The Avaya 4602SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware does not use the cnonce parameter in the Authorization header of SIP requests during MD5 digest authentication, which allows remote attackers to conduct man-in-the-middle attacks and hijack or intercept communications.
References
Configurations
History
21 Nov 2024, 00:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/38115 - | |
References | () http://secunia.com/advisories/25747 - Vendor Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/24539 - | |
References | () http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=299& - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34972 - |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2007-06-21 18:30
Updated : 2024-11-21 00:32
NVD link : CVE-2007-3319
Mitre link : CVE-2007-3319
CVE.ORG link : CVE-2007-3319
JSON object : View
Products Affected
avaya
- 4602sw_ip_phone
CWE