Description
An Improper access control vulnerability was found in Avaya Aura System Manager which could allow a command-line interface (CLI) user with administrative privileges to read arbitrary files on the system. Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
- Attack Vector
- local
- Complexity
- low
- Privileges
- high
- User Action
- required
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-266NVD-CWE-noinfo
Metadata
- Primary Vendor
- AVAYA
- Published
- 8/8/2024
- Last Modified
- 10/1/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
avaya : aura_system_manageravaya : aura_system_manager
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.