var-201811-0174
Vulnerability from variot

A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Unity Express is prone to an arbitrary command-execution vulnerability. Cisco Unity Express versions prior to 9.0.6 are vulnerable. The product includes features such as voicemail and Interactive Voice Response (IVR)

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "unity express",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "9.0.6"
      },
      {
        "_id": null,
        "model": "unity express software",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "_id": null,
        "model": "unity express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "9.0"
      },
      {
        "_id": null,
        "model": "unity express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "9.0(3)"
      },
      {
        "_id": null,
        "model": "unity express",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "9.0.6"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "105876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:unity_express_software",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Cisco would like to thank Joshua Graham of TSS for reporting this vulnerability.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2018-15381",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2018-15381",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-125635",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-15381",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-15381",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "ykramarz@cisco.com",
            "id": "CVE-2018-15381",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-15381",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201811-181",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-125635",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-15381",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-125635"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Unity Express is prone to an arbitrary command-execution vulnerability. \nCisco Unity Express versions prior to 9.0.6 are vulnerable. The product includes features such as voicemail and Interactive Voice Response (IVR)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "BID",
        "id": "105876"
      },
      {
        "db": "VULHUB",
        "id": "VHN-125635"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15381"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-15381",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "105876",
        "trust": 2.1
      },
      {
        "db": "SECTRACK",
        "id": "1042130",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-125635",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15381",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-125635"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15381"
      },
      {
        "db": "BID",
        "id": "105876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      }
    ]
  },
  "id": "VAR-201811-0174",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-125635"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:38:02.114000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "cisco-sa-20181107-cue",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue"
      },
      {
        "title": "Cisco Unity Express Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86653"
      },
      {
        "title": "Cisco: Cisco Unity Express Arbitrary Command Execution Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20181107-cue"
      },
      {
        "title": "Java-Deserialization-Cheat-Sheet",
        "trust": 0.1,
        "url": "https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet "
      },
      {
        "title": "Java-Deserialization-CVEs",
        "trust": 0.1,
        "url": "https://github.com/PalindromeLabs/Java-Deserialization-CVEs "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/cisco-accidentally-released-dirty-cow-exploit-code-in-software/138888/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-15381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-502",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-125635"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.2,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-cue"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/105876"
      },
      {
        "trust": 1.8,
        "url": "http://www.securitytracker.com/id/1042130"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15381"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15381"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/502.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://threatpost.com/cisco-accidentally-released-dirty-cow-exploit-code-in-software/138888/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-125635"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15381"
      },
      {
        "db": "BID",
        "id": "105876"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-125635",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-15381",
        "ident": null
      },
      {
        "db": "BID",
        "id": "105876",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-15381",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-11-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-125635",
        "ident": null
      },
      {
        "date": "2018-11-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-15381",
        "ident": null
      },
      {
        "date": "2018-11-07T00:00:00",
        "db": "BID",
        "id": "105876",
        "ident": null
      },
      {
        "date": "2019-03-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013968",
        "ident": null
      },
      {
        "date": "2018-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201811-181",
        "ident": null
      },
      {
        "date": "2018-11-08T16:29:00.277000",
        "db": "NVD",
        "id": "CVE-2018-15381",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-125635",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-15381",
        "ident": null
      },
      {
        "date": "2018-11-07T00:00:00",
        "db": "BID",
        "id": "105876",
        "ident": null
      },
      {
        "date": "2019-03-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013968",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201811-181",
        "ident": null
      },
      {
        "date": "2024-11-21T03:50:40.100000",
        "db": "NVD",
        "id": "CVE-2018-15381",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Cisco Unity Express Vulnerable to unreliable data deserialization",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013968"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "code problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201811-181"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.