Learn about CVE-2020-7029, a CSRF vulnerability in Avaya Aura Communication Manager and Messaging, allowing remote attackers to perform unauthorized actions. Find mitigation steps and patching details here.
A Cross-Site Request Forgery (CSRF) vulnerability in Avaya Aura Communication Manager and Avaya Aura Messaging could allow remote attackers to perform unauthorized actions.
Understanding CVE-2020-7029
What is CVE-2020-7029?
This CVE identifies a CSRF vulnerability in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging, potentially enabling unauthenticated remote attackers to execute Web administration actions with the privileges of authenticated users.
The Impact of CVE-2020-7029
The vulnerability has a CVSS base score of 6.4, indicating a medium severity issue with high integrity impact but low confidentiality and availability impacts. The attack complexity is high, requiring user interaction over a network.
Technical Details of CVE-2020-7029
Vulnerability Description
The CSRF vulnerability in Avaya products allows unauthorized remote attackers to exploit the System Management Interface Web component, posing a security risk to affected systems.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited remotely by unauthenticated attackers to manipulate Web administration actions using the credentials of authenticated users.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Avaya has released patches to fix the CSRF vulnerability in affected versions of Avaya Aura Communication Manager and Avaya Aura Messaging.