Executive Summary

Summary
Title Avaya Secure Access Link (SAL) Gateway information disclosure vulnerability
Informations
Name VU#690315 First vendor Publication 2011-07-29
Vendor VU-CERT Last vendor Modification 2011-07-29
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#690315

Avaya Secure Access Link (SAL) Gateway information disclosure vulnerability

Overview

Avaya Secure Access Link (SAL) gateway releases 1.5, 1.8, and 2.0 have an information disclosure vulnerability in the default install.

I. Description

According to Avaya's Product Support Notice PSN003314u [PDF]:

"On installation of SAL Gateway with the default properties provided along with the installer, the Secondary Core Server URL and the Remote Server URL points to the secavaya.com and secaxeda.com respectively which are invalid public domain servers and not owned by Avaya. These servers resolve to invalid domains and pose a security threat. Secondary Core Server URL should be same as the primary Core Server URL and Secondary Remote Server URL should be same as the primary Remote Server URL."

II. Impact

Information from the SAL gateway, such as alarms or logs, may be sent to secavaya.com and secaxeda.com email addresses.

III. Solution

The Avaya Product Support Notice PSN003314u [PDF] states:


"To resolve this problem, please do the following steps:

  1. Login to the SAL Gateway UI with the user having either Security Administrator or Administrator role.
  2. Navigate to the Administration section of the SAL Gateway menu, click on Core Server.
  3. In the Secondary Core Server field, enter the host name same as the primary Core Server hostname for the secondary Secure Access Concentrator Core Server.
  4. In the Port field, enter the port number same as the primary Core Server port number for the secondary Secure Access Concentrator Core Server.
  5. Click on Apply.
  6. Navigate to the Administration section of the SAL Gateway menu, click Remote Server.
  7. In the Secondary Remote Server field, enter the hostname same as the primary Remote Server hostname for the secondary Secure Access Concentrator Remote Server.
  8. In the Port field, enter the port number same as the primary Remote Server port number for the secondary Secure Access Concentrator Remote Server.
  9. Click on Apply.
  10. Logout from the Gateway UI."

Vendor Information

VendorStatusDate NotifiedDate Updated
Avaya, Inc.Affected2011-07-272011-07-28

References

http://support.avaya.com/css/P8/documents/100140483

Credit

Thank you to the reporter who wishes to remain anonymous.

This document was written by Jared Allar.

Other Information

Date Public:2011-05-16
Date First Published:2011-07-29
Date Last Updated:2011-07-29
CERT Advisory: 
CVE-ID(s): 
NVD-ID(s): 
US-CERT Technical Alerts: 
Severity Metric:0.91
Document Revision:11

Original Source

Url : http://www.kb.cert.org/vuls/id/690315

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-16 Configuration

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3

Open Source Vulnerability Database (OSVDB)

Id Description
75202 Avaya Secure Access Link (SAL) Gateway Secondary Server URL Field Remote Info...