First published: Tue Oct 22 2019(Updated: )
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin web portal without providing any credentials. This affects /var/webconfig/gui/Webconfig.inc.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sangoma Session Border Controller Firmware | =2.3.23-119-ga | |
Sangoma Session Border Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Sangoma Session Border Controller (SBC) vulnerability is CVE-2019-12148.
The severity of CVE-2019-12148 is critical.
The vulnerability in Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface can allow a remote unauthenticated user to bypass authentication and login into the device's admin.
Sangoma Session Border Controller Firmware version 2.3.23-119 GA is affected by this vulnerability.
No, Sangoma Session Border Controller is not vulnerable to this vulnerability.