First published: Fri Jul 17 2020(Updated: )
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream UCM Series IP PBX | <=1.0.20.23 | |
Grandstream UCM Series IP PBX | ||
Grandstream UCM Series IP PBX | <=1.0.20.23 | |
Grandstream UCM Series IP PBX | ||
Grandstream UCM Series IP PBX | <=1.0.20.23 | |
Grandstream UCM Series IP PBX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5757 is a vulnerability in the Grandstream UCM6200 series firmware that allows an authenticated remote attacker to execute commands as the root user.
CVE-2020-5757 has a severity rating of 9.8, which is considered critical.
CVE-2020-5757 exploits an OS command injection vulnerability via HTTP in the Grandstream UCM6200 series firmware.
Grandstream UCM6200 firmware version 1.0.20.23 and below are affected by CVE-2020-5757.
Yes, the Grandstream UCM6202 firmware version 1.0.20.23 and below are vulnerable to CVE-2020-5757.