Vulnerabilidad en interfaces objeto-serializado en algunos productos Cisco Collaboration y Social Media (CVE-2015-6420)
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-502
Deserialización de datos no confiables
Fecha de publicación:
15/12/2015
Última modificación:
24/02/2026
Descripción
Interfaces serialized-object en algunos productos Cisco Collaboration y Social Media; Endpoint Clients y Client Software; Network Application, Service y Acceleration; Network y Content Security Devices; Network Management y Provisioning; Routing y Switching - Enterprise y Service Provider; Unified Computing; Voice y Unified Communications Devices; Video, Streaming, TelePresence y Transcoding Devices; Wireless y Cisco Hosted Services permite atacantes remotos ejecutar comandos arbitrarios a través de un objeto Java serializado manipulado, relacionado con la librería Apache Commons Collections (ACC).
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:commons_collections:*:*:*:*:*:*:*:* | 3.0 (incluyendo) | 3.2.2 (excluyendo) |
| cpe:2.3:a:apache:commons_collections:4.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/78872
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21%40%3Ccommits.samza.apache.org%3E
- https://www.kb.cert.org/vuls/id/581311
- https://www.tenable.com/security/research/tra-2017-14
- https://www.tenable.com/security/research/tra-2017-23
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/78872
- https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21%40%3Ccommits.samza.apache.org%3E
- https://news.apache.org/foundation/entry/apache_commons_statement_to_widespread
- https://www.kb.cert.org/vuls/id/576313
- https://www.kb.cert.org/vuls/id/581311
- https://www.tenable.com/security/research/tra-2017-14
- https://www.tenable.com/security/research/tra-2017-23



