Description
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. 

This vulnerability is due to improper error handling when parsing response data for a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
Published: 2026-05-06
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the SNMP subsystem of Cisco SG350 and SG350X managed switches allows an authenticated attacker to send a malformed SNMP request that triggers improper error handling. The vulnerability triggers a firmware reload, resulting in an unexpected reboot and a denial of service. The weakness corresponds to a heap-based buffer overflow, as identified by CWE-122.

Affected Systems

The affected products are Cisco SG350 and SG350X Series Smart and Managed Switches. All firmware versions running SNMPv1, v2c, or v3 that have not applied the vendor’s fix are vulnerable.

Risk and Exploitability

The CVSS score of 7.7 classifies this as high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires remote authenticated access: an attacker must know a valid SNMP community string for v1/v2c or valid SNMP user credentials for v3. Once authenticated, the attacker can cause a DoS by forcing the device to reboot, which may impact network availability until the device is back online.

Generated by OpenCVE AI on May 6, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Cisco firmware updates that address the SNMP parsing flaw on SG350 and SG350X switches.
  • Configure SNMP to use secure credentials and limit community strings to trusted hosts, or disable SNMP when it is not required.
  • Restrict SNMP access to known IP addresses to reduce the likelihood of an attacker discovering valid credentials.
  • Monitor device logs for unexpected reload events and ensure rapid service restoration procedures are in place.

Generated by OpenCVE AI on May 6, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco small Business Smart And Managed Switches
Vendors & Products Cisco
Cisco small Business Smart And Managed Switches

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of&nbsp;Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X)&nbsp;firmware could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.&nbsp; This vulnerability is due to improper error handling when parsing response data for a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
Title Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vunerability
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Small Business Smart And Managed Switches
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-06T17:48:26.175Z

Reserved: 2025-10-08T11:59:15.394Z

Link: CVE-2026-20185

cve-icon Vulnrichment

Updated: 2026-05-06T17:36:35.239Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T17:16:21.050

Modified: 2026-05-06T18:59:53.230

Link: CVE-2026-20185

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:25:34Z

Weaknesses