<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SG350X Series Stackable Managed Switches — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sg350x-series-stackable-managed-switches/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 16:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sg350x-series-stackable-managed-switches/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco SG350 and SG350X Series Managed Switches SNMP Denial-of-Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-sg350-snmp-dos/</link><pubDate>Wed, 06 May 2026 16:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-sg350-snmp-dos/</guid><description>A remote, authenticated attacker can cause a denial-of-service condition on vulnerable Cisco SG350 and SG350X Series Managed Switches by sending a crafted SNMP request due to improper error handling.</description><content:encoded><![CDATA[<p>A vulnerability exists in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X). The flaw, identified as CVE-2026-20185, stems from improper error handling during the parsing of response data related to a specific SNMP request. To exploit this vulnerability via SNMPv2c or earlier, an attacker needs to know a valid read-write or read-only SNMP community string for the affected system. For SNMPv3 exploitation, valid SNMP user credentials are required. Cisco will not release software updates to address this vulnerability because the affected products are past their End of Software Maintenance Releases date.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the target switch via SNMP using valid credentials or community string.</li>
<li>The attacker crafts a specific SNMP request designed to trigger the vulnerability.</li>
<li>The attacker sends the malicious SNMP request to the targeted device.</li>
<li>The device processes the SNMP request, and due to improper error handling, a parsing error occurs.</li>
<li>The parsing error causes the SNMP subsystem to enter an unstable state.</li>
<li>The device attempts to recover from the error, but the severity of the error triggers a system reload.</li>
<li>The switch unexpectedly reloads, causing a denial-of-service condition.</li>
<li>Network services reliant on the switch&rsquo;s functionality become unavailable until the device completes its reboot process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in an unexpected device reload, leading to a denial-of-service condition. Any network services relying on the affected Cisco SG350 or SG350X series switch will be temporarily unavailable. The duration of the outage depends on the time it takes for the switch to reboot. Organizations using these switches may experience network disruptions impacting business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Since Cisco will not be releasing patches for this vulnerability, implement access control lists to restrict SNMP access to only trusted hosts, mitigating the risk of unauthorized exploitation of CVE-2026-20185.</li>
<li>Monitor network traffic for suspicious SNMP requests, especially those originating from untrusted sources.</li>
<li>Disable SNMP versions 1, 2c, and 3 if not in use to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>snmp</category><category>denial-of-service</category><category>cve-2026-20185</category></item></channel></rss>