VAR-201811-0174
Vulnerability from variot - Updated: 2024-11-23 22:38A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Unity Express is prone to an arbitrary command-execution vulnerability. Cisco Unity Express versions prior to 9.0.6 are vulnerable. The product includes features such as voicemail and Interactive Voice Response (IVR)
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "unity express",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "9.0.6"
},
{
"_id": null,
"model": "unity express software",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "unity express",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9.0"
},
{
"_id": null,
"model": "unity express",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9.0(3)"
},
{
"_id": null,
"model": "unity express",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "9.0.6"
}
],
"sources": [
{
"db": "BID",
"id": "105876"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "NVD",
"id": "CVE-2018-15381"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:cisco:unity_express_software",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
}
]
},
"credits": {
"_id": null,
"data": "Cisco would like to thank Joshua Graham of TSS for reporting this vulnerability.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
}
],
"trust": 0.6
},
"cve": "CVE-2018-15381",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2018-15381",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-125635",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2018-15381",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-15381",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2018-15381",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2018-15381",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNNVD",
"id": "CNNVD-201811-181",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-125635",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2018-15381",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-125635"
},
{
"db": "VULMON",
"id": "CVE-2018-15381"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
},
{
"db": "NVD",
"id": "CVE-2018-15381"
},
{
"db": "NVD",
"id": "CVE-2018-15381"
}
]
},
"description": {
"_id": null,
"data": "A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Unity Express is prone to an arbitrary command-execution vulnerability. \nCisco Unity Express versions prior to 9.0.6 are vulnerable. The product includes features such as voicemail and Interactive Voice Response (IVR)",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-15381"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "BID",
"id": "105876"
},
{
"db": "VULHUB",
"id": "VHN-125635"
},
{
"db": "VULMON",
"id": "CVE-2018-15381"
}
],
"trust": 2.07
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-15381",
"trust": 2.9
},
{
"db": "BID",
"id": "105876",
"trust": 2.1
},
{
"db": "SECTRACK",
"id": "1042130",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201811-181",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-125635",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2018-15381",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-125635"
},
{
"db": "VULMON",
"id": "CVE-2018-15381"
},
{
"db": "BID",
"id": "105876"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
},
{
"db": "NVD",
"id": "CVE-2018-15381"
}
]
},
"id": "VAR-201811-0174",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-125635"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T22:38:02.114000Z",
"patch": {
"_id": null,
"data": [
{
"title": "cisco-sa-20181107-cue",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cue"
},
{
"title": "Cisco Unity Express Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86653"
},
{
"title": "Cisco: Cisco Unity Express Arbitrary Command Execution Vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20181107-cue"
},
{
"title": "Java-Deserialization-Cheat-Sheet",
"trust": 0.1,
"url": "https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet "
},
{
"title": "Java-Deserialization-CVEs",
"trust": 0.1,
"url": "https://github.com/PalindromeLabs/Java-Deserialization-CVEs "
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/cisco-accidentally-released-dirty-cow-exploit-code-in-software/138888/"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2018-15381"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-502",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-125635"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "NVD",
"id": "CVE-2018-15381"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.2,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-cue"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/105876"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1042130"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15381"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-15381"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/502.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://threatpost.com/cisco-accidentally-released-dirty-cow-exploit-code-in-software/138888/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-125635"
},
{
"db": "VULMON",
"id": "CVE-2018-15381"
},
{
"db": "BID",
"id": "105876"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
},
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
},
{
"db": "NVD",
"id": "CVE-2018-15381"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULHUB",
"id": "VHN-125635",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2018-15381",
"ident": null
},
{
"db": "BID",
"id": "105876",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013968",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201811-181",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-15381",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-11-08T00:00:00",
"db": "VULHUB",
"id": "VHN-125635",
"ident": null
},
{
"date": "2018-11-08T00:00:00",
"db": "VULMON",
"id": "CVE-2018-15381",
"ident": null
},
{
"date": "2018-11-07T00:00:00",
"db": "BID",
"id": "105876",
"ident": null
},
{
"date": "2019-03-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013968",
"ident": null
},
{
"date": "2018-11-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201811-181",
"ident": null
},
{
"date": "2018-11-08T16:29:00.277000",
"db": "NVD",
"id": "CVE-2018-15381",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-125635",
"ident": null
},
{
"date": "2019-10-09T00:00:00",
"db": "VULMON",
"id": "CVE-2018-15381",
"ident": null
},
{
"date": "2018-11-07T00:00:00",
"db": "BID",
"id": "105876",
"ident": null
},
{
"date": "2019-03-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013968",
"ident": null
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201811-181",
"ident": null
},
{
"date": "2024-11-21T03:50:40.100000",
"db": "NVD",
"id": "CVE-2018-15381",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Cisco Unity Express Vulnerable to unreliable data deserialization",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013968"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201811-181"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.