First published: Mon Mar 30 2020(Updated: )
The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the HTTP server's websockify endpoint. A remote unauthenticated attacker can invoke the login action with a crafted username and, through the use of timing attacks, can discover user passwords.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Ucm6202 Firmware | <1.0.20.22 | |
Grandstream Ucm6202 | ||
Grandstream Ucm6204 Firmware | <1.0.20.22 | |
Grandstream UCM6204 | ||
Grandstream Ucm6208 Firmware | <1.0.20.22 | |
Grandstream Ucm6208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-5725.
The severity of CVE-2020-5725 is medium with a score of 5.9.
The Grandstream UCM6200 series before 1.0.20.22 firmware versions are affected by CVE-2020-5725.
An attacker can exploit CVE-2020-5725 by invoking the login action with a crafted username using the websockify endpoint of the HTTP server, and through the use of timing attacks, discover user passwords.
The Grandstream UCM6202, UCM6204, and UCM6208 devices are not vulnerable to CVE-2020-5725.