// For flags

CVE-2020-27131

Cisco Security Manager Java Deserialization Vulnerabilities

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. These vulnerabilities are due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit these vulnerabilities by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of NT AUTHORITY\SYSTEM on the Windows target host. Cisco has not released software updates that address these vulnerabilities.

Múltiples vulnerabilidades en la función de deserialización Java que es usada por Cisco Security Manager podrían permitir a un atacante remoto no autenticado ejecutar comandos arbitrarios en un dispositivo afectado. Estas vulnerabilidades son debido a una deserialización no segura del contenido suministrado por el usuario mediante el software afectado. Un atacante podría explotar estas vulnerabilidades mediante el envío de un objeto Java serializado malicioso hacia un oyente específico en un sistema afectado. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios en el dispositivo con los privilegios NT AUTHORITY\SYSTEM en el host de destino de Windows. Cisco no ha publicado actualizaciones de software que aborden estas vulnerabilidades

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2020-10-13 CVE Reserved
  • 2020-11-17 CVE Published
  • 2023-10-09 EPSS Updated
  • 2024-11-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Security Manager
Search vendor "Cisco" for product "Security Manager"
<= 4.22
Search vendor "Cisco" for product "Security Manager" and version " <= 4.22"
-
Affected