Show plain JSON{"id": "CVE-2021-25657", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "securityalerts@avaya.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2022-09-02T01:15:07.357", "references": [{"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md", "tags": ["Exploit", "Third Party Advisory"], "source": "securityalerts@avaya.com"}, {"url": "https://support.avaya.com/css/P8/documents/101083319", "tags": ["Patch", "Vendor Advisory"], "source": "securityalerts@avaya.com"}, {"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0037/MNDT-2022-0037.md", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.avaya.com/css/P8/documents/101083319", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "securityalerts@avaya.com", "description": [{"lang": "en", "value": "CWE-269"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions."}, {"lang": "es", "value": "Se ha detectado una vulnerabilidad de escalada de privilegios en Avaya IP Office Admin Lite y USB Creator que podr\u00eda permitir a un usuario local escalar privilegios. Este problema afecta a Admin Lite y USB Creator versi\u00f3n 11.1 Feature Pack 2 Service Pack 1 y versiones anteriores"}], "lastModified": "2024-11-21T05:55:14.037", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A85DBDAD-4D2A-43EF-A487-AC5A1AAB8766", "versionEndExcluding": "11.1"}, {"criteria": "cpe:2.3:a:avaya:ip_office:11.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26753680-2F84-40F7-87FD-5B5D63B2F5C5"}, {"criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F3B61F2-3809-4001-BC62-2CAB62E363EF"}, {"criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack1_service_pack1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "696C872E-B4C4-49BA-ABCD-03BC2451EBDC"}, {"criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C621F009-9229-4F67-8EB1-4DCB31F553F1"}, {"criteria": "cpe:2.3:a:avaya:ip_office:11.1:feature_pack2_service_pack1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F69EDA65-AD4A-42D6-8AD0-0FF09142E183"}], "operator": "OR"}]}], "sourceIdentifier": "securityalerts@avaya.com"}