A vulnerability in the interactions between the DHCP and TFTP features for Cisco Small Business 300 Series (Sx300) Managed Switches could allow an unauthenticated, remote malicious user to cause the device to become low on system memory, which in turn could lead to an unexpected reload of the device and result in a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to free system memory when an unexpected DHCP request is received. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the targeted device. A successful exploit could allow the malicious user to cause an unexpected reload of the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco sf302-08pp firmware |
||
cisco sf302-08mpp firmware |
||
cisco sg300-10pp firmware |
||
cisco sg300-10mpp firmware |
||
cisco sf300-24pp firmware |
||
cisco sf300-48pp firmware |
||
cisco sg300-28pp firmware |
||
cisco sf300-08 firmware |
||
cisco sf300-48p firmware |
||
cisco sg300-10mp firmware |
||
cisco sg300-10p firmware |
||
cisco sg300-10 firmware |
||
cisco sg300-28p firmware |
||
cisco sf300-24p firmware |
||
cisco sf302-08mp firmware |
||
cisco sg300-28 firmware |
||
cisco sf300-48 firmware |
||
cisco sg300-20 firmware |
||
cisco sf302-08p firmware |
||
cisco sg300-52 firmware |
||
cisco sf300-24 firmware |
||
cisco sf302-08 firmware |
||
cisco sf300-24mp firmware |
||
cisco sg300-10sfp firmware |
||
cisco sg300-28mp firmware |
||
cisco sg300-52p firmware |
||
cisco sg300-52mp firmware |