{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T19:09:21.759","vulnerabilities":[{"cve":{"id":"CVE-2020-7037","sourceIdentifier":"securityalerts@avaya.com","published":"2021-04-28T22:15:08.250","lastModified":"2024-11-21T05:36:31.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An XML External Entities (XXE) vulnerability in Media Server component of Avaya Equinox Conferencing could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system or even potentially lead to a denial of service. The affected versions of Avaya Equinox Conferencing includes all 9.x versions before 9.1.11. Equinox Conferencing is now offered as Avaya Meetings Server."},{"lang":"es","value":"Una vulnerabilidad XML External Entities (XXE) en el componente Media Server de Avaya Equinox Conferencing  que podría permitir a un atacante remoto autenticado conseguir acceso de lectura a la información almacenada en un sistema afectado o incluso potencialmente conllevar a una denegación de servicio.&#xa0;Las versiones afectadas de Avaya Equinox Conferencing incluyen todas las versiones 9.x anteriores a 9.1.11.&#xa0;Equinox Conferencing ahora se ofrece como Avaya Meetings Server"}],"metrics":{"cvssMetricV31":[{"source":"securityalerts@avaya.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:P","baseScore":5.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"securityalerts@avaya.com","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avaya:equinox_conferencing:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.1.11","matchCriteriaId":"C123C83E-6FEB-482D-9ADB-21B4248F7977"}]}]}],"references":[{"url":"https://support.avaya.com/css/P8/documents/101075574","source":"securityalerts@avaya.com","tags":["Vendor Advisory"]},{"url":"https://support.avaya.com/css/P8/documents/101075574","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}