First published: Thu Sep 23 2010(Updated: )
The CCAgent option 9.0.8.4 and earlier in the management server (aka TSA) component in Alcatel-Lucent OmniTouch Contact Center Standard Edition relies on client-side authorization checking, and unconditionally sends the SuperUser password to the client for use during an authorized session, which allows remote attackers to monitor or reconfigure Contact Center operations via a modified client application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel-Lucent CCagent | <=8.0 | |
Alcatel-Lucent CCagent | =7.1 | |
Alcatel-Lucent OmniTouch Contact Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3280 is considered a critical vulnerability due to its potential for unauthorized access to sensitive credentials.
To mitigate CVE-2010-3280, upgrade to a version of CCAgent that addresses this vulnerability beyond 9.0.8.4.
CVE-2010-3280 affects Alcatel-Lucent CCAgent versions 8.0 and earlier, as well as OmniTouch Contact Center Standard Edition.
No, client-side authorization is not secure in CVE-2010-3280 as it relies on insufficient checks leading to exposure of credentials.
CVE-2010-3280 can lead to unauthorized users gaining access to SuperUser permissions, potentially compromising the system.