A vulnerability in the Java deserialization function used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of casuser.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-sm-java-deserial | Vendor Advisory |
Configurations
Information
Published : 2019-10-02 12:15
Updated : 2019-10-09 16:45
NVD link : CVE-2019-12630
Mitre link : CVE-2019-12630
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
cisco
- security_manager