250 - Ineraction Center - Security request
closed
Gabor Szabó
In AIC 7.3.10 version the Application-level passwords are discoverable which is highlighted as security risk. The AIC client/application uses a database account to maintain its data. The aicadmin account and its hash is hardcoded in the configuration files (e.g., vesp.imp). Every Vodafone Call Center employee can obtain this information from the files.
The client connects to the database with this account and queries the data of its application-level user. By modifying the network data packets, the logged-in user can learn the password of another user. If the admin password is decrypted, all the application data can be read and modified.
IAUG
marked this post as
closed
This request has not received enough membership support to submit this request to Avaya. If you feel this request is still valid, please resubmit with a strong business case to hopefully secure enough membership support for submittal.