A command injection vulnerability in Avaya Session Border Controller for Enterprise could allow an authenticated, remote attacker to send specially crafted messages and execute arbitrary commands with the affected system privileges. Affected versions of Avaya Session Border Controller for Enterprise include 7.x, 8.0 through 8.1.1.x
References
Link | Resource |
---|---|
https://downloads.avaya.com/css/P8/documents/101075451 | Broken Link Vendor Advisory |
https://downloads.avaya.com/css/P8/documents/101075451 | Broken Link Vendor Advisory |
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 7.2 |
References | () https://downloads.avaya.com/css/P8/documents/101075451 - Broken Link, Vendor Advisory |
Information
Published : 2021-04-23 21:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7034
Mitre link : CVE-2020-7034
CVE.ORG link : CVE-2020-7034
JSON object : View
Products Affected
avaya
- session_border_controller_for_enterprise