CVE-2019-1913

CRITICAL

Cisco Sf-220-24 Firmware < 1.1.4.4 - Memory Corruption

Title source: rule

Description

Multiple vulnerabilities in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to overflow a buffer, which then allows the execution of arbitrary code with root privileges on the underlying operating system. The vulnerabilities are due to insufficient validation of user-supplied input and improper boundary checks when reading data into an internal buffer. An attacker could exploit these vulnerabilities by sending malicious requests to the web management interface of an affected device. Depending on the configuration of the affected switch, the malicious requests must be sent via HTTP or HTTPS.

Exploits (1)

exploitdb WORKING POC
pythonremotehardware
https://www.exploit-db.com/exploits/47442

Scores

CVSS v3 9.8
EPSS 0.1417
EPSS Percentile 94.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (11)
cisco/sf-220-24_firmware < 1.1.4.4
cisco/sf220-24p_firmware < 1.1.4.4
cisco/sf220-48_firmware < 1.1.4.4
cisco/sf220-48p_firmware < 1.1.4.4
cisco/sg220-26_firmware < 1.1.4.4
cisco/sg220-26p_firmware < 1.1.4.4
cisco/sg220-28_firmware < 1.1.4.4
cisco/sg220-28mp_firmware < 1.1.4.4
cisco/sg220-50_firmware < 1.1.4.4
cisco/sg220-50p_firmware < 1.1.4.4
... and 1 more
Published Aug 07, 2019
Tracked Since Feb 18, 2026