 // NVD: CVE-2019-1892

CREDITS

Cisco.

Trust: 0.9

sources: BID: 109042 // CNNVD: CNNVD-201907-236

SOURCES

db:CNVDid:CNVD-2020-22321
db:BIDid:109042
db:JVNDBid:JVNDB-2019-006441
db:CNNVDid:CNNVD-201907-236
db:NVDid:CVE-2019-1892

LAST UPDATE DATE

2024-11-23T22:48:22.019000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-22321date:2020-04-12T00:00:00
db:BIDid:109042date:2019-07-03T00:00:00
db:JVNDBid:JVNDB-2019-006441date:2019-07-19T00:00:00
db:CNNVDid:CNNVD-201907-236date:2019-07-18T00:00:00
db:NVDid:CVE-2019-1892date:2024-11-21T04:37:37.757

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-22321date:2020-04-12T00:00:00
db:BIDid:109042date:2019-07-03T00:00:00
db:JVNDBid:JVNDB-2019-006441date:2019-07-19T00:00:00
db:CNNVDid:CNNVD-201907-236date:2019-07-03T00:00:00
db:NVDid:CVE-2019-1892date:2019-07-06T02:15:11.293