First published: Mon Aug 25 2008(Updated: )
The SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, writes account names and passwords to the (1) alarm and (2) system logs during failed login attempts, which allows local users to obtain login credentials by reading these logs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura SIP Enablement Services | =5.0 | |
Avaya S8300 | ||
Avaya Aura Communication Manager | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3777 is a security vulnerability in Avaya SIP Enablement Services 5.0 that exposes account names and passwords in system logs during failed login attempts.
CVE-2008-3777 is considered to have a moderate severity due to potential exposure of sensitive login credentials.
To fix CVE-2008-3777, it is recommended to upgrade to a patched version of Avaya SIP Enablement Services or Communication Manager that does not log sensitive information.
CVE-2008-3777 affects users of Avaya SIP Enablement Services 5.0 and Communication Manager 5.0 on the S8300C server configuration.
The risks associated with CVE-2008-3777 include unauthorized access to sensitive account login information by local users, increasing the likelihood of credential compromise.