CVE-2011-3008
Published Aug 5, 2011
Last updated 7 years ago
Overview
- Description
- The default configuration of Avaya Secure Access Link (SAL) Gateway 1.5, 1.8, and 2.0 contains certain domain names in the Secondary Core Server URL and Secondary Remote Server URL fields, which allows remote attackers to obtain sensitive information by leveraging administrative access to these domain names, as demonstrated by alarm and log information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:secure_access_link_gateway:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF59FCAC-9DA2-46A8-ACD0-A3CFA497E475" }, { "criteria": "cpe:2.3:a:avaya:secure_access_link_gateway:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6528966A-A33C-4AC0-8CD5-927BC19144E5" }, { "criteria": "cpe:2.3:a:avaya:secure_access_link_gateway:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98B73BC2-1881-4D12-AC61-DB666C556156" } ], "operator": "OR" } ] } ]