Vulnerability Details : CVE-2011-3008
The default configuration of Avaya Secure Access Link (SAL) Gateway 1.5, 1.8, and 2.0 contains certain domain names in the Secondary Core Server URL and Secondary Remote Server URL fields, which allows remote attackers to obtain sensitive information by leveraging administrative access to these domain names, as demonstrated by alarm and log information.
Products affected by CVE-2011-3008
- cpe:2.3:a:avaya:secure_access_link_gateway:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:secure_access_link_gateway:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:secure_access_link_gateway:2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-3008
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-3008
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-3008
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3008
-
http://www.securityfocus.com/bid/48942
Avaya Secure Access Link (SAL) Gateway Invalid Domian Servers Information Disclosure Vulnerability
-
http://support.avaya.com/css/P8/documents/100140483
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/68922
Avaya Secure Access Link gateway infomration disclosure CVE-2011-3008 Vulnerability Report
-
http://www.kb.cert.org/vuls/id/690315
VU#690315 - Avaya Secure Access Link (SAL) Gateway information disclosure vulnerabilityUS Government Resource
Jump to