First published: Fri May 22 2020(Updated: )
A vulnerability in the Java Remote Management Interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary code as the root user on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express | >=12.0<12.0\(1\)es03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3280 is a vulnerability in the Java Remote Management Interface of Cisco Unified Contact Center Express (Unified CCX) that allows remote code execution.
CVE-2020-3280 is classified as critical with a severity rating of 9.8 out of 10.
CVE-2020-3280 allows an unauthenticated, remote attacker to execute arbitrary code on an affected Cisco Unified Contact Center Express device.
CVE-2020-3280 is classified under CWE-502 (Deserialization of Untrusted Data) and CWE-20 (Improper Input Validation).
To fix CVE-2020-3280, it is recommended to apply the necessary patches or updates provided by Cisco.