Command injection in Avaya Session Border Controller for Enterprise

CVE-2020-7034
7.2HIGH

Key Information

Vendor
Avaya
Status
Session Border Controller For Enterprise
Vendor
CVE Published:
23 April 2021

Summary

A command injection vulnerability in Avaya Session Border Controller for Enterprise could allow an authenticated, remote attacker to send specially crafted messages and execute arbitrary commands with the affected system privileges. Affected versions of Avaya Session Border Controller for Enterprise include 7.x, 8.0 through 8.1.1.x

Affected Version(s)

Session Border Controller for Enterprise = 7.x

Session Border Controller for Enterprise <= 8.1.1.x

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: 8.8 to: 7.2 - (HIGH)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.