CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
77.6%
The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an “unnecessary default application,” (4) unspecified scripts in the states folder, (5) an unspecified “default application” that lists server configuration, and (6) “full system help.”
Vendor | Product | Version | CPE |
---|---|---|---|
avaya | sip_enablement_services | 3.0 | cpe:2.3:a:avaya:sip_enablement_services:3.0:*:*:*:*:*:*:* |
avaya | sip_enablement_services | 3.1 | cpe:2.3:a:avaya:sip_enablement_services:3.1:*:*:*:*:*:*:* |
avaya | sip_enablement_services | 3.1.1 | cpe:2.3:a:avaya:sip_enablement_services:3.1.1:*:*:*:*:*:*:* |
avaya | sip_enablement_services | 4.0 | cpe:2.3:a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:* |
avaya | communication_manager | 3.1 | cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:* |
avaya | communication_manager | 3.1.1 | cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:* |
avaya | communication_manager | 3.1.2 | cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:* |
avaya | communication_manager | 3.1.3 | cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:* |
avaya | communication_manager | 3.1.4 | cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:* |
avaya | communication_manager | 3.1.4 | cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:* |
osvdb.org/46598
osvdb.org/46599
osvdb.org/46600
secunia.com/advisories/30751
support.avaya.com/elmodocs2/security/ASA-2008-268.htm
www.securityfocus.com/bid/29939
www.voipshield.com/research-details.php?id=86
www.voipshield.com/research-details.php?id=87
www.voipshield.com/research-details.php?id=88
www.voipshield.com/research-details.php?id=89
www.voipshield.com/research-details.php?id=90
www.voipshield.com/research-details.php?id=91
www.vupen.com/english/advisories/2008/1943/references
exchange.xforce.ibmcloud.com/vulnerabilities/43381
exchange.xforce.ibmcloud.com/vulnerabilities/43384
exchange.xforce.ibmcloud.com/vulnerabilities/43389
exchange.xforce.ibmcloud.com/vulnerabilities/43393
exchange.xforce.ibmcloud.com/vulnerabilities/43394
exchange.xforce.ibmcloud.com/vulnerabilities/43395