Vulnerabilites related to avaya - ip_office
Vulnerability from fkie_nvd
Published
2024-06-25 04:15
Modified
2025-01-21 14:31
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An improper input validation vulnerability was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "D254641E-9158-4E16-8B8C-800AEC6F8FBB", "versionEndExcluding": "11.1.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper input validation vulnerability was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1." }, { "lang": "es", "value": "Se descubri\u00f3 una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Avaya IP Office que podr\u00eda permitir la ejecuci\u00f3n remota de comandos o c\u00f3digos a trav\u00e9s de una solicitud web especialmente manipulada al componente de control web. Las versiones afectadas incluyen todas las versiones anteriores a la 11.1.3.1." } ], "id": "CVE-2024-4196", "lastModified": "2025-01-21T14:31:31.413", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "securityalerts@avaya.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-25T04:15:16.580", "references": [ { "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ], "url": "https://download.avaya.com/css/public/documents/101090768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://download.avaya.com/css/public/documents/101090768" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-23 17:29
Modified
2024-11-21 03:51
Severity ?
6.8 (Medium) - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "96AC8E27-36AF-4063-9816-9B32FA8495AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B86F3D17-7408-4721-9921-3EB702018C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "BA3D7B64-7AD6-47D0-846D-A70C2838B653", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "0EF71DB4-1523-4270-B0D8-0D20A2A6EAE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "2E32E623-597A-4931-B7CF-EED6EEBA61DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "47898FEC-4BB7-469F-9020-2D9FB1B2C50E", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "D429B865-B22A-4F9B-922F-D1F817DF1147", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "AE40493E-ED60-4BFC-9E48-D3148E4D0834", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "71D9AA27-CBFC-4547-A1D0-777D9C11EE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "40E9E848-9578-41C5-AD68-1F1EF954CCCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "D4712EC5-6085-46C3-949C-12E815099D52", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "93DECE98-A44C-4161-A46B-6926CC7A79A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "01BA0E98-05EA-44CA-AAEA-0B1BA8881B2C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1." }, { "lang": "es", "value": "Una vulnerabilidad en el componente one-x Portal de IP Office podr\u00eda permitir que un usuario autenticado realice ataques de Cross-Site Scripting (XSS) persistente mediante cambios en el servicio \"Conference Scheduler\" que podr\u00edan afectar a otros usuarios de la aplicaci\u00f3n. Las versiones afectadas de IP Office incluyen desde la 10.0 hasta la 10.1 SP3 y las versiones 11.0 anteriores a la 11.0 SP1." } ], "id": "CVE-2018-15614", "lastModified": "2024-11-21T03:51:10.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "securityalerts@avaya.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-23T17:29:00.397", "references": [ { "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101054317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101054317" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-10 02:29
Modified
2024-11-21 03:07
Severity ?
Summary
Buffer overflow in the SoftConsole client in Avaya IP Office before 10.1.1 allows remote servers to execute arbitrary code via a long response.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "329DE43E-B046-40E3-845B-6640C2F8F2D4", "versionEndExcluding": "10.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the SoftConsole client in Avaya IP Office before 10.1.1 allows remote servers to execute arbitrary code via a long response." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el cliente de SoftConsole en Avaya IP Office en versiones anteriores a la 10.1.1 permite que servidores remotos ejecuten c\u00f3digo arbitrario mediante una respuesta larga." } ], "id": "CVE-2017-11309", "lastModified": "2024-11-21T03:07:32.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-10T02:29:16.870", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.avaya.com/css/P8/documents/101044086" }, { "source": "cve@mitre.org", "url": "http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-%28IPO%29-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101674" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43121/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.avaya.com/css/P8/documents/101044086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-%28IPO%29-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43121/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-15 16:15
Modified
2024-11-21 02:53
Severity ?
Summary
A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AC43A23-2511-42A3-BA33-C6BABE962FB1", "versionEndExcluding": "3.26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:aura_application_enablement_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "D638A011-7DFF-4369-95DB-EE977A9B34DD", "versionEndIncluding": "6.3.3", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_enablement_services:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "00127FED-CA13-44FA-89D5-068A3BFD1782", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:-:*:*:*:*:*:*", "matchCriteriaId": "3FD52516-C173-4F55-A4F1-11E1623E0430", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "3BAF15A8-A2D8-487E-960F-EB10524A49B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp10:*:*:*:*:*:*", "matchCriteriaId": "8EE8624E-3F8F-4AC0-9BC9-5DBF2A3BBA83", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp10.1:*:*:*:*:*:*", "matchCriteriaId": "3C30F303-BA9F-4934-A358-4EA4C04EB948", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp11:*:*:*:*:*:*", "matchCriteriaId": "D9F3ABDF-6A28-492E-8F6B-53192E7D1917", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp11.1:*:*:*:*:*:*", "matchCriteriaId": "5B984320-0031-4CEF-BDE5-5A5E274DEE11", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp12:*:*:*:*:*:*", "matchCriteriaId": "DE3EDB11-5831-403F-B6BB-3A84C0943487", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp12.1:*:*:*:*:*:*", "matchCriteriaId": "FD108976-1E55-47F6-806B-2F61661CA128", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp12.2:*:*:*:*:*:*", "matchCriteriaId": "A789ADCD-3BAF-4EE3-8342-AFBEF026F71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp12.3:*:*:*:*:*:*", "matchCriteriaId": "CADCC5A5-8BE4-41FD-BC8D-81607159998B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp12.5:*:*:*:*:*:*", "matchCriteriaId": "0D0E4D1B-CA60-4219-ACD7-97BE0B8E10D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "18C2C82C-E595-4323-88A7-CE5D23E9F6E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "164809B0-EB36-470E-B9B2-75D5B2754600", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_application_server_5300:3.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "2E2F66A4-FB3A-49BB-AD18-5630A057907B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_communication_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB1E43C1-EF6C-423B-A5D0-32E852E4C358", "versionEndIncluding": "6.3.117.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_communication_manager:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "2C2E06A0-09B4-40C9-8A62-0EE0BFE1DECA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_communication_manager:7.0:sp:*:*:*:*:*:*", "matchCriteriaId": "615496B7-5D31-46F5-8795-37ADD595C886", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_communication_manager:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "53379B70-20CC-4827-AE6A-A1DFA11B3733", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_communication_manager_messagint:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "03D34DA0-C975-4A13-BD7E-575CCAE390BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_communication_manager_messagint:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "D635CBA4-B881-4113-BA27-6D0EE1CF6E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:breeze_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B33AAA6-8BFD-4398-8DC4-1F7C3B94FDF4", "versionEndIncluding": "3.2", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:call_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6DC0A0C-0FC6-439D-B865-634726034705", "versionEndIncluding": "18.0.0.2", "versionStartIncluding": "18.0.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:call_management_system:17.0:-:*:*:*:*:*:*", "matchCriteriaId": "E328FD0E-115F-4092-AE1E-C22B72350B0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:call_management_system:17.0:r3:*:*:*:*:*:*", "matchCriteriaId": "349543A5-1FD9-46B4-8EAB-52E524A8DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:call_management_system:17.0:r4:*:*:*:*:*:*", "matchCriteriaId": "8D6AA6F0-7AF5-4CC0-8202-65BA15086BF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:call_management_system:17.0:r5:*:*:*:*:*:*", "matchCriteriaId": "A96492BE-C5FC-4936-9B1A-E4675ABB9D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:call_management_system:17.0:r6:*:*:*:*:*:*", "matchCriteriaId": "373F0F03-AC30-4D50-B2F5-30DAEF52C8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:iq:5.2.x:*:*:*:*:*:*:*", "matchCriteriaId": "5C6923AF-6862-4D6C-985A-CF8BF5C3D868", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:avaya:cs1000e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F339C1D-A2C2-4885-B1C6-76923B09C18C", "versionEndIncluding": "7.6", "versionStartIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:avaya:cs1000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB8A1AD-47C2-44F9-9C84-796FE0168E5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:avaya:cs1000m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2139CFD-0302-4281-9D9F-70E7D28B8354", "versionEndIncluding": "7.6", "versionStartIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:avaya:cs1000m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA76EA5-A0AA-4985-9AE5-0C6FA1469E0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:avaya:cs1000e\\/cs1000m_signaling_server_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F50E03-897D-45D4-BE6A-3D7B4D0D79F9", "versionEndIncluding": "7.6", "versionStartIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:avaya:cs1000e\\/cs1000m_signaling_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1690698-8AB7-4129-8935-F08A6D52B559", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:aura_conferencing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A5B17F8-B06D-4E95-83F8-AA2AAA90677A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1A754AC-0023-4A0C-BFFB-6BF7758435B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "4FC61B45-0975-4ED1-BD28-BB5EE5F3A51D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "838A248E-F9E2-4016-82C5-6AAEA21B5F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "A1BB9C6F-0171-41E7-A4FF-CDBCE360EDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "4C0B69F2-7AB0-4E22-98F4-083E26BDA27B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "5FC7A8E0-5AEF-4FA3-AC1D-63F7F609E781", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:sp8:*:*:*:*:*:*", "matchCriteriaId": "DEFC084B-FCC2-438E-B65D-8B139F995551", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_conferencing:8.0:sp9:*:*:*:*:*:*", "matchCriteriaId": "FDD6F033-9716-42FB-9A2F-B08EDAAE1438", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_experience_portal:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3910F71-B4AE-40CC-9EDC-27160869A4FC", "versionEndIncluding": "7.1", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "28DCFA27-23EB-4BBE-A020-F1854E4064A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "51C14CE3-651D-4503-9711-088B9CF773A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "9468982C-DB32-490B-9131-9D35E8339467", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp10:*:*:*:*:*:*", "matchCriteriaId": "4B490A4A-A837-4CC6-8A44-5A7F03D73619", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp11:*:*:*:*:*:*", "matchCriteriaId": "C4A09C00-8D54-4674-A1D9-2F5AAD44CDD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp12:*:*:*:*:*:*", "matchCriteriaId": "67BFAB48-462F-4E95-9619-7A54E4BDF6F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "E488E9F3-5329-43F1-AC9D-36760B95C91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "CDD19739-0237-4C6F-9B6C-E47C9053F82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "ACC5B2C8-CA4E-4482-8842-52886C5D5397", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "09060F4E-DDB3-4C45-B628-6357ED0FA008", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "7C6013D3-4D4C-46F8-82E6-271FB44FD126", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp8:*:*:*:*:*:*", "matchCriteriaId": "B1BED830-57D9-4051-B9D0-4E010AFA7451", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp9:*:*:*:*:*:*", "matchCriteriaId": "110B4593-6CF2-443B-AC7D-7DA98C44058C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:-:*:*:*:*:*:*", "matchCriteriaId": "0AF32565-F747-4450-841E-B54E2977BA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B86F3D17-7408-4721-9921-3EB702018C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "BA3D7B64-7AD6-47D0-846D-A70C2838B653", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "0EF71DB4-1523-4270-B0D8-0D20A2A6EAE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "2E32E623-597A-4931-B7CF-EED6EEBA61DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "47898FEC-4BB7-469F-9020-2D9FB1B2C50E", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "D429B865-B22A-4F9B-922F-D1F817DF1147", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "AE40493E-ED60-4BFC-9E48-D3148E4D0834", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:aura_messaging:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "BF272A94-7530-4DA2-9933-87984366BFAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_messaging:6.3.3:-:*:*:*:*:*:*", "matchCriteriaId": "F428AFF6-9DF7-4B7D-AC2E-8031AEA61F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_messaging:6.3.3:sp4:*:*:*:*:*:*", "matchCriteriaId": "7C31ABCE-668E-455A-A3BC-6F42E1E5C973", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_messaging:6.3.3:sp5:*:*:*:*:*:*", "matchCriteriaId": "C370E9B0-72EB-47E2-8FD9-F6A65ABE26E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_messaging:6.3.3:sp6:*:*:*:*:*:*", "matchCriteriaId": "834D01F3-8266-4202-BB9A-B2805FE4FEDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1433DE76-61AC-44FD-A5A4-1747F8F2FEF9", "versionEndIncluding": "6.3.18", "versionStartIncluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "AEBC4E93-E283-446B-A928-8B8B51F2C154", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E88C0156-15E8-4F2F-8015-8ED421874863", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "BEF48D0A-732F-4C32-A3BB-F0F8A777DC1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:7.0.1:-:*:*:*:*:*:*", "matchCriteriaId": "81979E50-603A-4210-9C27-F3B9974DC226", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:7.0.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "822B7EBF-C87D-4247-9F7F-10B94A37EEAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_session_manager:7.0.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "046A0465-FF7B-4F25-8502-FFD3C6D9D375", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B532A02-FF99-4102-AB99-4ED89875E436", "versionEndIncluding": "6.3.18", "versionStartIncluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA21572A-1848-4B45-88EE-FAA3A13E4B47", "versionEndIncluding": "7.0.1.3", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_utility_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0B3D7C4-968C-4F8D-95A6-FC2BF6DC80EA", "versionEndIncluding": "6.3.14", "versionStartIncluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:aura_utility_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A5C4CAB-B2B9-4892-8183-31AC1DB17FA5", "versionEndIncluding": "7.0.1.2", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:meeting_exchange:6.2:-:*:*:*:*:*:*", "matchCriteriaId": "88AD2F3E-8B67-4FFF-87F0-6624C7026EBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:meeting_exchange:6.2:sp3:*:*:*:*:*:*", "matchCriteriaId": "153B3C0F-9FF7-4CC6-BA38-157C66E93410", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6ADC723-586B-4836-9A39-99DFE46E630D", "versionEndIncluding": "6.3", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:one-x_client_enablement_services:6.2:-:*:*:*:*:*:*", "matchCriteriaId": "D0EBE856-466D-4F6B-A10A-B1DFCD703189", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:one-x_client_enablement_services:6.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "1CD0A719-AF58-450B-A6D9-D2AEE9DDE409", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:one-x_client_enablement_services:6.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "A8D3B3F6-EBB2-42DC-8749-EB8C1DF29C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:one-x_client_enablement_services:6.2:sp5:*:*:*:*:*:*", "matchCriteriaId": "101133AA-42DF-44E1-A6BC-AA1131EEA2A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:proactive_contact:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7DEDCFB-3074-4E52-A2D8-0B78B0DBDF85", "versionEndIncluding": "5.1.2", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:avaya:session_border_controller_for_enterprise_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "143AC145-18D3-41B4-9E6F-DC16B94854B1", "versionEndIncluding": "6.3", "versionStartIncluding": "6.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:avaya:session_border_controller_for_enterprise_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9492A764-F772-428F-B81D-90B109829F0C", "versionEndIncluding": "7.1", "versionStartIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:avaya:session_border_controller_for_enterprise:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA3E439-6712-4345-A918-A300163CAF94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:avaya:aura_system_platform_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBD8DDDA-535C-4141-B0E5-2B379FA28AB4", "versionEndIncluding": "6.4.0", "versionStartIncluding": "6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:avaya:aura_system_platform:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC5935AB-8E13-4CD5-8CAE-91A9C5786880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service." }, { "lang": "es", "value": "Existe una vulnerabilidad de desreferencia de puntero nulo en Mozilla Network Security Services debido a una falta de verificaci\u00f3n NULL en PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, lo que podr\u00eda permitir que un usuario malintencionado remoto cause una Denegaci\u00f3n de servicio." } ], "id": "CVE-2016-5285", "lastModified": "2024-11-21T02:53:59.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-15T16:15:10.110", "references": [ { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" }, { "source": "security@mozilla.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" }, { "source": "security@mozilla.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" }, { "source": "security@mozilla.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html" }, { "source": "security@mozilla.org", "url": "http://www.securityfocus.com/bid/94349" }, { "source": "security@mozilla.org", "url": "http://www.ubuntu.com/usn/USN-3163-1" }, { "source": "security@mozilla.org", "url": "https://bto.bluecoat.com/security-advisory/sa137" }, { "source": "security@mozilla.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306103" }, { "source": "security@mozilla.org", "url": "https://security.gentoo.org/glsa/201701-46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/94349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3163-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bto.bluecoat.com/security-advisory/sa137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-46" } ], "sourceIdentifier": "security@mozilla.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-07 22:15
Modified
2024-11-21 04:47
Severity ?
Summary
A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A1882E4-CCE5-421B-97FB-4D61BBFD6A5D", "versionEndIncluding": "10.1.0.7", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CE17819-2B50-4E38-813E-F63E591CCA1F", "versionEndIncluding": "11.0.4.2", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2." }, { "lang": "es", "value": "Se detect\u00f3 una vulnerabilidad en el componente de la interfaz web de IP Office que puede permitir potencialmente a un usuario remoto no autenticado con acceso a la red conseguir informaci\u00f3n confidencial. Las versiones afectadas de IP Office incluyen: versiones 9.x, versiones 10.0 hasta 10.1.0.7 y versiones 11.0 hasta 11.0.4.2" } ], "id": "CVE-2019-7005", "lastModified": "2024-11-21T04:47:24.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "securityalerts@avaya.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-07T22:15:12.680", "references": [ { "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101070158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101070158" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-02 01:15
Modified
2024-11-21 05:55
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions.
References
▼ | URL | Tags | |
---|---|---|---|
securityalerts@avaya.com | https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md | Exploit, Third Party Advisory | |
securityalerts@avaya.com | https://support.avaya.com/css/P8/documents/101083319 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.avaya.com/css/P8/documents/101083319 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "A85DBDAD-4D2A-43EF-A487-AC5A1AAB8766", "versionEndExcluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:11.1:-:*:*:*:*:*:*", "matchCriteriaId": "26753680-2F84-40F7-87FD-5B5D63B2F5C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack1:*:*:*:*:*:*", "matchCriteriaId": "6F3B61F2-3809-4001-BC62-2CAB62E363EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack1_service_pack1:*:*:*:*:*:*", "matchCriteriaId": "696C872E-B4C4-49BA-ABCD-03BC2451EBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack2:*:*:*:*:*:*", "matchCriteriaId": "C621F009-9229-4F67-8EB1-4DCB31F553F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack2_service_pack1:*:*:*:*:*:*", "matchCriteriaId": "F69EDA65-AD4A-42D6-8AD0-0FF09142E183", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de escalada de privilegios en Avaya IP Office Admin Lite y USB Creator que podr\u00eda permitir a un usuario local escalar privilegios. Este problema afecta a Admin Lite y USB Creator versi\u00f3n 11.1 Feature Pack 2 Service Pack 1 y versiones anteriores" } ], "id": "CVE-2021-25657", "lastModified": "2024-11-21T05:55:14.037", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "securityalerts@avaya.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-02T01:15:07.357", "references": [ { "source": "securityalerts@avaya.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md" }, { "source": "securityalerts@avaya.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.avaya.com/css/P8/documents/101083319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.avaya.com/css/P8/documents/101083319" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-04 00:15
Modified
2024-11-21 05:36
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avaya | ip_office | * | |
avaya | ip_office | * | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.0 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A1882E4-CCE5-421B-97FB-4D61BBFD6A5D", "versionEndIncluding": "10.1.0.7", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CE17819-2B50-4E38-813E-F63E591CCA1F", "versionEndIncluding": "11.0.4.2", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:-:*:*:*:*:*:*", "matchCriteriaId": "1BDECE92-2DA9-45D8-8849-0023F63855A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "38AC8AB4-764E-4C1B-ADCD-95C2AD6684C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp10:*:*:*:*:*:*", "matchCriteriaId": "52ED1E01-4275-4877-B3EC-215898F62F00", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp11:*:*:*:*:*:*", "matchCriteriaId": "F31B3BCC-9061-4335-B465-C80AE38EE954", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp12:*:*:*:*:*:*", "matchCriteriaId": "D275ED61-D7D1-4036-8B2F-19BE6C6CC87D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "9D40EAD2-7995-4D32-A131-8A833C7A8ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "980AB8C3-F81E-4602-97BE-276C7FE8F4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "9A3386A8-7474-40B4-A3DB-82E52080FE51", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "84A4CE4F-8770-469E-BBA6-1F5197DF8E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "E092F76A-A770-447E-9902-6E8F3D9011D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "67DECE38-07A7-4AB5-959B-10123C3E5A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp8:*:*:*:*:*:*", "matchCriteriaId": "84FDC940-3893-4D58-A218-CE29D33A88D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.0:sp9:*:*:*:*:*:*", "matchCriteriaId": "A513BE76-1776-4644-9F74-7D7BF6D86D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "51C14CE3-651D-4503-9711-088B9CF773A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "9468982C-DB32-490B-9131-9D35E8339467", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp10:*:*:*:*:*:*", "matchCriteriaId": "4B490A4A-A837-4CC6-8A44-5A7F03D73619", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp11:*:*:*:*:*:*", "matchCriteriaId": "C4A09C00-8D54-4674-A1D9-2F5AAD44CDD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp12:*:*:*:*:*:*", "matchCriteriaId": "67BFAB48-462F-4E95-9619-7A54E4BDF6F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "E488E9F3-5329-43F1-AC9D-36760B95C91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "CDD19739-0237-4C6F-9B6C-E47C9053F82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "ACC5B2C8-CA4E-4482-8842-52886C5D5397", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "09060F4E-DDB3-4C45-B628-6357ED0FA008", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "7C6013D3-4D4C-46F8-82E6-271FB44FD126", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp8:*:*:*:*:*:*", "matchCriteriaId": "B1BED830-57D9-4051-B9D0-4E010AFA7451", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp9:*:*:*:*:*:*", "matchCriteriaId": "110B4593-6CF2-443B-AC7D-7DA98C44058C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3." }, { "lang": "es", "value": "Se detect\u00f3 una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n confidencial en el componente web interface de IP Office, que puede permitir potencialmente a un usuario local conseguir acceso no autorizado al componente. Las versiones afectadas de IP Office incluyen: 9.x, 10.0 hasta 10.1.0.7 y 11.0 hasta 11.0.4.3" } ], "id": "CVE-2020-7030", "lastModified": "2024-11-21T05:36:30.967", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "securityalerts@avaya.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-04T00:15:10.927", "references": [ { "source": "securityalerts@avaya.com", "url": "http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html" }, { "source": "securityalerts@avaya.com", "url": "http://seclists.org/fulldisclosure/2020/Jun/12" }, { "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101067493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2020/Jun/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101067493" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-25 04:15
Modified
2025-01-21 14:31
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An unrestricted file upload vulnerability in Avaya IP Office was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "matchCriteriaId": "D254641E-9158-4E16-8B8C-800AEC6F8FBB", "versionEndExcluding": "11.1.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unrestricted\u00a0file upload vulnerability in Avaya IP Office\u00a0was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1." }, { "lang": "es", "value": "Se descubri\u00f3 una vulnerabilidad de carga de archivos sin restricciones en Avaya IP Office que podr\u00eda permitir la ejecuci\u00f3n remota de comandos o c\u00f3digos a trav\u00e9s del componente One-X. Las versiones afectadas incluyen todas las versiones anteriores a la 11.1.3.1." } ], "id": "CVE-2024-4197", "lastModified": "2025-01-21T14:31:21.327", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "securityalerts@avaya.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-25T04:15:17.007", "references": [ { "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ], "url": "https://download.avaya.com/css/public/documents/101090768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://download.avaya.com/css/public/documents/101090768" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 21:29
Modified
2024-11-21 03:51
Severity ?
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated attacker to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 9.1 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.0 | |
avaya | ip_office | 10.1 | |
avaya | ip_office | 10.1 | |
avaya | ip_office | 10.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "62D4B983-0DD2-4DB8-A085-4AEEC2BDFC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "9468982C-DB32-490B-9131-9D35E8339467", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp10:*:*:*:*:*:*", "matchCriteriaId": "4B490A4A-A837-4CC6-8A44-5A7F03D73619", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp11:*:*:*:*:*:*", "matchCriteriaId": "C4A09C00-8D54-4674-A1D9-2F5AAD44CDD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp12:*:*:*:*:*:*", "matchCriteriaId": "67BFAB48-462F-4E95-9619-7A54E4BDF6F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "A7284D50-F3D2-4B7B-9147-346100611D46", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "E488E9F3-5329-43F1-AC9D-36760B95C91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "CDD19739-0237-4C6F-9B6C-E47C9053F82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "ACC5B2C8-CA4E-4482-8842-52886C5D5397", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "09060F4E-DDB3-4C45-B628-6357ED0FA008", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "7C6013D3-4D4C-46F8-82E6-271FB44FD126", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp8:*:*:*:*:*:*", "matchCriteriaId": "B1BED830-57D9-4051-B9D0-4E010AFA7451", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:9.1:sp9:*:*:*:*:*:*", "matchCriteriaId": "110B4593-6CF2-443B-AC7D-7DA98C44058C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "96AC8E27-36AF-4063-9816-9B32FA8495AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B86F3D17-7408-4721-9921-3EB702018C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "BA3D7B64-7AD6-47D0-846D-A70C2838B653", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "0EF71DB4-1523-4270-B0D8-0D20A2A6EAE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "2E32E623-597A-4931-B7CF-EED6EEBA61DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "47898FEC-4BB7-469F-9020-2D9FB1B2C50E", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "D429B865-B22A-4F9B-922F-D1F817DF1147", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "AE40493E-ED60-4BFC-9E48-D3148E4D0834", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "71D9AA27-CBFC-4547-A1D0-777D9C11EE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "40E9E848-9578-41C5-AD68-1F1EF954CCCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:avaya:ip_office:10.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "D4712EC5-6085-46C3-949C-12E815099D52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated attacker to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2." }, { "lang": "es", "value": "Una vulnerabilidad en el componente one-X Portal de Avaya IP Office permite que un atacante autenticado lea y elimine archivos arbitrarios en el sistema. Las versiones afectadas de Avaya IP Office incluyen desde la 9.1 hasta la 9.1 SP12, desde la 10.0 hasta la 10.0 SP7 y desde la 10.1 hasta la 10.1 SP2." } ], "id": "CVE-2018-15610", "lastModified": "2024-11-21T03:51:10.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.2, "source": "securityalerts@avaya.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T21:29:00.330", "references": [ { "source": "securityalerts@avaya.com", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101051984" }, { "source": "securityalerts@avaya.com", "url": "https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.avaya.com/css/P8/documents/101051984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html" } ], "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "securityalerts@avaya.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-25657
Vulnerability from cvelistv5
Published
2022-09-02 01:05
Modified
2024-09-17 01:46
Severity ?
EPSS score ?
Summary
A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://support.avaya.com/css/P8/documents/101083319 | x_refsource_MISC | |
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:27.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.avaya.com/css/P8/documents/101083319" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IP Office", "vendor": "Avaya", "versions": [ { "lessThanOrEqual": "11.1 Feature Pack 2 Service Pack 1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-06T19:33:21", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.avaya.com/css/P8/documents/101083319" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md" } ], "source": { "advisory": "ASA-2022-114", "discovery": "EXTERNAL" }, "title": "Avaya IP Office Privilege Escalation Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CNA_private": { "CVE_list": [], "CVE_table_description": [], "internal_comments": "", "owner": "robg", "publish": { "month": "", "year": "", "ym": "" }, "share_with_CVE": false, "todo": [] }, "CVE_data_meta": { "AKA": "", "ASSIGNER": "securityalerts@avaya.com", "DATE_PUBLIC": "", "ID": "CVE-2021-25657", "STATE": "PUBLIC", "TITLE": "Avaya IP Office Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IP Office", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c=", "version_name": "0", "version_value": "11.1 Feature Pack 2 Service Pack 1" } ] } } ] }, "vendor_name": "Avaya" } ] } }, "configuration": [], "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions." } ] }, "exploit": [], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.avaya.com/css/P8/documents/101083319", "refsource": "MISC", "url": "https://support.avaya.com/css/P8/documents/101083319" }, { "name": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md", "refsource": "MISC", "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md" } ] }, "solution": [], "source": { "advisory": "ASA-2022-114", "defect": [], "discovery": "EXTERNAL" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2021-25657", "datePublished": "2022-09-02T01:05:08.862143Z", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-09-17T01:46:04.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4196
Vulnerability from cvelistv5
Published
2024-06-25 04:00
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
An improper input validation vulnerability was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_office", "vendor": "avaya", "versions": [ { "lessThanOrEqual": "11.1.3.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-4196", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T03:55:31.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:52.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://download.avaya.com/css/public/documents/101090768" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Web Control" ], "product": "IP Office", "vendor": "Avaya", "versions": [ { "lessThan": "11.1.3.1", "status": "affected", "version": "0", "versionType": "11.1.3.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eimproper input validation vulnerability \u003c/span\u003e was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1.\u003cbr\u003e\u003cbr\u003e" } ], "value": "An improper input validation vulnerability was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1." } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-25T04:00:30.307Z", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "url": "https://download.avaya.com/css/public/documents/101090768" } ], "source": { "defect": [ "IPOFFICE-171836" ], "discovery": "EXTERNAL" }, "title": "Avaya IP Office Web Control RCE Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2024-4196", "datePublished": "2024-06-25T04:00:30.307Z", "dateReserved": "2024-04-25T16:34:11.466Z", "dateUpdated": "2024-08-01T20:33:52.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11309
Vulnerability from cvelistv5
Published
2017-11-09 19:00
Modified
2024-08-05 18:05
Severity ?
EPSS score ?
Summary
Buffer overflow in the SoftConsole client in Avaya IP Office before 10.1.1 allows remote servers to execute arbitrary code via a long response.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101674 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/43121/ | exploit, x_refsource_EXPLOIT-DB | |
http://downloads.avaya.com/css/P8/documents/101044086 | x_refsource_CONFIRM | |
http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-%28IPO%29-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:05:30.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "101674", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101674" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html" }, { "name": "43121", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43121/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.avaya.com/css/P8/documents/101044086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-%28IPO%29-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the SoftConsole client in Avaya IP Office before 10.1.1 allows remote servers to execute arbitrary code via a long response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "101674", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101674" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html" }, { "name": "43121", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43121/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.avaya.com/css/P8/documents/101044086" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-%28IPO%29-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the SoftConsole client in Avaya IP Office before 10.1.1 allows remote servers to execute arbitrary code via a long response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "101674", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101674" }, { "name": "http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/144883/Avaya-IP-Office-IPO-10.1-Soft-Console-Remote-Buffer-Overflow.html" }, { "name": "43121", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43121/" }, { "name": "http://downloads.avaya.com/css/P8/documents/101044086", "refsource": "CONFIRM", "url": "http://downloads.avaya.com/css/P8/documents/101044086" }, { "name": "http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt", "refsource": "MISC", "url": "http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11309", "datePublished": "2017-11-09T19:00:00", "dateReserved": "2017-07-13T00:00:00", "dateUpdated": "2024-08-05T18:05:30.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5285
Vulnerability from cvelistv5
Published
2019-11-15 15:44
Modified
2024-08-06 00:53
Severity ?
EPSS score ?
Summary
A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/94349 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html | x_refsource_MISC | |
https://security.gentoo.org/glsa/201701-46 | x_refsource_MISC | |
http://rhn.redhat.com/errata/RHSA-2016-2779.html | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html | x_refsource_MISC | |
http://www.ubuntu.com/usn/USN-3163-1 | x_refsource_MISC | |
https://bto.bluecoat.com/security-advisory/sa137 | x_refsource_MISC | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1306103 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mozilla | Network Security Services |
Version: 3.24 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:53:48.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94349" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-46" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3163-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa137" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306103" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Network Security Services", "vendor": "Mozilla", "versions": [ { "status": "affected", "version": "3.24" } ] } ], "datePublic": "2016-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-09T19:53:19", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/94349" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.gentoo.org/glsa/201701-46" }, { "tags": [ "x_refsource_MISC" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ubuntu.com/usn/USN-3163-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bto.bluecoat.com/security-advisory/sa137" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306103" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2016-5285", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Network Security Services", "version": { "version_data": [ { "version_value": "3.24" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" }, { "name": "http://www.securityfocus.com/bid/94349", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/94349" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" }, { "name": "https://security.gentoo.org/glsa/201701-46", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201701-46" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-2779.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-2779.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" }, { "name": "http://www.ubuntu.com/usn/USN-3163-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3163-1" }, { "name": "https://bto.bluecoat.com/security-advisory/sa137", "refsource": "MISC", "url": "https://bto.bluecoat.com/security-advisory/sa137" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306103", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1306103" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2016-5285", "datePublished": "2019-11-15T15:44:05", "dateReserved": "2016-06-03T00:00:00", "dateUpdated": "2024-08-06T00:53:48.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7005
Vulnerability from cvelistv5
Published
2020-08-07 21:20
Modified
2024-09-16 18:18
Severity ?
EPSS score ?
Summary
A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2.
References
▼ | URL | Tags |
---|---|---|
https://downloads.avaya.com/css/P8/documents/101070158 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:32.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://downloads.avaya.com/css/P8/documents/101070158" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IP Office", "vendor": "Avaya", "versions": [ { "lessThanOrEqual": "10.1.0.7", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThanOrEqual": "11.0.4.2", "status": "affected", "version": "11.0", "versionType": "custom" } ] } ], "datePublic": "2020-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-07T21:20:12", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://downloads.avaya.com/css/P8/documents/101070158" } ], "source": { "advisory": "ASA-2020-009" }, "title": "Unauthenticated Information Disclosure Vulnerability in IP Office", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "securityalerts@avaya.com", "DATE_PUBLIC": "2020-08-07T06:00:00.000Z", "ID": "CVE-2019-7005", "STATE": "PUBLIC", "TITLE": "Unauthenticated Information Disclosure Vulnerability in IP Office" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IP Office", "version": { "version_data": [ { "affected": "\u003c=", "version_affected": "\u003c=", "version_name": "10.0", "version_value": "10.1.0.7" }, { "affected": "\u003c=", "version_affected": "\u003c=", "version_name": "11.0", "version_value": "11.0.4.2" } ] } } ] }, "vendor_name": "Avaya" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://downloads.avaya.com/css/P8/documents/101070158", "refsource": "CONFIRM", "url": "https://downloads.avaya.com/css/P8/documents/101070158" } ] }, "source": { "advisory": "ASA-2020-009" } } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2019-7005", "datePublished": "2020-08-07T21:20:12.164613Z", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-09-16T18:18:48.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15614
Vulnerability from cvelistv5
Published
2019-01-23 17:00
Modified
2024-08-05 10:01
Severity ?
EPSS score ?
Summary
A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1.
References
▼ | URL | Tags |
---|---|---|
https://downloads.avaya.com/css/P8/documents/101054317 | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://downloads.avaya.com/css/P8/documents/101054317" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IP Office", "vendor": "Avaya", "versions": [ { "lessThan": "11.0 SP1", "status": "affected", "version": "11.x", "versionType": "custom" }, { "lessThan": "10.1 SP4", "status": "affected", "version": "10.x", "versionType": "custom" } ] } ], "datePublic": "2019-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\n", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-23T16:57:01", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://downloads.avaya.com/css/P8/documents/101054317" } ], "source": { "advisory": "ASA-2018-384" }, "title": "IP Office one-X Portal XSS", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "securityalerts@avaya.com", "ID": "CVE-2018-15614", "STATE": "PUBLIC", "TITLE": "IP Office one-X Portal XSS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IP Office", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "11.x", "version_value": "11.0 SP1" }, { "affected": "\u003c", "version_affected": "\u003c", "version_name": "10.x", "version_value": "10.1 SP4" } ] } } ] }, "vendor_name": "Avaya" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\n" } ] } ] }, "references": { "reference_data": [ { "name": "https://downloads.avaya.com/css/P8/documents/101054317", "refsource": "CONFIRM", "url": "https://downloads.avaya.com/css/P8/documents/101054317" } ] }, "source": { "advisory": "ASA-2018-384" } } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2018-15614", "datePublished": "2019-01-23T17:00:00", "dateReserved": "2018-08-21T00:00:00", "dateUpdated": "2024-08-05T10:01:54.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15610
Vulnerability from cvelistv5
Published
2018-09-12 21:00
Modified
2024-08-05 10:01
Severity ?
EPSS score ?
Summary
A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated attacker to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2.
References
▼ | URL | Tags |
---|---|---|
https://downloads.avaya.com/css/P8/documents/101051984 | x_refsource_CONFIRM | |
https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:53.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://downloads.avaya.com/css/P8/documents/101051984" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IP Office", "vendor": "Avaya", "versions": [ { "status": "affected", "version": "9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2" } ] } ], "datePublic": "2018-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated attacker to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-15T16:06:24", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://downloads.avaya.com/css/P8/documents/101051984" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html" } ], "source": { "advisory": "ASA-2018-256", "discovery": "EXTERNAL" }, "title": "Improper access controls in IP Office one-X Portal", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "securityalerts@avaya.com", "ID": "CVE-2018-15610", "STATE": "PUBLIC", "TITLE": "Improper access controls in IP Office one-X Portal" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IP Office", "version": { "version_data": [ { "version_value": "9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2" } ] } } ] }, "vendor_name": "Avaya" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated attacker to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://downloads.avaya.com/css/P8/documents/101051984", "refsource": "CONFIRM", "url": "https://downloads.avaya.com/css/P8/documents/101051984" }, { "name": "https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/149284/Avaya-one-X-9.x-10.0.x-10.1.x-Arbitrary-File-Disclosure-Deletion.html" } ] }, "source": { "advisory": "ASA-2018-256", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2018-15610", "datePublished": "2018-09-12T21:00:00", "dateReserved": "2018-08-21T00:00:00", "dateUpdated": "2024-08-05T10:01:53.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4197
Vulnerability from cvelistv5
Published
2024-06-25 04:01
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
An unrestricted file upload vulnerability in Avaya IP Office was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:avaya:ip_office:11.1.3.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_office", "vendor": "avaya", "versions": [ { "lessThan": "11.1.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-4197", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T03:55:33.217Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:52.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://download.avaya.com/css/public/documents/101090768" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "One-X" ], "product": "IP Office", "vendor": "Avaya", "versions": [ { "lessThan": "11.1.3.1", "status": "affected", "version": "0", "versionType": "11.1.3.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn unrestricted\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;file upload vulnerability in Avaya IP Office\u003c/span\u003e\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ewas discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1.\u003c/span\u003e\u003cbr\u003e" } ], "value": "An unrestricted\u00a0file upload vulnerability in Avaya IP Office\u00a0was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1." } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-25T04:01:17.685Z", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "url": "https://download.avaya.com/css/public/documents/101090768" } ], "source": { "defect": [ "IPOFFICE-171831" ], "discovery": "UNKNOWN" }, "title": "Avaya IP Office One-X Portal File Upload Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2024-4197", "datePublished": "2024-06-25T04:01:17.685Z", "dateReserved": "2024-04-25T16:34:25.138Z", "dateUpdated": "2024-08-01T20:33:52.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-7030
Vulnerability from cvelistv5
Published
2020-06-03 23:45
Modified
2024-09-16 22:19
Severity ?
EPSS score ?
Summary
A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3.
References
▼ | URL | Tags |
---|---|---|
https://downloads.avaya.com/css/P8/documents/101067493 | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2020/Jun/12 | mailing-list, x_refsource_FULLDISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://downloads.avaya.com/css/P8/documents/101067493" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html" }, { "name": "20200609 Avaya IP Office v9.1.8.0 - 11 Insecure Transit Password Disclosure CVE-2020-7030", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Jun/12" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IP Office", "vendor": "Avaya", "versions": [ { "status": "affected", "version": "9.x" }, { "lessThan": "10.1.0.8", "status": "affected", "version": "10.0", "versionType": "custom" }, { "lessThan": "11.0.4.3", "status": "affected", "version": "11.0", "versionType": "custom" } ] } ], "datePublic": "2020-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522: Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-09T18:06:15", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://downloads.avaya.com/css/P8/documents/101067493" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html" }, { "name": "20200609 Avaya IP Office v9.1.8.0 - 11 Insecure Transit Password Disclosure CVE-2020-7030", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Jun/12" } ], "source": { "advisory": "ASA-2020-077" }, "title": "IPO Information Disclosure", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "securityalerts@avaya.com", "DATE_PUBLIC": "2020-06-03T06:00:00.000Z", "ID": "CVE-2020-7030", "STATE": "PUBLIC", "TITLE": "IPO Information Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IP Office", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "10.0", "version_value": "10.1.0.8" }, { "affected": "\u003c", "version_affected": "\u003c", "version_name": "11.0", "version_value": "11.0.4.3" }, { "affected": "=", "version_affected": "=", "version_name": "9.x", "version_value": "9.x" } ] } } ] }, "vendor_name": "Avaya" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-522: Insufficiently Protected Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://downloads.avaya.com/css/P8/documents/101067493", "refsource": "CONFIRM", "url": "https://downloads.avaya.com/css/P8/documents/101067493" }, { "name": "http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/157957/Avaya-IP-Office-11-Insecure-Transit-Password-Disclosure.html" }, { "name": "20200609 Avaya IP Office v9.1.8.0 - 11 Insecure Transit Password Disclosure CVE-2020-7030", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Jun/12" } ] }, "source": { "advisory": "ASA-2020-077" } } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2020-7030", "datePublished": "2020-06-03T23:45:14.497440Z", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-09-16T22:19:49.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }