CVE-2024-7477

6.5 MEDIUM

📋 TL;DR

A SQL injection vulnerability in Avaya Aura System Manager allows CLI users with administrative privileges to execute arbitrary database queries. This affects versions 10.1.x.x and 10.2.x.x, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • Avaya Aura System Manager
Versions: 10.1.x.x and 10.2.x.x
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Versions prior to 10.1 are end of manufacturer support but may still be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator credentials could be used to execute arbitrary SQL commands, leading to full database compromise, data exfiltration, or system takeover.

🟠

Likely Case

Privileged users could unintentionally or maliciously execute unauthorized queries, potentially exposing sensitive configuration data or disrupting operations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrative actions within expected boundaries.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative CLI access, reducing attack surface but increasing insider threat potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://download.avaya.com/css/public/documents/101091159

Restart Required: Yes

Instructions:

1. Review vendor advisory for specific patch versions. 2. Apply recommended patches from Avaya. 3. Restart affected services as required.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit command line interface access to only essential administrative personnel

Implement Input Validation

all

Add SQL injection prevention controls to CLI input handling

🧯 If You Can't Patch

  • Implement strict access controls to limit CLI administrative access
  • Monitor database query logs for unusual SQL patterns from CLI users

🔍 How to Verify

Check if Vulnerable:

Check System Manager version against affected ranges (10.1.x.x or 10.2.x.x)

Check Version:

Check Avaya System Manager administration interface or documentation for version command

Verify Fix Applied:

Verify version is updated beyond vulnerable ranges and test CLI SQL functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries from CLI sessions
  • Database error logs showing injection attempts

Network Indicators:

  • Unusual database traffic patterns from administrative systems

SIEM Query:

source="avaya_system_manager" AND (sql_query="*DROP*" OR sql_query="*UNION*" OR sql_query="*SELECT*FROM*users*")

🔗 References

📤 Share & Export