ID

VAR-202011-0736


CVE

CVE-2020-27131


TITLE

Cisco Security Manager  Untrusted Data Deserialization Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-013618

DESCRIPTION

Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. These vulnerabilities are due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit these vulnerabilities by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of NT AUTHORITY\SYSTEM on the Windows target host. Cisco has not released software updates that address these vulnerabilities. Cisco Security Manager There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices. Successful exploitation could result in arbitrary command execution on the affected device

Trust: 1.8

sources: NVD: CVE-2020-27131 // JVNDB: JVNDB-2020-013618 // VULHUB: VHN-370509 // VULMON: CVE-2020-27131

AFFECTED PRODUCTS

vendor:ciscomodel:security managerscope:lteversion:4.22

Trust: 1.0

vendor:シスコシステムズmodel:cisco security managerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-013618 // NVD: CVE-2020-27131

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27131
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2020-27131
value: HIGH

Trust: 1.0

NVD: CVE-2020-27131
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202011-1485
value: CRITICAL

Trust: 0.6

VULHUB: VHN-370509
value: HIGH

Trust: 0.1

VULMON: CVE-2020-27131
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-27131
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-370509
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-27131
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-27131
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-27131
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-370509 // VULMON: CVE-2020-27131 // JVNDB: JVNDB-2020-013618 // CNNVD: CNNVD-202011-1485 // NVD: CVE-2020-27131 // NVD: CVE-2020-27131

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.1

problemtype:CWE-20

Trust: 1.0

problemtype:Deserialization of untrusted data (CWE-502) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-370509 // JVNDB: JVNDB-2020-013618 // NVD: CVE-2020-27131

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-1485

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202011-1485

PATCH

title:cisco-sa-csm-java-rce-mWJEedcDurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-java-rce-mWJEedcD

Trust: 0.8

title:Cisco Security Manager Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=135489

Trust: 0.6

title:Cisco: Cisco Security Manager Java Deserialization Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-csm-java-rce-mWJEedcD

Trust: 0.1

title:Java-Deserialization-Cheat-Sheeturl:https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet

Trust: 0.1

title:Java-Deserialization-Cheat-Sheeturl:https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet

Trust: 0.1

title:Vulnerabilityurl:https://github.com/tzwlhack/Vulnerability

Trust: 0.1

title:SecBooks SecBooks目录url:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-cisco-flaw-sensitive-data/161305/

Trust: 0.1

sources: VULMON: CVE-2020-27131 // JVNDB: JVNDB-2020-013618 // CNNVD: CNNVD-202011-1485

EXTERNAL IDS

db:NVDid:CVE-2020-27131

Trust: 2.6

db:JVNDBid:JVNDB-2020-013618

Trust: 0.8

db:AUSCERTid:ESB-2020.4073.3

Trust: 0.6

db:AUSCERTid:ESB-2020.4073.2

Trust: 0.6

db:CNNVDid:CNNVD-202011-1485

Trust: 0.6

db:CNVDid:CNVD-2020-66202

Trust: 0.1

db:SEEBUGid:SSVID-99046

Trust: 0.1

db:VULHUBid:VHN-370509

Trust: 0.1

db:VULMONid:CVE-2020-27131

Trust: 0.1

sources: VULHUB: VHN-370509 // VULMON: CVE-2020-27131 // JVNDB: JVNDB-2020-013618 // CNNVD: CNNVD-202011-1485 // NVD: CVE-2020-27131

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-csm-java-rce-mwjeedcd

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-27131

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2020.4073.3/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4073.2/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/502.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/critical-cisco-flaw-sensitive-data/161305/

Trust: 0.1

sources: VULHUB: VHN-370509 // VULMON: CVE-2020-27131 // JVNDB: JVNDB-2020-013618 // CNNVD: CNNVD-202011-1485 // NVD: CVE-2020-27131

SOURCES

db:VULHUBid:VHN-370509
db:VULMONid:CVE-2020-27131
db:JVNDBid:JVNDB-2020-013618
db:CNNVDid:CNNVD-202011-1485
db:NVDid:CVE-2020-27131

LAST UPDATE DATE

2024-11-23T22:40:51.306000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-370509date:2020-11-30T00:00:00
db:VULMONid:CVE-2020-27131date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2020-013618date:2021-07-08T08:28:00
db:CNNVDid:CNNVD-202011-1485date:2020-12-08T00:00:00
db:NVDid:CVE-2020-27131date:2024-11-21T05:20:46.233

SOURCES RELEASE DATE

db:VULHUBid:VHN-370509date:2020-11-17T00:00:00
db:VULMONid:CVE-2020-27131date:2020-11-17T00:00:00
db:JVNDBid:JVNDB-2020-013618date:2021-07-08T00:00:00
db:CNNVDid:CNNVD-202011-1485date:2020-11-16T00:00:00
db:NVDid:CVE-2020-27131date:2020-11-17T04:15:12.133