CVE-2019-1913

Multiple vulnerabilities in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to overflow a buffer, which then allows the execution of arbitrary code with root privileges on the underlying operating system. The vulnerabilities are due to insufficient validation of user-supplied input and improper boundary checks when reading data into an internal buffer. An attacker could exploit these vulnerabilities by sending malicious requests to the web management interface of an affected device. Depending on the configuration of the affected switch, the malicious requests must be sent via HTTP or HTTPS.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:sf-220-24_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sf-220-24:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:sf220-24p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sf220-24p:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:sf220-48_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sf220-48:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:sf220-48p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sf220-48p:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:sg220-26_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-26:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:sg220-26p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-26p:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:sg220-28_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-28:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:cisco:sg220-28mp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-28mp:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:cisco:sg220-50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-50:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:cisco:sg220-50p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-50p:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:cisco:sg220-52_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:sg220-52:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html - () http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html -
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce - Vendor Advisory

Information

Published : 2019-08-07 06:15

Updated : 2024-11-21 04:37


NVD link : CVE-2019-1913

Mitre link : CVE-2019-1913

CVE.ORG link : CVE-2019-1913


JSON object : View

Products Affected

cisco

  • sg220-26p
  • sf220-48p_firmware
  • sf220-48_firmware
  • sf220-48p
  • sg220-50p_firmware
  • sf220-24p
  • sf-220-24_firmware
  • sg220-26
  • sg220-50p
  • sf220-24p_firmware
  • sg220-28
  • sg220-28mp_firmware
  • sf-220-24
  • sg220-28mp
  • sf220-48
  • sg220-26_firmware
  • sg220-50_firmware
  • sg220-52_firmware
  • sg220-50
  • sg220-26p_firmware
  • sg220-52
  • sg220-28_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer