First published: Mon Mar 30 2020(Updated: )
The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the CTI server on port 8888. A remote unauthenticated attacker can invoke the challenge action with a crafted username and discover user passwords.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Ucm6202 Firmware | <1.0.20.22 | |
Grandstream Ucm6202 | ||
Grandstream Ucm6204 Firmware | <1.0.20.22 | |
Grandstream UCM6204 | ||
Grandstream Ucm6208 Firmware | <1.0.20.22 | |
Grandstream Ucm6208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5726 is a vulnerability in the Grandstream UCM6200 series firmware before 1.0.20.22 that allows remote attackers to perform SQL injection via the CTI server on port 8888.
An attacker can exploit CVE-2020-5726 by invoking the challenge action with a crafted username and discovering user passwords.
CVE-2020-5726 has a severity rating of 7.5 (high).
The Grandstream UCM6200 firmware versions up to 1.0.20.22 are affected by CVE-2020-5726.
No, the Grandstream UCM6202, UCM6204, and UCM6208 devices are not vulnerable to CVE-2020-5726.