{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T16:47:07.942","vulnerabilities":[{"cve":{"id":"CVE-2021-25649","sourceIdentifier":"securityalerts@avaya.com","published":"2021-06-24T09:15:10.683","lastModified":"2024-11-21T05:55:12.963","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"securityalerts@avaya.com","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Utility Services. This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects all 7.x versions of Avaya Aura Utility Services"},{"lang":"es","value":"** NO COMPATIBLE CUANDO SE ASIGNÓ ** Se ha detectado una vulnerabilidad de divulgación de información en la administración de directorios y archivos de Avaya Aura Utility Services. Esta vulnerabilidad podría permitir potencialmente a cualquier usuario local acceder a la funcionalidad del sistema y a la información de configuración que sólo debería estar disponible para un usuario con privilegios. Afecta a todas las versiones 7.x de Avaya Aura Utility Services"}],"metrics":{"cvssMetricV31":[{"source":"securityalerts@avaya.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"securityalerts@avaya.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avaya:aura_utility_services:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0","versionEndIncluding":"7.1.3","matchCriteriaId":"E8D5F626-3A36-409F-B3FE-18A35EC99BAB"}]}]}],"references":[{"url":"https://support.avaya.com/css/P8/documents/101072728","source":"securityalerts@avaya.com","tags":["Vendor Advisory"]},{"url":"https://support.avaya.com/css/P8/documents/101072728","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}