CVE-2015-6420

9.8 CRITICAL
Published: December 15, 2015 Modified: February 24, 2026
View on NVD

Description

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/78872
Source: psirt@cisco.com
Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/581311
Source: psirt@cisco.com
Third Party Advisory
https://www.tenable.com/security/research/tra-2017-14
Source: psirt@cisco.com
Third Party Advisory
https://www.tenable.com/security/research/tra-2017-23
Source: psirt@cisco.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/78872
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://news.apache.org/foundation/entry/apache_commons_statement_to_widespread
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.kb.cert.org/vuls/id/576313
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.kb.cert.org/vuls/id/581311
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.tenable.com/security/research/tra-2017-14
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.tenable.com/security/research/tra-2017-23
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

21 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
21.2%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache