ID CVE-2011-3008
Summary The default configuration of Avaya Secure Access Link (SAL) Gateway 1.5, 1.8, and 2.0 contains certain domain names in the Secondary Core Server URL and Secondary Remote Server URL fields, which allows remote attackers to obtain sensitive information by leveraging administrative access to these domain names, as demonstrated by alarm and log information.
References
Vulnerable Configurations
  • cpe:2.3:a:avaya:secure_access_link_gateway:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:secure_access_link_gateway:1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:secure_access_link_gateway:1.8:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:secure_access_link_gateway:1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:secure_access_link_gateway:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:secure_access_link_gateway:2.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-08-2017 - 01:29)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 48942
cert-vn VU#690315
confirm http://support.avaya.com/css/P8/documents/100140483
xf avaya-sal-info-disclosure(68922)
Last major update 29-08-2017 - 01:29
Published 05-08-2011 - 21:55
Last modified 29-08-2017 - 01:29
Back to Top