First published: Wed Jan 17 2024(Updated: )
Insecure Direct Object Reference vulnerabilities were discovered in the Avaya Aura Experience Portal Manager which may allow partial information disclosure to an authenticated non-privileged user. Affected versions include 8.0.x and 8.1.x, prior to 8.1.2 patch 0402. Versions prior to 8.0 are end of manufacturer support.
Credit: securityalerts@avaya.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura Experience Portal | >=8.0.0<8.1.2.0.0402 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7031 is categorized as a low to medium severity vulnerability due to the potential for partial information disclosure to authenticated users.
To mitigate CVE-2023-7031, users should update to Avaya Aura Experience Portal versions 8.1.2 patch 0402 or later.
The affected versions in CVE-2023-7031 are Avaya Aura Experience Portal 8.0.x and 8.1.x prior to 8.1.2 patch 0402.
CVE-2023-7031 is classified as an Insecure Direct Object Reference vulnerability.
Authenticated non-privileged users of Avaya Aura Experience Portal could be at risk of partial information disclosure due to CVE-2023-7031.