Guest

Preview Tool

Cisco Bug: CSCvv35127 - CIAM: jackson-databind 2.8.6 CVE-2019-17531 and others

Last Modified

Aug 20, 2020

Products (1)

  • Cisco Application Deployment Engine

Known Affected Releases

3.1.2

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2017-15095 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095
CVE-2017-17485 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17485
CVE-2017-7525 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525
CVE-2018-1000873 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000873
CVE-2018-11307 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11307
CVE-2018-12022 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022
CVE-2018-12023 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12023
CVE-2018-14718 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14718
CVE-2018-14719 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14719
CVE-2018-14720 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14720
CVE-2018-14721 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721
CVE-2018-19360 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360
CVE-2018-19361 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361
CVE-2018-19362 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362
CVE-2018-5968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968
CVE-2018-7489 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489
CVE-2019-12086 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086
CVE-2019-12384 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
CVE-2019-12814 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814
CVE-2019-14379 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379
CVE-2019-14439 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439
CVE-2019-14540 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540
CVE-2019-14892 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14892
CVE-2019-14893 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893
CVE-2019-16335 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335
CVE-2019-16942 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942
CVE-2019-16943 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
CVE-2019-17267 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267
CVE-2019-17531 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
CVE-2019-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
CVE-2020-10672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
CVE-2020-10673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
CVE-2020-10968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
CVE-2020-10969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
CVE-2020-11111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
CVE-2020-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
CVE-2020-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
CVE-2020-11619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
CVE-2020-11620 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
CVE-2020-14060 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
CVE-2020-14061 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
CVE-2020-14062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
CVE-2020-14195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
CVE-2020-8840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
CVE-2020-9546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
CVE-2020-9547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
CVE-2020-9548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.