A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.

Project Subscriptions

Vendors Products
Cbs250-16p-2g Subscribe
Cbs250-16p-2g Firmware Subscribe
Cbs250-16t-2g Subscribe
Cbs250-16t-2g Firmware Subscribe
Cbs250-24fp-4g Subscribe
Cbs250-24fp-4g Firmware Subscribe
Cbs250-24fp-4x Subscribe
Cbs250-24fp-4x Firmware Subscribe
Cbs250-24p-4g Subscribe
Cbs250-24p-4g Firmware Subscribe
Cbs250-24p-4x Subscribe
Cbs250-24p-4x Firmware Subscribe
Cbs250-24pp-4g Subscribe
Cbs250-24pp-4g Firmware Subscribe
Cbs250-24t-4g Subscribe
Cbs250-24t-4g Firmware Subscribe
Cbs250-24t-4x Subscribe
Cbs250-24t-4x Firmware Subscribe
Cbs250-48p-4g Subscribe
Cbs250-48p-4g Firmware Subscribe
Cbs250-48p-4x Subscribe
Cbs250-48p-4x Firmware Subscribe
Cbs250-48pp-4g Subscribe
Cbs250-48pp-4g Firmware Subscribe
Cbs250-48t-4g Subscribe
Cbs250-48t-4g Firmware Subscribe
Cbs250-48t-4x Subscribe
Cbs250-48t-4x Firmware Subscribe
Cbs250-8fp-e-2g Subscribe
Cbs250-8fp-e-2g Firmware Subscribe
Cbs250-8p-e-2g Subscribe
Cbs250-8p-e-2g Firmware Subscribe
Cbs250-8pp-d Subscribe
Cbs250-8pp-d Firmware Subscribe
Cbs250-8pp-e-2g Subscribe
Cbs250-8pp-e-2g Firmware Subscribe
Cbs250-8t-d Subscribe
Cbs250-8t-d Firmware Subscribe
Cbs250-8t-e-2g Subscribe
Cbs250-8t-e-2g Firmware Subscribe
Cbs350-12np-4x Subscribe
Cbs350-12np-4x Firmware Subscribe
Cbs350-12xs Subscribe
Cbs350-12xs Firmware Subscribe
Cbs350-12xt Subscribe
Cbs350-12xt Firmware Subscribe
Cbs350-16fp-2g Subscribe
Cbs350-16fp-2g Firmware Subscribe
Cbs350-16p-2g Subscribe
Cbs350-16p-2g Firmware Subscribe
Cbs350-16p-e-2g Subscribe
Cbs350-16p-e-2g Firmware Subscribe
Cbs350-16t-2g Subscribe
Cbs350-16t-2g Firmware Subscribe
Cbs350-16t-e-2g Subscribe
Cbs350-16t-e-2g Firmware Subscribe
Cbs350-16xts Subscribe
Cbs350-16xts Firmware Subscribe
Cbs350-24fp-4g Subscribe
Cbs350-24fp-4g Firmware Subscribe
Cbs350-24fp-4x Subscribe
Cbs350-24fp-4x Firmware Subscribe
Cbs350-24mgp-4x Subscribe
Cbs350-24mgp-4x Firmware Subscribe
Cbs350-24ngp-4x Subscribe
Cbs350-24ngp-4x Firmware Subscribe
Cbs350-24p-4g Subscribe
Cbs350-24p-4g Firmware Subscribe
Cbs350-24p-4x Subscribe
Cbs350-24p-4x Firmware Subscribe
Cbs350-24s-4g Subscribe
Cbs350-24s-4g Firmware Subscribe
Cbs350-24t-4g Subscribe
Cbs350-24t-4g Firmware Subscribe
Cbs350-24t-4x Subscribe
Cbs350-24t-4x Firmware Subscribe
Cbs350-24xs Subscribe
Cbs350-24xs Firmware Subscribe
Cbs350-24xt Subscribe
Cbs350-24xt Firmware Subscribe
Cbs350-24xts Subscribe
Cbs350-24xts Firmware Subscribe
Cbs350-48fp-4g Subscribe
Cbs350-48fp-4g Firmware Subscribe
Cbs350-48fp-4x Subscribe
Cbs350-48fp-4x Firmware Subscribe
Cbs350-48ngp-4x Subscribe
Cbs350-48ngp-4x Firmware Subscribe
Cbs350-48p-4g Subscribe
Cbs350-48p-4g Firmware Subscribe
Cbs350-48p-4x Subscribe
Cbs350-48p-4x Firmware Subscribe
Cbs350-48t-4g Subscribe
Cbs350-48t-4g Firmware Subscribe
Cbs350-48t-4x Subscribe
Cbs350-48t-4x Firmware Subscribe
Cbs350-48xt-4x Subscribe
Cbs350-48xt-4x Firmware Subscribe
Cbs350-8fp-2g Subscribe
Cbs350-8fp-2g Firmware Subscribe
Cbs350-8fp-e-2g Subscribe
Cbs350-8fp-e-2g Firmware Subscribe
Cbs350-8mgp-2x Subscribe
Cbs350-8mgp-2x Firmware Subscribe
Cbs350-8mp-2x Subscribe
Cbs350-8mp-2x Firmware Subscribe
Cbs350-8p-2g Subscribe
Cbs350-8p-2g Firmware Subscribe
Cbs350-8p-e-2g Subscribe
Cbs350-8p-e-2g Firmware Subscribe
Cbs350-8s-e-2g Subscribe
Cbs350-8s-e-2g Firmware Subscribe
Cbs350-8t-e-2g Subscribe
Cbs350-8t-e-2g Firmware Subscribe
Cbs350-8xt Subscribe
Cbs350-8xt Firmware Subscribe
Sf550x-24 Subscribe
Sf550x-24 Firmware Subscribe
Sf550x-24mp Subscribe
Sf550x-24mp Firmware Subscribe
Sf550x-24p Subscribe
Sf550x-24p Firmware Subscribe
Sf550x-48 Subscribe
Sf550x-48 Firmware Subscribe
Sf550x-48mp Subscribe
Sf550x-48mp Firmware Subscribe
Sf550x-48p Subscribe
Sf550x-48p Firmware Subscribe
Sg350x-24 Subscribe
Sg350x-24 Firmware Subscribe
Sg350x-24mp Subscribe
Sg350x-24mp Firmware Subscribe
Sg350x-24p Subscribe
Sg350x-24p Firmware Subscribe
Sg350x-48 Subscribe
Sg350x-48 Firmware Subscribe
Sg350x-48mp Subscribe
Sg350x-48mp Firmware Subscribe
Sg350x-48p Subscribe
Sg350x-48p Firmware Subscribe
Sg350xg-24f Subscribe
Sg350xg-24f Firmware Subscribe
Sg350xg-24t Subscribe
Sg350xg-24t Firmware Subscribe
Sg350xg-2f10 Subscribe
Sg350xg-2f10 Firmware Subscribe
Sg350xg-48t Subscribe
Sg350xg-48t Firmware Subscribe
Sg550x-24 Subscribe
Sg550x-24 Firmware Subscribe
Sg550x-24mp Subscribe
Sg550x-24mp Firmware Subscribe
Sg550x-24mpp Subscribe
Sg550x-24mpp Firmware Subscribe
Sg550x-24p Subscribe
Sg550x-24p Firmware Subscribe
Sg550x-48 Subscribe
Sg550x-48 Firmware Subscribe
Sg550x-48mp Subscribe
Sg550x-48mp Firmware Subscribe
Sg550x-48p Subscribe
Sg550x-48p Firmware Subscribe
Sg550x-48t Subscribe
Sg550x-48t Firmware Subscribe
Sg550xg-24f Subscribe
Sg550xg-24f Firmware Subscribe
Sg550xg-24t Subscribe
Sg550xg-24t Firmware Subscribe
Sg550xg-8f8t Subscribe
Sg550xg-8f8t Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-17978 A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00014}

epss

{'score': 0.00019}


Wed, 13 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T14:55:13.733Z

Reserved: 2023-11-08T15:08:07.623Z

Link: CVE-2024-20263

cve-icon Vulnrichment

Updated: 2024-08-01T21:52:31.672Z

cve-icon NVD

Status : Modified

Published: 2024-01-26T18:15:11.163

Modified: 2024-11-21T08:52:08.607

Link: CVE-2024-20263

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses