Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-1914
Modified
More InfoOfficial Page
Source-ykramarz@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-07 Aug, 2019 | 06:15
Updated At-01 Oct, 2019 | 23:15

A vulnerability in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious request to certain parts of the web management interface. To send the malicious request, the attacker needs a valid login session in the web management interface as a privilege level 15 user. Depending on the configuration of the affected switch, the malicious request must be sent via HTTP or HTTPS. A successful exploit could allow the attacker to execute arbitrary shell commands with the privileges of the root user.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.2HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.07.2HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.09.0HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>sf-220-24_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sf-220-24_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf-220-24>>-
cpe:2.3:h:cisco:sf-220-24:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf220-24p_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sf220-24p_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf220-24p>>-
cpe:2.3:h:cisco:sf220-24p:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf220-48_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sf220-48_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf220-48>>-
cpe:2.3:h:cisco:sf220-48:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf220-48p_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sf220-48p_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sf220-48p>>-
cpe:2.3:h:cisco:sf220-48p:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-26_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-26_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-26>>-
cpe:2.3:h:cisco:sg220-26:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-26p_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-26p_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-26p>>-
cpe:2.3:h:cisco:sg220-26p:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-28_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-28_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-28>>-
cpe:2.3:h:cisco:sg220-28:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-28mp_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-28mp_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-28mp>>-
cpe:2.3:h:cisco:sg220-28mp:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-50_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-50_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-50>>-
cpe:2.3:h:cisco:sg220-50:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-50p_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-50p_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-50p>>-
cpe:2.3:h:cisco:sg220-50p:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-52_firmware>>Versions before 1.1.4.4(exclusive)
cpe:2.3:o:cisco:sg220-52_firmware:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>sg220-52>>-
cpe:2.3:h:cisco:sg220-52:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE-20Secondaryykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.htmlykramarz@cisco.com
N/A
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-injectykramarz@cisco.com
Vendor Advisory
Change History
0Changes found

Details not found