First published: Thu Aug 08 2024(Updated: )
A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the Avaya Aura System Manager database. Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.
Credit: securityalerts@avaya.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura System Manager | >=10.1<=10.1.2 | |
Avaya Aura System Manager | =10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7477 has a high severity rating due to its potential to allow unauthorized command execution in the Avaya Aura System Manager database by users with administrative privileges.
To fix CVE-2024-7477, upgrade the Avaya Aura System Manager to a patched version that is not vulnerable, specifically one beyond version 10.2.
CVE-2024-7477 affects the Avaya Aura System Manager versions 10.1.x.x and 10.2.x.x.
CVE-2024-7477 requires administrative access, so it cannot be exploited remotely by unauthorized users.
If immediate patching is not possible for CVE-2024-7477, limit administrative access and monitor database logs for unusual query activity.