CVE-2010-3280
Published Sep 23, 2010
Last updated 7 years ago
Overview
- Description
- The CCAgent option 9.0.8.4 and earlier in the management server (aka TSA) component in Alcatel-Lucent OmniTouch Contact Center Standard Edition relies on client-side authorization checking, and unconditionally sends the SuperUser password to the client for use during an authorized session, which allows remote attackers to monitor or reconfigure Contact Center operations via a modified client application.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 8.5
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:C/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:alcatel-lucent:ccagent:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4A15941-19F4-4386-826C-8284E5062CDC", "versionEndIncluding": "8.0" }, { "criteria": "cpe:2.3:a:alcatel-lucent:ccagent:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B917490-946B-4785-80D8-7FFEDCCCAFE0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:alcatel-lucent:omnitouch_contact_center:-:-:std:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9BA7BC8-0C93-4F5B-9F6B-DE0E68FF107C" } ], "operator": "OR" } ], "operator": "AND" } ]