First published: Mon Mar 29 2021(Updated: )
Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allow Authentication Bypass in its administrative web interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Grp2612 Firmware | =1.0.3.6 | |
Grandstream Grp2612 | ||
Grandstream Grp2612p Firmware | =1.0.3.6 | |
Grandstream Grp2612p | ||
Grandstream Grp2612w Firmware | =1.0.3.6 | |
Grandstream Grp2612w | ||
Grandstream Grp2613 Firmware | =1.0.3.6 | |
Grandstream Grp2613 | ||
Grandstream Grp2614 Firmware | =1.0.3.6 | |
Grandstream Grp2614 | ||
Grandstream Grp2615 Firmware | =1.0.3.6 | |
Grandstream Grp2615 | ||
Grandstream Grp2616 Firmware | =1.0.3.6 | |
Grandstream Grp2616 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Grandstream VoIP phone firmware version 1.0.3.6 is CVE-2020-25218.
The severity level of CVE-2020-25218 is critical (9.8).
CVE-2020-25218 allows Authentication Bypass in the administrative web interface of Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base).
To fix CVE-2020-25218, you should update the firmware of your Grandstream GRP261x VoIP phone to a version that addresses the vulnerability.
You can find more information about CVE-2020-25218 at the following references: [link1](https://cwe.mitre.org/data/definitions/306.html), [link2](https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0002/FEYE-2021-0002.md).