First published: Wed Oct 02 2019(Updated: )
A vulnerability in the Java deserialization function used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of casuser.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Security Manager | <4.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12630 is rated as critical due to its potential for remote code execution.
CVE-2019-12630 allows an unauthenticated remote attacker to execute arbitrary commands on affected devices.
To fix CVE-2019-12630, update to the latest version of Cisco Security Manager that addresses this vulnerability.
Yes, CVE-2019-12630 is caused by insecure deserialization of user-supplied content in the Java component.
CVE-2019-12630 affects Cisco Security Manager versions prior to 4.18.