Command injection in Avaya Session Border Controller for Enterprise
CVE-2020-7034
7.2HIGH
Key Information
- Vendor
- Avaya
- Status
- Session Border Controller For Enterprise
- Vendor
- CVE Published:
- 23 April 2021
Summary
A command injection vulnerability in Avaya Session Border Controller for Enterprise could allow an authenticated, remote attacker to send specially crafted messages and execute arbitrary commands with the affected system privileges. Affected versions of Avaya Session Border Controller for Enterprise include 7.x, 8.0 through 8.1.1.x
Affected Version(s)
Session Border Controller for Enterprise = 7.x
Session Border Controller for Enterprise <= 8.1.1.x
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: 8.8 to: 7.2 - (HIGH)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database