Unknown
CVE-2019-1806
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-1806
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco Small Business Sx200, Sx300, Sx500, ESW2 Series Managed Switches and Small Business Sx250, Sx350, Sx550 Series Switches could allow an authenticated, remote attacker to cause the SNMP application of an affected device to cease processing traffic, resulting in the CPU utilization reaching one hundred percent. Manual intervention may be required before a device resumes normal operations. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a malicious SNMP packet to an affected device. A successful exploit could allow the attacker to cause the device to cease forwarding traffic, which could result in a denial of service (DoS) condition. Cisco has released firmware updates that address this vulnerability.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- esw2-350g52dc firmware,
- esw2-550x48dc firmware,
- sf200-24 firmware,
- sf200-24p firmware,
- sf200-48 firmware,
- sf200-48p firmware,
- sf250-24 firmware,
- sf250-24p firmware,
- sf250-48 firmware,
- sf250-48hp firmware,
- sf300-08 firmware,
- sf300-24 firmware,
- sf300-24mp firmware,
- sf300-24p firmware,
- sf300-24pp firmware,
- sf300-48 firmware,
- sf300-48p firmware,
- sf300-48pp firmware,
- sf302-08 firmware,
- sf302-08mp firmware,
- sf302-08mpp firmware,
- sf302-08p firmware,
- sf302-08pp firmware,
- sf350-48 firmware,
- sf350-48mp firmware,
- sf350-48p firmware,
- sf500-24 firmware,
- sf500-24mp firmware,
- sf500-24p firmware,
- sf500-48 firmware,
- sf500-48mp firmware,
- sf500-48p firmware,
- sf550x-24 firmware,
- sf550x-24mp firmware,
- sf550x-24p firmware,
- sf550x-48 firmware,
- sf550x-48mp firmware,
- sf550x-48p firmware,
- sg200-18 firmware,
- sg200-26 firmware,
- sg200-26p firmware,
- sg200-50 firmware,
- sg200-50p firmware,
- sg250-08 firmware,
- sg250-08hp firmware,
- sg250-10p firmware,
- sg250-18 firmware,
- sg250-26 firmware,
- sg250-26hp firmware,
- sg250-26p firmware,
- sg250-50 firmware,
- sg250-50hp firmware,
- sg250-50p firmware,
- sg250x-24 firmware,
- sg250x-24p firmware,
- sg250x-48 firmware,
- sg250x-48p firmware,
- sg300-10 firmware,
- sg300-10mp firmware,
- sg300-10mpp firmware,
- sg300-10p firmware,
- sg300-10pp firmware,
- sg300-10sfp firmware,
- sg300-20 firmware,
- sg300-28 firmware,
- sg300-28mp firmware,
- sg300-28p firmware,
- sg300-28pp firmware,
- sg300-28sfp firmware,
- sg300-52 firmware,
- sg300-52mp firmware,
- sg300-52p firmware,
- sg350-10 firmware,
- sg350-10mp firmware,
- sg350-10p firmware,
- sg350-28 firmware,
- sg350-28mp firmware,
- sg350-28p firmware,
- sg355-10p firmware,
- sg500-28 firmware,
- sg500-28mpp firmware,
- sg500-28p firmware,
- sg500-52 firmware,
- sg500-52mp firmware,
- sg500-52p firmware,
- sg500x-24 firmware,
- sg500x-24p firmware,
- sg500x-48 firmware,
- sg500x-48mp firmware,
- sg500x-48p firmware,
- sg500x24mpp firmware,
- sg500xg8f8t firmware,
- sg550x-24 firmware,
- sg550x-24mp firmware,
- sg550x-24mpp firmware,
- sg550x-24p firmware,
- sg550x-48 firmware,
- sg550x-48mp firmware,
- sg550x-48p firmware,
- sx550x-12f firmware,
- sx550x-16ft firmware,
- sx550x-24 firmware,
- sx550x-24f firmware,
- sx550x-24ft firmware,
- sx550x-52 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: