Vulnerability Name: | CVE-2018-15381 (CCN-152664) | ||||||||||||
Assigned: | 2018-11-07 | ||||||||||||
Published: | 2018-11-07 | ||||||||||||
Updated: | 2019-10-09 | ||||||||||||
Summary: | A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-502 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-15381 Source: BID Type: Third Party Advisory, VDB Entry 105876 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1042130 Source: XF Type: UNKNOWN cue-cve201815381-command-exec(152664) Source: CCN Type: Cisco Security Advisory cisco-sa-20181107-cue Cisco Unity Express Arbitrary Command Execution Vulnerability Source: CISCO Type: Vendor Advisory 20181107 Cisco Unity Express Arbitrary Command Execution Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |