Vulnerability Details : CVE-2021-25652
An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU.
Vulnerability category: Information leak
Products affected by CVE-2021-25652
- Avaya » Aura Appliance Virtualization PlatformVersions from including (>=) 8.0.0.0 and up to, including, (<=) 8.1.3.1cpe:2.3:a:avaya:aura_appliance_virtualization_platform:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-25652
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-25652
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
Avaya, Inc. |
CWE ids for CVE-2021-25652
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: securityalerts@avaya.com (Secondary)
-
Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack.Assigned by: securityalerts@avaya.com (Secondary)
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-25652
-
https://support.avaya.com/css/P8/documents/101076479
ASA-2021-087Vendor Advisory
Jump to