First published: Wed Nov 07 2018(Updated: )
A Java deserialization vulnerability in Cisco Unity Express (CUE) could allow an unauthenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to the listening Java Remote Method Invocation (RMI) service. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Express | <9.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15381 has a high severity rating due to its potential to allow unauthenticated remote attackers to execute arbitrary shell commands.
To mitigate CVE-2018-15381, update Cisco Unity Express to version 9.0.6 or later.
CVE-2018-15381 affects users of Cisco Unity Express versions prior to 9.0.6.
CVE-2018-15381 can be exploited through remote code execution by using insecure deserialization vulnerabilities.
Yes, CVE-2018-15381 can be exploited by unauthenticated attackers, increasing its risk.