Vulnerability Details : CVE-2018-15611
A vulnerability in the local system administration component of Avaya Aura Communication Manager can allow an authenticated, privileged user on the local system to gain root privileges. Affected versions include 6.3.x and all 7.x version prior to 7.1.3.1.
Vulnerability category: BypassGain privilege
Products affected by CVE-2018-15611
- Avaya » Aura Communication ManagerVersions from including (>=) 6.3.0.1 and up to, including, (<=) 6.3.17.0cpe:2.3:a:avaya:aura_communication_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_communication_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-15611
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-15611
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST | |
6.3
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H |
0.3
|
5.9
|
Avaya, Inc. |
CWE ids for CVE-2018-15611
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: securityalerts@avaya.com (Secondary)
References for CVE-2018-15611
-
https://downloads.avaya.com/css/P8/documents/101052550
ASA-2017-343 (CVE-2018-15611)Vendor Advisory
Jump to