First published: Tue Jun 25 2024(Updated: )
An improper input validation vulnerability was discovered in Avaya IP Office that could allow remote command or code execution via a specially crafted web request to the Web Control component. Affected versions include all versions prior to 11.1.3.1.
Credit: securityalerts@avaya.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya IP Office | <11.1.3.1 | |
Avaya IP Office | <11.1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4196 has a high severity level due to the potential for remote command or code execution.
To mitigate CVE-2024-4196, update your Avaya IP Office software to version 11.1.3.1 or later.
All versions of Avaya IP Office prior to 11.1.3.1 are affected by CVE-2024-4196.
CVE-2024-4196 can facilitate remote command or code execution attacks via specially crafted web requests.
There are currently no documented workarounds for CVE-2024-4196; updating the software is recommended.