Impact
A flaw in the SNMP subsystem of Cisco SG350 and SG350X managed switches allows an authenticated attacker to send a malformed SNMP request that triggers improper error handling. The vulnerability triggers a firmware reload, resulting in an unexpected reboot and a denial of service. The weakness corresponds to a heap-based buffer overflow, as identified by CWE-122.
Affected Systems
The affected products are Cisco SG350 and SG350X Series Smart and Managed Switches. All firmware versions running SNMPv1, v2c, or v3 that have not applied the vendor’s fix are vulnerable.
Risk and Exploitability
The CVSS score of 7.7 classifies this as high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires remote authenticated access: an attacker must know a valid SNMP community string for v1/v2c or valid SNMP user credentials for v3. Once authenticated, the attacker can cause a DoS by forcing the device to reboot, which may impact network availability until the device is back online.
OpenCVE Enrichment