Vulnerability identifier: #VU76267
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Small Business 200 Series Smart Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Small Business 300 Series Managed Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Small Business 500 Series Stackable Managed Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco 250 Series Smart Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco 350 Series Managed Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco 350X Series Stackable Managed Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco 550X Series Stackable Managed Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when handling requests. A remote unauthenticated attacker can send specially crafted input to the web interface, trigger a based buffer overflow and execute arbitrary code with root privileges on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Cisco Small Business 200 Series Smart Switches: All versions
Cisco Small Business 300 Series Managed Switches: All versions
Cisco Small Business 500 Series Stackable Managed Switches: All versions
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe27441
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe32326
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.