Lucene search

K
vulnrichmentAvayaVULNRICHMENT:CVE-2024-4196
HistoryJun 25, 2024 - 4:00 a.m.

CVE-2024-4196 Avaya IP Office Web Control RCE Vulnerability

2024-06-2504:00:30
CWE-20
avaya
github.com
2
avaya ip office
web control
remote command execution
input validation
vulnerability
specially crafted web request
affected versions
remote code execution
11.1.3.1

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

An improper input validation vulnerability was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1.

CNA Affected

[
  {
    "vendor": "Avaya",
    "modules": [
      "Web Control"
    ],
    "product": "IP Office",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "11.1.3.1",
        "versionType": "11.1.3.1"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-4196