CVE-2026-20185
Received Received - Intake
Denial of Service in Cisco SG350 Series Switches

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.  This vulnerability is due to improper error handling when parsing response data for a specific SNMP request. An attacker could exploit this vulnerability by sending a specific SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
cisco 350_series_managed_switches *
cisco 350x_series_stackable_managed_switches *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware.

It is caused by improper error handling when parsing response data for a specific SNMP request. An authenticated, remote attacker can exploit this by sending a specially crafted SNMP request to the affected device.

Successful exploitation causes the device to reload unexpectedly, resulting in a denial of service (DoS) condition.

The vulnerability affects SNMP versions 1, 2c, and 3. To exploit SNMPv2c or earlier, the attacker must know a valid SNMP community string (read-write or read-only). For SNMPv3, valid SNMP user credentials are required.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an authenticated remote attacker to cause a denial of service (DoS) condition on your Cisco 350 or 350X Series Managed Switch.

The attacker can cause the device to reload unexpectedly, which disrupts network operations and availability.

Since the vulnerability requires valid SNMP credentials, unauthorized users without these credentials cannot exploit it, but if credentials are compromised, the risk increases.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves exploitation via a specific SNMP request that causes improper error handling and device reload. Detection would require monitoring SNMP traffic for unusual or crafted SNMP requests targeting the affected devices.

Since exploitation requires valid SNMP community strings or user credentials, verifying SNMP access logs for suspicious SNMP requests or failed authentication attempts could help detect attempts.

No specific detection commands or tools are provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

Cisco advises that no software updates will be released to fix this issue as the affected products are past their End of Software Maintenance Releases.

The recommended mitigation is to disable the vulnerable SNMP Object Identifier (OID) to prevent exploitation.

Additionally, customers are advised to consider migrating to supported products to avoid this and other vulnerabilities.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart