Guest

Preview Tool

Cisco Bug: CSCvv89525 - CIAM: jackson-databind 2.9.8 CVE-2020-9547 and others (API-OSN)

Last Modified

Oct 13, 2020

Products (1)

Known Affected Releases

unspecified

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2019-12086 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086
CVE-2019-12384 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
CVE-2019-12814 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814
CVE-2019-14379 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379
CVE-2019-14439 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439
CVE-2019-14540 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540
CVE-2019-14892 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14892
CVE-2019-14893 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893
CVE-2019-16335 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335
CVE-2019-16942 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942
CVE-2019-16943 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
CVE-2019-17267 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267
CVE-2019-17531 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
CVE-2019-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
CVE-2020-10672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
CVE-2020-10673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
CVE-2020-10968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
CVE-2020-10969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
CVE-2020-11111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
CVE-2020-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
CVE-2020-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
CVE-2020-11619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
CVE-2020-11620 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
CVE-2020-14060 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
CVE-2020-14061 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
CVE-2020-14062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
CVE-2020-14195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
CVE-2020-24616 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616
CVE-2020-24750 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24750
CVE-2020-8840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
CVE-2020-9546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
CVE-2020-9547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
CVE-2020-9548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548

The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.