5.5

CVE-2020-7030

A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3.

Data is provided by the National Vulnerability Database (NVD)
AvayaIp Office Version >= 10.0 <= 10.1.0.7
AvayaIp Office Version >= 11.0 <= 11.0.4.2
AvayaIp Office Version9.0 Update-
AvayaIp Office Version9.0 Updatesp1
AvayaIp Office Version9.0 Updatesp10
AvayaIp Office Version9.0 Updatesp11
AvayaIp Office Version9.0 Updatesp12
AvayaIp Office Version9.0 Updatesp2
AvayaIp Office Version9.0 Updatesp3
AvayaIp Office Version9.0 Updatesp4
AvayaIp Office Version9.0 Updatesp5
AvayaIp Office Version9.0 Updatesp6
AvayaIp Office Version9.0 Updatesp7
AvayaIp Office Version9.0 Updatesp8
AvayaIp Office Version9.0 Updatesp9
AvayaIp Office Version9.1 Update-
AvayaIp Office Version9.1 Updatesp1
AvayaIp Office Version9.1 Updatesp10
AvayaIp Office Version9.1 Updatesp11
AvayaIp Office Version9.1 Updatesp12
AvayaIp Office Version9.1 Updatesp3
AvayaIp Office Version9.1 Updatesp4
AvayaIp Office Version9.1 Updatesp5
AvayaIp Office Version9.1 Updatesp6
AvayaIp Office Version9.1 Updatesp7
AvayaIp Office Version9.1 Updatesp8
AvayaIp Office Version9.1 Updatesp9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.28% 0.48
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
securityalerts@avaya.com 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.