A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Cbs250-16p-2g
Subscribe
Cbs250-16p-2g Firmware
Subscribe
Cbs250-16t-2g
Subscribe
Cbs250-16t-2g Firmware
Subscribe
Cbs250-24fp-4g
Subscribe
Cbs250-24fp-4g Firmware
Subscribe
Cbs250-24fp-4x
Subscribe
Cbs250-24fp-4x Firmware
Subscribe
Cbs250-24p-4g
Subscribe
Cbs250-24p-4g Firmware
Subscribe
Cbs250-24p-4x
Subscribe
Cbs250-24p-4x Firmware
Subscribe
Cbs250-24pp-4g
Subscribe
Cbs250-24pp-4g Firmware
Subscribe
Cbs250-24t-4g
Subscribe
Cbs250-24t-4g Firmware
Subscribe
Cbs250-24t-4x
Subscribe
Cbs250-24t-4x Firmware
Subscribe
Cbs250-48p-4g
Subscribe
Cbs250-48p-4g Firmware
Subscribe
Cbs250-48p-4x
Subscribe
Cbs250-48p-4x Firmware
Subscribe
Cbs250-48pp-4g
Subscribe
Cbs250-48pp-4g Firmware
Subscribe
Cbs250-48t-4g
Subscribe
Cbs250-48t-4g Firmware
Subscribe
Cbs250-48t-4x
Subscribe
Cbs250-48t-4x Firmware
Subscribe
Cbs250-8fp-e-2g
Subscribe
Cbs250-8fp-e-2g Firmware
Subscribe
Cbs250-8p-e-2g
Subscribe
Cbs250-8p-e-2g Firmware
Subscribe
Cbs250-8pp-d
Subscribe
Cbs250-8pp-d Firmware
Subscribe
Cbs250-8pp-e-2g
Subscribe
Cbs250-8pp-e-2g Firmware
Subscribe
Cbs250-8t-d
Subscribe
Cbs250-8t-d Firmware
Subscribe
Cbs250-8t-e-2g
Subscribe
Cbs250-8t-e-2g Firmware
Subscribe
Cbs350-12np-4x
Subscribe
Cbs350-12np-4x Firmware
Subscribe
Cbs350-12xs
Subscribe
Cbs350-12xs Firmware
Subscribe
Cbs350-12xt
Subscribe
Cbs350-12xt Firmware
Subscribe
Cbs350-16fp-2g
Subscribe
Cbs350-16fp-2g Firmware
Subscribe
Cbs350-16p-2g
Subscribe
Cbs350-16p-2g Firmware
Subscribe
Cbs350-16p-e-2g
Subscribe
Cbs350-16p-e-2g Firmware
Subscribe
Cbs350-16t-2g
Subscribe
Cbs350-16t-2g Firmware
Subscribe
Cbs350-16t-e-2g
Subscribe
Cbs350-16t-e-2g Firmware
Subscribe
Cbs350-16xts
Subscribe
Cbs350-16xts Firmware
Subscribe
Cbs350-24fp-4g
Subscribe
Cbs350-24fp-4g Firmware
Subscribe
Cbs350-24fp-4x
Subscribe
Cbs350-24fp-4x Firmware
Subscribe
Cbs350-24mgp-4x
Subscribe
Cbs350-24mgp-4x Firmware
Subscribe
Cbs350-24ngp-4x
Subscribe
Cbs350-24ngp-4x Firmware
Subscribe
Cbs350-24p-4g
Subscribe
Cbs350-24p-4g Firmware
Subscribe
Cbs350-24p-4x
Subscribe
Cbs350-24p-4x Firmware
Subscribe
Cbs350-24s-4g
Subscribe
Cbs350-24s-4g Firmware
Subscribe
Cbs350-24t-4g
Subscribe
Cbs350-24t-4g Firmware
Subscribe
Cbs350-24t-4x
Subscribe
Cbs350-24t-4x Firmware
Subscribe
Cbs350-24xs
Subscribe
Cbs350-24xs Firmware
Subscribe
Cbs350-24xt
Subscribe
Cbs350-24xt Firmware
Subscribe
Cbs350-24xts
Subscribe
Cbs350-24xts Firmware
Subscribe
Cbs350-48fp-4g
Subscribe
Cbs350-48fp-4g Firmware
Subscribe
Cbs350-48fp-4x
Subscribe
Cbs350-48fp-4x Firmware
Subscribe
Cbs350-48ngp-4x
Subscribe
Cbs350-48ngp-4x Firmware
Subscribe
Cbs350-48p-4g
Subscribe
Cbs350-48p-4g Firmware
Subscribe
Cbs350-48p-4x
Subscribe
Cbs350-48p-4x Firmware
Subscribe
Cbs350-48t-4g
Subscribe
Cbs350-48t-4g Firmware
Subscribe
Cbs350-48t-4x
Subscribe
Cbs350-48t-4x Firmware
Subscribe
Cbs350-48xt-4x
Subscribe
Cbs350-48xt-4x Firmware
Subscribe
Cbs350-8fp-2g
Subscribe
Cbs350-8fp-2g Firmware
Subscribe
Cbs350-8fp-e-2g
Subscribe
Cbs350-8fp-e-2g Firmware
Subscribe
Cbs350-8mgp-2x
Subscribe
Cbs350-8mgp-2x Firmware
Subscribe
Cbs350-8mp-2x
Subscribe
Cbs350-8mp-2x Firmware
Subscribe
Cbs350-8p-2g
Subscribe
Cbs350-8p-2g Firmware
Subscribe
Cbs350-8p-e-2g
Subscribe
Cbs350-8p-e-2g Firmware
Subscribe
Cbs350-8s-e-2g
Subscribe
Cbs350-8s-e-2g Firmware
Subscribe
Cbs350-8t-e-2g
Subscribe
Cbs350-8t-e-2g Firmware
Subscribe
Cbs350-8xt
Subscribe
Cbs350-8xt Firmware
Subscribe
Sf550x-24
Subscribe
Sf550x-24 Firmware
Subscribe
Sf550x-24mp
Subscribe
Sf550x-24mp Firmware
Subscribe
Sf550x-24p
Subscribe
Sf550x-24p Firmware
Subscribe
Sf550x-48
Subscribe
Sf550x-48 Firmware
Subscribe
Sf550x-48mp
Subscribe
Sf550x-48mp Firmware
Subscribe
Sf550x-48p
Subscribe
Sf550x-48p Firmware
Subscribe
Sg350x-24
Subscribe
Sg350x-24 Firmware
Subscribe
Sg350x-24mp
Subscribe
Sg350x-24mp Firmware
Subscribe
Sg350x-24p
Subscribe
Sg350x-24p Firmware
Subscribe
Sg350x-48
Subscribe
Sg350x-48 Firmware
Subscribe
Sg350x-48mp
Subscribe
Sg350x-48mp Firmware
Subscribe
Sg350x-48p
Subscribe
Sg350x-48p Firmware
Subscribe
Sg350xg-24f
Subscribe
Sg350xg-24f Firmware
Subscribe
Sg350xg-24t
Subscribe
Sg350xg-24t Firmware
Subscribe
Sg350xg-2f10
Subscribe
Sg350xg-2f10 Firmware
Subscribe
Sg350xg-48t
Subscribe
Sg350xg-48t Firmware
Subscribe
Sg550x-24
Subscribe
Sg550x-24 Firmware
Subscribe
Sg550x-24mp
Subscribe
Sg550x-24mp Firmware
Subscribe
Sg550x-24mpp
Subscribe
Sg550x-24mpp Firmware
Subscribe
Sg550x-24p
Subscribe
Sg550x-24p Firmware
Subscribe
Sg550x-48
Subscribe
Sg550x-48 Firmware
Subscribe
Sg550x-48mp
Subscribe
Sg550x-48mp Firmware
Subscribe
Sg550x-48p
Subscribe
Sg550x-48p Firmware
Subscribe
Sg550x-48t
Subscribe
Sg550x-48t Firmware
Subscribe
Sg550xg-24f
Subscribe
Sg550xg-24f Firmware
Subscribe
Sg550xg-24t
Subscribe
Sg550xg-24t Firmware
Subscribe
Sg550xg-8f8t
Subscribe
Sg550xg-8f8t Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-17978 | A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 13 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T14:55:13.733Z
Reserved: 2023-11-08T15:08:07.623Z
Link: CVE-2024-20263
Updated: 2024-08-01T21:52:31.672Z
Status : Modified
Published: 2024-01-26T18:15:11.163
Modified: 2024-11-21T08:52:08.607
Link: CVE-2024-20263
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD