Vulnerability Details : CVE-2015-6420
Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
Products affected by CVE-2015-6420
- cpe:2.3:a:apache:commons_collections:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_collections:4.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6420
0.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6420
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-6420
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6420
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
HPSBMU03691 rev.1 - HPE Insight Control, Multiple Remote VulnerabilitiesThird Party Advisory
-
http://www.securityfocus.com/bid/78872
Malformed RequestThird Party Advisory;VDB Entry
-
https://www.tenable.com/security/research/tra-2017-14
[R1] Cisco Unified Customer Voice Portal Java Deserialization Remote Code Execution - Research Advisory | TenableĀ®Third Party Advisory
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
HPSBMU03685 rev.1 - HPE Insight Control server provisioning (ICsp), Multiple Remote VulnerabilitiesThird Party Advisory
-
https://www.tenable.com/security/research/tra-2017-23
[R1] Cisco Security Manager and Prime LMS Java Deserialization Remote Code Execution - Research Advisory | TenableĀ®Third Party Advisory
-
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E
[GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes - Pony Mail
-
https://www.kb.cert.org/vuls/id/581311
VU#581311 - TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks
-
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
CPU July 2018
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization
Vulnerability in Java Deserialization Affecting Cisco ProductsThird Party Advisory
Jump to