{"api_version":"1","generated_at":"2026-04-23T06:18:58+00:00","cve":"CVE-2018-15381","urls":{"html":"https://cve.report/CVE-2018-15381","api":"https://cve.report/api/cve/CVE-2018-15381.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-15381","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-15381"},"summary":{"title":"CVE-2018-15381","description":"A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges.","state":"PUBLIC","assigner":"psirt@cisco.com","published_at":"2018-11-08 16:29:00","updated_at":"2019-10-09 23:35:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/105876","name":"105876","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Unity Express CVE-2018-15381 Arbitrary Command Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue","name":"20181107 Cisco Unity Express Arbitrary Command Execution Vulnerability","refsource":"CISCO","tags":["Vendor Advisory"],"title":"Cisco Unity Express Arbitrary Command Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1042130","name":"1042130","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Unity Express Java Remote Method Invocation Flaw Lets Remote Users Execute Arbitrary Code with Root Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-15381","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15381","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"15381","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unity_express","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"15381","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unity_express","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","DATE_PUBLIC":"2018-11-07T16:00:00-0600","ID":"CVE-2018-15381","STATE":"PUBLIC","TITLE":"Cisco Unity Express Arbitrary Command Execution Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cisco Unity Express ","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"Cisco"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges."}]},"exploit":[{"lang":"eng","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "}],"impact":{"cvss":{"baseScore":"9.8","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-502"}]}]},"references":{"reference_data":[{"name":"1042130","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1042130"},{"name":"20181107 Cisco Unity Express Arbitrary Command Execution Vulnerability","refsource":"CISCO","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue"},{"name":"105876","refsource":"BID","url":"http://www.securityfocus.com/bid/105876"}]},"source":{"advisory":"cisco-sa-20181107-cue","defect":[["CSCvm02856"]],"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2018-11-08 16:29:00","lastModifiedDate":"2019-10-09 23:35:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:unity_express:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"15381","Ordinal":"132116","Title":"CVE-2018-15381","CVE":"CVE-2018-15381","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"15381","Ordinal":"1","NoteData":"A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"15381","Ordinal":"2","NoteData":"2018-11-08","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"15381","Ordinal":"3","NoteData":"2018-11-16","Type":"Other","Title":"Modified"}]}}}