Vulnerabilities (CVE)

Filtered by vendor Nec Subscribe
Filtered by product Sv9100
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-20032 1 Nec 8 Sl1100, Sl1100 Firmware, Sl2100 and 5 more 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An attacker with access to an InMail voicemail box equipped with the find me/follow me feature on Aspire-derived NEC PBXes, including all versions of SV8100, SV9100, SL1100 and SL2100 devices, may access the system's administration modem.
CVE-2019-20029 1 Nec 8 Sl1100, Sl1100 Firmware, Sl2100 and 5 more 2024-11-21 6.5 MEDIUM 8.8 HIGH
An exploitable privilege escalation vulnerability exists in the WebPro functionality of Aspire-derived NEC PBXes, including all versions of SV8100, SV9100, SL1100 and SL2100 devices. A specially crafted HTTP POST can cause privilege escalation resulting in a higher privileged account, including an undocumented developer level of access.
CVE-2019-20028 1 Nec 8 Sl1100, Sl1100 Firmware, Sl2100 and 5 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
Aspire-derived NEC PBXes operating InMail software, including all versions of SV8100, SV9100, SL1100 and SL2100 devices allow unauthenticated read-only access to voicemails, greetings, and voice response system content through a system's WebPro administration interface.
CVE-2019-20027 1 Nec 8 Sl1100, Sl1100 Firmware, Sl2100 and 5 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
Aspire-derived NEC PBXes, including the SV8100, SV9100, SL1100 and SL2100 with software releases 7.0 or higher contain the possibility if incorrectly configured to allow a blank username and password combination to be entered as a valid, successfully authenticating account.
CVE-2019-20026 1 Nec 2 Sv9100, Sv9100 Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
The WebPro interface in NEC SV9100 software releases 7.0 or higher allows unauthenticated remote attackers to reset all existing usernames and passwords to default values via a crafted request.
CVE-2019-20025 1 Nec 2 Sv9100, Sv9100 Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
Certain builds of NEC SV9100 software could allow an unauthenticated, remote attacker to log into a device running an affected release with a hardcoded username and password, aka a Static Credential Vulnerability. The vulnerability is due to an undocumented user account with manufacturer privilege level. An attacker could exploit this vulnerability by using this account to remotely log into an affected device. A successful exploit could allow the attacker to log into the device with manufacturer level access. This vulnerability affects SV9100 PBXes that are running software release 6.0 or higher. This vulnerability does not affect SV9100 software releases prior to 6.0.