FKIE_CVE-2019-1814

Vulnerability from fkie_nvd - Published: 2019-05-16 00:29 - Updated: 2024-11-21 04:37
Summary
A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54EF1D1-6263-4DE1-ABA6-7ED4ED922CE0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFEF3C3-0C7C-4359-A45F-00152ACAB545",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BB6D66-B721-4E56-962F-8BA34BBC9D34",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19890DBE-F1B9-4454-8738-AC2AC6704C75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDFBB61-F3F6-4587-A69B-A3AB7F1A25A1",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1772C3-48DB-4BEF-9F12-CDCC3BBFA0E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "994DD7E5-8492-466C-A717-501AEF588D06",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD7CDE3-7247-4EA9-8A72-7ABC961BD895",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEA56AD-84ED-4B3A-9C36-A8336365BADA",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7B70CB-9D7A-4637-8A51-634157F7AC85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193C6F24-7C86-4F33-829B-B79B534866FB",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5248F85-411D-4ED9-983C-A28A90C8FC70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C410556A-C347-4406-9456-BD2404C495C9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6F6741-AA56-47EA-998C-78FD7F6B01CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C78582-B6F8-49E8-B220-1003D28242E7",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C96B794-16D3-46FE-8A2B-262BD38994E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B316C88-0E9D-4DAC-8603-CD2A008B1026",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5307DEF-DCD1-417A-B649-FF4DCE66193E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4421B4CE-EB60-4B35-B744-9B87488498F6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F6D7AC-2ACB-4693-AB8E-C700B99C5BF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A85EE56-BD68-43B5-B132-CD73826A9398",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9054C3D1-BA1A-4BAC-8834-88673B804E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC7D13F-C2E6-448A-A385-C83425DF4930",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B44981-5C59-4328-A7DB-FBF50F9C92C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F781F7-F4A3-493E-AD32-26CAC666FE82",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D5109D-C78B-4362-B000-0AA073FCC843",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D611F3-3FF4-49C4-BCF3-FF7C3C46088B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D909B9-5B11-401E-8484-D6CD39D64142",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5791096-634C-4886-8CEA-669D817A26B9",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8124725E-8340-43BC-BEBB-BC39E3AE7368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5800AF7B-2853-4440-BBA3-F70CBFF1837D",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74DB8D8-B79B-4DAE-BF88-98C1F518E76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99503A8-C123-41BF-97A4-E61A024CF4A0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "765DECDB-4234-4444-B78F-01C1DCBAD8FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AB00BB-2A64-4D70-9A12-9E5FEBDEA38B",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A677CE-4360-4780-ABF9-466C45CB19E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4C86A2-AC05-48BC-B4FC-35203F1FF5B0",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C97D56-2E3C-4F36-89E2-BC169AED3CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F504C5-4906-4097-84C4-B140BCA5D96C",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E26EE1D-763F-4893-9997-F4C1CE7A1089",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76475A4-60E5-4E1A-A8E0-85FFE7975818",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C324F7E3-2088-452F-B049-519A9D25C9B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0086C004-55F6-48B9-A2FA-515A0DF2C480",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04042998-72B6-4215-9264-CC563E51D9CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C499B344-1B59-402D-AAF8-1DF2593045D6",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4882366A-9450-47BE-BE70-CC3A9D2F5275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9522A5E7-7DA5-4FA8-804E-2187E6D96473",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B402FBC0-91FC-471D-9D8A-C71F4FECF338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C8DFFE-66AB-4CC9-AC1B-DC446D9284F8",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB2B761-E591-42B6-B62F-63A6D41F4FAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FDFEB2-0055-4534-9C6C-56EEBAC02955",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9DF9C4-9D06-4449-8AF0-8322C6B77F6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDBCC91-7FD1-4C27-B4BA-D42E8FF88879",
              "versionEndExcluding": "1.4.10.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C3B5A2-CAE6-4E75-A1A3-4FCB1C62A7A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote attacker to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the attacker to cause an unexpected reload of the device."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en las interacciones entre las funciones DHCP y TFTP para Cisco Small Business 300 Series (Sx300) Managed Switches, podr\u00eda permitir que un atacante remoto no autenticado cause que el dispositivo tenga una disminuci\u00f3n sobre la memoria del sistema, que a su vez podr\u00eda generar una recarga inesperada de el dispositivo resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el dispositivo afectado. La vulnerabilidad se debe a un error al liberar la memoria del sistema cuando una solicitud DHCP inesperada es recibida. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete DHCP creado para el dispositivo de destino. Un aprovechamiento exitoso podr\u00eda permitir al atacante provocar una recarga inesperada del dispositivo."
    }
  ],
  "id": "CVE-2019-1814",
  "lastModified": "2024-11-21T04:37:26.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-16T00:29:00.260",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108344"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-sb300sms-dhcp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…