A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-300-500-smb2 Affected Products Vulnerable Products This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches Cisco 350X Series Stackable Managed Switches Cisco 550X Series Stackable Managed Switches Cisco ESW2 Series Advanced Switches Cisco Small Business 300 Series Managed Switches Cisco Small Business 500 Series Stackable Managed Switches For information about affected software releases, consult the Cisco bug ID(s) at the top of this advisory. Products Confirmed Not Vulnerable No other Cisco products are currently known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Cisco 250 Series Smart Switches Cisco Small Business 200 Series Smart Switches Cisco Small Business 220 Series Smart Plus Switches Workarounds There are no workarounds that address this vulnerability. Fixed Software For information about fixed software releases, consult the Cisco bug ID(s) at the top of this advisory. When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page, to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Exploitation and Public Announcements The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Cisco Small Business 300 and 500 Series Managed Switches HTTP Response Splitting Vulnerability

Write a comment
Your email address will not be published. All fields are required
Hmm it seems like your blog ate my first comment (it was super long) so I guess I’ll
just sum it up what I had written and say, I’m thoroughly
enjoying your blog. I as well am an aspiring blog blogger but I’m still new to everything.
Do you have any recommendations for rookie blog writers?
I’d genuinely appreciate it.