First published: Fri Apr 21 2017(Updated: )
The com.softphone.common package in the Grandstream Wave app 1.0.1.26 and earlier for Android does not properly validate SSL certificates, which allows man-in-the-middle attackers to spoof the Grandstream provisioning server via a crafted certificate.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Wave | <=1.0.1.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1519 is classified as a high severity vulnerability due to its potential for man-in-the-middle attacks.
To mitigate CVE-2016-1519, update the Grandstream Wave app to version 1.0.1.27 or later, where SSL certificate validation is properly implemented.
CVE-2016-1519 affects the Grandstream Wave app version 1.0.1.26 and earlier for Android devices.
CVE-2016-1519 can lead to man-in-the-middle attacks, allowing attackers to spoof the Grandstream provisioning server.
CVE-2016-1519 is specifically associated with the Android platform and the Grandstream Wave application.