Poly VVX 400/410 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://support.polycom.com/content/support.html | Vendor Advisory |
https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://support.polycom.com/content/support.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/140753/Polycom-VVX-Web-Interface-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://support.polycom.com/content/support.html - Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2021-10-04 06:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41322
Mitre link : CVE-2021-41322
CVE.ORG link : CVE-2021-41322
JSON object : View
Products Affected
polycom
- vvx_410_firmware
- vvx_400_firmware
- vvx_400
- vvx_410
CWE