Show plain JSON{"id": "CVE-2007-3319", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-06-21T18:30:00.000", "references": [{"url": "http://osvdb.org/38115", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25747", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/24539", "source": "cve@mitre.org"}, {"url": "http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=299&", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34972", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/38115", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25747", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/24539", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=299&", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34972", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The Avaya 4602SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware does not use the cnonce parameter in the Authorization header of SIP requests during MD5 digest authentication, which allows remote attackers to conduct man-in-the-middle attacks and hijack or intercept communications."}, {"lang": "es", "value": "El Avaya 4602SW IP Phone (Model 4602D02A) con software empotrado (firmware) 2.2.2 y versiones anteriores no utiliza el par\u00e1metro cnonce en la cabecera de autorizaci\u00f3n de las peticiones SIP durante la autenticaci\u00f3n resumida MD5, lo que permite a atacantes remotos llevar a cabo ataques de \"hombre en medio\" (man-in-the-middle) y secuestrar o interceptar comunicaciones."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:avaya:4602sw_ip_phone:r2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAA771F3-DC59-4DE4-A575-47C9E4C37AD2"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}