Cisco Security Manager Java Deserialization Vulnerability

cisco-sa-20191002-sm-java-deserial · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the Java deserialization function used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of casuser. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-sm-java-deserial

Workarounds

Java Management Extension Remote Method Invocation (JMX RMI) uses port 1099 by default. To mitigate this vulnerability, disable the JMX RMI service. The preferred method is to upgrade Cisco Security Manager to Release 4.18 or later. If this cannot be done, contact the Cisco Technical Assistance Center (TAC) for a script to edit the registry to disable the JMX RMI port.

CVEsCVE-2019-12630
Cisco Bug IDsCSCvj29055
CVSS ScoreBase 6.5
Base 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X

Products with public affected evidence