First published: Thu Aug 08 2024(Updated: )
An Improper access control vulnerability was found in Avaya Aura System Manager which could allow a command-line interface (CLI) user with administrative privileges to read arbitrary files on the system. Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.
Credit: securityalerts@avaya.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura System Manager | >=10.1<=10.1.2 | |
Avaya Aura System Manager | =10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7480 has a medium severity rating due to the improper access control allowing CLI users to read arbitrary files.
To fix CVE-2024-7480, upgrade Avaya Aura System Manager to version 10.2 or later.
CVE-2024-7480 affects Avaya Aura System Manager versions 10.1.x.x and 10.2.x.x.
CVE-2024-7480 poses a risk by potentially allowing unauthorized access to sensitive files by users with administrative privileges.
There are no official workarounds for CVE-2024-7480; updating to a secure version is the recommended action.