A vulnerability in the Simple Network Management Protocol (SNMP) subsystem communication channel through the Cisco 550X Series Stackable Managed Switches could allow an authenticated, remote attacker to cause the device to reload unexpectedly, causing a denial of service (DoS) condition. The device nay need to be manually reloaded to recover. The vulnerability is due to lack of proper input throttling of ingress SNMP traffic over an internal interface. An attacker could exploit this vulnerability by sending a crafted, heavy stream of SNMP traffic to the targeted device. An exploit could allow the attacker to cause the device to reload unexpectedly, causing a DoS condition. Cisco Bug IDs: CSCvg22135.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Sf500-24
Subscribe
Sf500-24mp
Subscribe
Sf500-24p
Subscribe
Sf500-48
Subscribe
Sf500-48mp
Subscribe
Sf500-48p
Subscribe
Sg500-28
Subscribe
Sg500-28mpp
Subscribe
Sg500-28p
Subscribe
Sg500-52
Subscribe
Sg500-52mp
Subscribe
Sg500-52p
Subscribe
Sg500x-24
Subscribe
Sg500x-24mpp
Subscribe
Sg500x-24p
Subscribe
Sg500x-48
Subscribe
Sg500x-48mp
Subscribe
Sg500x-48p
Subscribe
Sg500xg-8f8t
Subscribe
Small Business 500 Series Stackable Managed Switches Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-1032 | A vulnerability in the Simple Network Management Protocol (SNMP) subsystem communication channel through the Cisco 550X Series Stackable Managed Switches could allow an authenticated, remote attacker to cause the device to reload unexpectedly, causing a denial of service (DoS) condition. The device nay need to be manually reloaded to recover. The vulnerability is due to lack of proper input throttling of ingress SNMP traffic over an internal interface. An attacker could exploit this vulnerability by sending a crafted, heavy stream of SNMP traffic to the targeted device. An exploit could allow the attacker to cause the device to reload unexpectedly, causing a DoS condition. Cisco Bug IDs: CSCvg22135. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 02 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-12-02T20:58:58.611Z
Reserved: 2017-11-27T00:00:00.000Z
Link: CVE-2018-0209
Updated: 2024-08-05T03:14:17.001Z
Status : Modified
Published: 2018-03-08T07:29:00.533
Modified: 2024-11-21T03:37:44.227
Link: CVE-2018-0209
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD