Vulnerability Details : CVE-2011-3008
The default configuration of Avaya Secure Access Link (SAL) Gateway 1.5, 1.8, and 2.0 contains certain domain names in the Secondary Core Server URL and Secondary Remote Server URL fields, which allows remote attackers to obtain sensitive information by leveraging administrative access to these domain names, as demonstrated by alarm and log information.
Exploit prediction scoring system (EPSS) score for CVE-2011-3008
Probability of exploitation activity in the next 30 days: 0.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 68 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-3008
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-3008
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3008
-
http://www.securityfocus.com/bid/48942
Avaya Secure Access Link (SAL) Gateway Invalid Domian Servers Information Disclosure Vulnerability
-
http://support.avaya.com/css/P8/documents/100140483
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/68922
Avaya Secure Access Link gateway infomration disclosure CVE-2011-3008 Vulnerability Report
-
http://www.kb.cert.org/vuls/id/690315
VU#690315 - Avaya Secure Access Link (SAL) Gateway information disclosure vulnerabilityUS Government Resource
Products affected by CVE-2011-3008
- cpe:2.3:a:avaya:secure_access_link_gateway:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:secure_access_link_gateway:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:secure_access_link_gateway:2.0:*:*:*:*:*:*:*