Guest

Preview Tool

Cisco Bug: CSCvv36631 - CIAM: jackson-databind 2.9.6 CVE-2020-9548 and others (Rialto - Ponte)

Last Modified

Sep 18, 2020

Products (1)

Known Affected Releases

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2018-1000873 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000873
CVE-2018-14718 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14718
CVE-2018-14719 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14719
CVE-2018-14720 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14720
CVE-2018-14721 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721
CVE-2018-19360 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360
CVE-2018-19361 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361
CVE-2018-19362 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362
CVE-2019-12086 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086
CVE-2019-12384 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
CVE-2019-12814 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814
CVE-2019-14379 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379
CVE-2019-14439 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439
CVE-2019-14540 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540
CVE-2019-14892 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14892
CVE-2019-14893 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893
CVE-2019-16335 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335
CVE-2019-16942 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942
CVE-2019-16943 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
CVE-2019-17267 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267
CVE-2019-17531 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
CVE-2019-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
CVE-2020-10672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
CVE-2020-10673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
CVE-2020-10968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
CVE-2020-10969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
CVE-2020-11111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
CVE-2020-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
CVE-2020-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
CVE-2020-11619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
CVE-2020-11620 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
CVE-2020-14060 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
CVE-2020-14061 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
CVE-2020-14062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
CVE-2020-14195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
CVE-2020-8840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
CVE-2020-9546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
CVE-2020-9547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
CVE-2020-9548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548

These bugs were opened proactively to investigate potential security impact(s) on the product. At this time, the product is not confirmed to be affected by any of the CVE(s).

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.