CVE编号
CVE-2019-1912利用情况
暂无补丁情况
N/A披露时间
2019-08-07漏洞描述
Cisco Small Business 220 Series Smart Switches是美国思科(Cisco)公司的一款小型智能交换机设备。 使用1.1.4.4之前版本固件的Cisco Small Business 220 Series Smart Switches中的Web管理界面存在授权问题漏洞,该漏洞源于不完全的权限检查。远程攻击者可通过发送恶意的请求利用该漏洞上传任意文件。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-auth_bypass
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller... | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | glibc | * |
Up to (excluding) 2.17-317.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | glibc | * |
Up to (excluding) 2.17-322.181.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sf-220-24_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sf220-24p_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sf220-48p_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sf220-48_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-26p_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-26_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-28mp_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-28_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-50p_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-50_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | sg220-52_firmware | * |
Up to (excluding) 1.1.4.4 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | glibc | * |
Up to (excluding) 2.28-10 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | glibc | * |
Up to (excluding) 2.24-11+deb9u4 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | glibc | * |
Up to (excluding) 2.29-28.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | glibc | * |
Up to (excluding) 2.30-10.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_7 | glibc | * |
Up to (excluding) 2.17-317.0.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_8 | glibc | * |
Up to (excluding) 2.28-101.0.1.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | glibc | * |
Up to (excluding) 0:2.17-317.el7 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | glibc | * |
Up to (excluding) 2.23-0ubuntu11.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | glibc | * |
Up to (excluding) 2.27-3ubuntu1.2 |
|||||
运行在以下环境 | |||||||||
硬件 | cisco | sf-220-24 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sf220-24p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sf220-48 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sf220-48p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-26 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-26p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-28 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-28mp | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-50 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-50p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | sg220-52 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 高
还没有评论,来说两句吧...