Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-15993 |
CWE-ID | CWE-16 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco 250 Series Smart Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco 350 Series Managed Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco 350X Series Stackable Managed Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco 550X Series Stackable Managed Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Small Business 300 Series Managed Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Small Business 500 Series Stackable Managed Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Small Business 200 Series Smart Switches Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU24756
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-15993
CWE-ID:
CWE-16 - Configuration
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to access sensitive device information.
The vulnerability exists due to the affected software lacks proper authentication controls to information accessible from the web UI. A remote attacker can send a malicious HTTP request to the web UI of an affected device and gain access to sensitive device information, which includes configuration files.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco 250 Series Smart Switches: before 2.5.0.92
Cisco 350 Series Managed Switches: before 2.5.0.92
Cisco 350X Series Stackable Managed Switches: before 2.5.0.92
Cisco 550X Series Stackable Managed Switches: before 2.5.0.92
Cisco Small Business 300 Series Managed Switches: before 1.4.11.4
Cisco Small Business 500 Series Stackable Managed Switches: before 1.4.11.4
Cisco Small Business 200 Series Smart Switches: before 1.4.11.4
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?