← Retour aux CVEs
CVE-2015-6420
CRITICAL9.8
Description
Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie12/15/2015
Derniere modification2/24/2026
Sourcenvd
Observations honeypot0
Produits affectes
apache:commons_collections
Faiblesses (CWE)
CWE-502
References
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization(psirt@cisco.com)
http://www.securityfocus.com/bid/78872(psirt@cisco.com)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917(psirt@cisco.com)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722(psirt@cisco.com)
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21%40%3Ccommits.samza.apache.org%3E(psirt@cisco.com)
https://www.kb.cert.org/vuls/id/581311(psirt@cisco.com)
https://www.tenable.com/security/research/tra-2017-14(psirt@cisco.com)
https://www.tenable.com/security/research/tra-2017-23(psirt@cisco.com)
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/78872(af854a3a-2127-422b-91ae-364da2661108)
https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/(af854a3a-2127-422b-91ae-364da2661108)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917(af854a3a-2127-422b-91ae-364da2661108)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21%40%3Ccommits.samza.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://news.apache.org/foundation/entry/apache_commons_statement_to_widespread(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/576313(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/581311(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/research/tra-2017-14(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/research/tra-2017-23(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.