The default configuration of Avaya Secure Access Link (SAL) Gateway 1.5, 1.8, and 2.0 contains certain domain names in the Secondary Core Server URL and Secondary Remote Server URL fields, which allows remote attackers to obtain sensitive information by leveraging administrative access to these domain names, as demonstrated by alarm and log information.
References
Link | Resource |
---|---|
http://support.avaya.com/css/P8/documents/100140483 | Vendor Advisory |
http://www.kb.cert.org/vuls/id/690315 | US Government Resource |
http://www.securityfocus.com/bid/48942 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68922 | |
http://support.avaya.com/css/P8/documents/100140483 | Vendor Advisory |
http://www.kb.cert.org/vuls/id/690315 | US Government Resource |
http://www.securityfocus.com/bid/48942 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68922 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.avaya.com/css/P8/documents/100140483 - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/690315 - US Government Resource | |
References | () http://www.securityfocus.com/bid/48942 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/68922 - |
Information
Published : 2011-08-05 21:55
Updated : 2024-11-21 01:29
NVD link : CVE-2011-3008
Mitre link : CVE-2011-3008
CVE.ORG link : CVE-2011-3008
JSON object : View
Products Affected
avaya
- secure_access_link_gateway
CWE
CWE-16
Configuration