Lucene search

K
vulnrichmentAvayaVULNRICHMENT:CVE-2024-4197
HistoryJun 25, 2024 - 4:01 a.m.

CVE-2024-4197 Avaya IP Office One-X Portal File Upload Vulnerability

2024-06-2504:01:17
CWE-434
avaya
github.com
vulnerability
file upload
remote execution
avaya ip office
command execution
code execution
one-x component
affected versions

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

An unrestricted file upload vulnerability in Avaya IP Office was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "One-X"
    ],
    "product": "IP Office",
    "vendor": "Avaya",
    "versions": [
      {
        "lessThan": "11.1.3.1",
        "status": "affected",
        "version": "0",
        "versionType": "11.1.3.1"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-4197