Avaya Cajun P550R/P580/P880/P882 up to 5.2.14 Default Password improper authentication
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.3 | $0-$5k | 0.00 |
A vulnerability classified as critical has been found in Avaya Cajun P550R, P580, P880 and P882 up to 5.2.14. Affected is some unknown processing of the component Default Password. The manipulation with an unknown input leads to a improper authentication vulnerability. CWE is classifying the issue as CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Avaya Cajun switches P880, P882, P580, and P550R 5.2.14 and earlier contain undocumented accounts (1) manuf and (2) diag with default passwords, which allows remote attackers to gain privileges.
The bug was discovered 10/15/2002. The weakness was released 10/28/2002 as confirmed advisory (CERT.org). The advisory is shared for download at kb.cert.org. This vulnerability is traded as CVE-2002-1229. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 13 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 10264 (SNMP Agent Default Community Names), which helps to determine the existence of the flaw in a target environment. It is assigned to the family SNMP and running in the context r.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (10374) and Tenable (10264). Entries connected to this vulnerability are available at 4154, 14201, 14216 and 14230.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.3
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 10264
Nessus Name: SNMP Agent Default Community Names
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 802243
OpenVAS Name: Report default community names of the SNMP Agent
OpenVAS File: 🔍
OpenVAS Family: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
10/15/2002 🔍10/15/2002 🔍
10/28/2002 🔍
10/28/2002 🔍
10/28/2002 🔍
11/25/2002 🔍
12/09/2004 🔍
07/30/2014 🔍
06/28/2021 🔍
Sources
Vendor: avaya.comAdvisory: kb.cert.org
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2002-1229 (🔍)
X-Force: 10374
Vulnerability Center: 6353 - Avaya Cajun Firmware Allows Gaining Unauthorized Administrative Access via Default Password, High
SecurityFocus: 5965 - Avaya Cajun Firmware Undocumented Default Accounts Vulnerability
OSVDB: 10860 - Avaya - Cajun - Firmware - Undocumented Default Accounts Vulnerability
See also: 🔍
Entry
Created: 07/30/2014 18:11Updated: 06/28/2021 07:57
Changes: 07/30/2014 18:11 (71), 06/04/2019 10:09 (3), 06/28/2021 07:57 (3)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.