Denial of Service vuln in web UI of Cisco Small Business Switches

Overview :
A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
Affected Product(s) :

This vulnerability affects the following Cisco products if they are running a firmware release earlier than

  • 200 Series Smart Switches
  • 300 Series Managed Switches
  • 500 Series Stackable Managed Switches
Vulnerability Details :
CVE ID : CVE-2020-3147
The vulnerability is due to improper validation of requests sent to the web interface. An attacker could exploit this vulnerability by sending a malicious request to the web interface of an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. This vulnerability affects firmware releases prior than

Solution :

Cisco fixed this vulnerability in firmware Release for the following Cisco products:

  • 200 Series Smart Switches
  • 300 Series Managed Switches
  • 500 Series Stackable Managed Switches

To download the firmware from the Software Center on, do the following:

  1. Click Browse all.
  2. Choose Switches > LAN Switches – Small Business.
  3. Choose a specific product from the right pane of the product selector.
  4. Choose Smart Switch Firmware or Switch Firmware.
  5. Choose a release from the left pane of the page.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2022-AVAST2 : Self-Defense Bypass via Repairing Function

Description It was noted that there is security checking to prevent some of the Avast processes from loading of undesired/unsigned

CVE-2022-21500 : Oracle Security Alert Advisory

Description This Security Alert addresses vulnerability CVE-2022-21500, which affects some deployments of Oracle E-Business Suite. This vulnerability is remotely exploitable

CVE-2022-1183 : Destroying a TLS session early causes assertion failure

Description On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those