First published: Fri Jul 17 2020(Updated: )
Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted "unset" command.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Ucm6202 Firmware | <=1.0.20.23 | |
Grandstream Ucm6202 | ||
Grandstream Ucm6204 Firmware | <=1.0.20.23 | |
Grandstream UCM6204 | ||
Grandstream Ucm6208 Firmware | <=1.0.20.23 | |
Grandstream Ucm6208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Grandstream UCM6200 series firmware vulnerability is CVE-2020-5759.
The severity rating of CVE-2020-5759 is 9.8 (Critical).
An authenticated remote attacker can exploit CVE-2020-5759 by issuing a specially crafted "unset" command via SSH, allowing them to execute commands as the root user.
Grandstream UCM6200 series firmware versions 1.0.20.23 and below are vulnerable to CVE-2020-5759.
You can find more information about CVE-2020-5759 at the following references: [Link 1](https://www.tenable.com/cve/CVE-2020-5759) and [Link 2](https://www.tenable.com/security/research/tra-2020-42).