{"api_version":"1","generated_at":"2026-04-22T23:21:41+00:00","cve":"CVE-2007-3319","urls":{"html":"https://cve.report/CVE-2007-3319","api":"https://cve.report/api/cve/CVE-2007-3319.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-3319","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-3319"},"summary":{"title":"CVE-2007-3319","description":"The Avaya 4602SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware does not use the cnonce parameter in the Authorization header of SIP requests during MD5 digest authentication, which allows remote attackers to conduct man-in-the-middle attacks and hijack or intercept communications.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2007-06-21 18:30:00","updated_at":"2023-11-07 02:00:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://www.sipera.com/index.php?action=resources,threat_advisory&tid=299&","name":"http://www.sipera.com/index.php?action=resources,threat_advisory&tid=299&","refsource":"MISC","tags":["Vendor Advisory"],"title":"Sipera.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=299&","name":"http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=299&","refsource":"","tags":[],"title":"Sipera.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34972","name":"avaya-cnonce-call-hijacking(34972)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/38115","name":"38115","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"ASA-2007-263 (VIPER-2007-046, VIPER-2007-047, VIPER-2007-048, VIPER-2007-049)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25747","name":"25747","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Avaya 4602SW SIP Phone Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/24539","name":"24539","refsource":"BID","tags":[],"title":"Avaya 4602SW SIP Phone Cnonce Parameter Authentication Spoofing Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-3319","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3319","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"3319","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"avaya","cpe5":"4602sw_ip_phone","cpe6":"r2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"3319","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"avaya","cpe5":"4602sw_ip_phone","cpe6":"r2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-3319","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Avaya 4602SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware does not use the cnonce parameter in the Authorization header of SIP requests during MD5 digest authentication, which allows remote attackers to conduct man-in-the-middle attacks and hijack or intercept communications."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.sipera.com/index.php?action=resources,threat_advisory&tid=299&","refsource":"MISC","url":"http://www.sipera.com/index.php?action=resources,threat_advisory&tid=299&"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-263.htm"},{"name":"38115","refsource":"OSVDB","url":"http://osvdb.org/38115"},{"name":"avaya-cnonce-call-hijacking(34972)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34972"},{"name":"25747","refsource":"SECUNIA","url":"http://secunia.com/advisories/25747"},{"name":"24539","refsource":"BID","url":"http://www.securityfocus.com/bid/24539"}]}},"nvd":{"publishedDate":"2007-06-21 18:30:00","lastModifiedDate":"2023-11-07 02:00:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:h:avaya:4602sw_ip_phone:r2.2:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"3319","Ordinal":"25951","Title":"CVE-2007-3319","CVE":"CVE-2007-3319","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"3319","Ordinal":"1","NoteData":"The Avaya 4602SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware does not use the cnonce parameter in the Authorization header of SIP requests during MD5 digest authentication, which allows remote attackers to conduct man-in-the-middle attacks and hijack or intercept communications.","Type":"Description","Title":null},{"CveYear":"2007","CveId":"3319","Ordinal":"2","NoteData":"2007-06-21","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"3319","Ordinal":"3","NoteData":"2017-07-28","Type":"Other","Title":"Modified"}]}}}