First published: Tue Aug 11 2020(Updated: )
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged level of the authenticated user. Affected versions of Communication Manager are 7.0.x, 7.1.x prior to 7.1.3.5 and 8.0.x. Affected versions of Messaging are 7.0.x, 7.1 and 7.1 SP1.
Credit: securityalerts@avaya.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura Communication Manager | >=7.0<=7.1.3.4 | |
Avaya Aura Communication Manager | >=8.0<8.1.0.0 | |
Avaya Aura Messaging | >=7.0<7.1 | |
Avaya Aura Messaging | =7.1 | |
Avaya Aura Messaging | =7.1-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7029 is a Cross-Site Request Forgery (CSRF) vulnerability discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging.
CVE-2020-7029 allows an unauthenticated remote attacker to perform Web administration actions with privileged access, potentially compromising the security of the affected systems.
CVE-2020-7029 has a severity rating of 8.8 (high).
Yes, Avaya has released a fix for CVE-2020-7029. Users are advised to apply the necessary patches or updates provided by Avaya to mitigate this vulnerability.
More information about CVE-2020-7029 can be found on the Avaya support website at https://support.avaya.com/css/P8/documents/101070201.