CVE-2018-15381
Summary
| CVE | CVE-2018-15381 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-11-08 16:29:00 UTC |
| Updated | 2019-10-09 23:35:00 UTC |
| Description | A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges. |
Risk And Classification
Problem Types: CWE-502
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Unity Express | All | All | All | All |
| Application | Cisco | Unity Express | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Unity Express CVE-2018-15381 Arbitrary Command Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cisco Unity Express Arbitrary Command Execution Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| Cisco Unity Express Java Remote Method Invocation Flaw Lets Remote Users Execute Arbitrary Code with Root Privileges - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.