First published: Wed Jul 29 2020(Updated: )
Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to a denial of service attack against the TR-069 service. An unauthenticated remote attacker can stop the service due to a NULL pointer dereference in the TR-069 service. This condition is triggered due to mishandling of the HTTP Authentication field.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grandstream Ht801 Firmware | <=1.0.17.5 | |
Grandstream HT801 | ||
Grandstream Ht802 Firmware | <=1.0.17.5 | |
Grandstream Ht802 | ||
Grandstream Ht812 Firmware | <=1.0.17.5 | |
Grandstream Ht812 | ||
Grandstream Ht814 Firmware | <=1.0.17.5 | |
Grandstream Ht814 | ||
Grandstream Ht818 Firmware | <=1.0.17.5 | |
Grandstream Ht818 | ||
Grandstream Ht813 Firmware | <=1.0.17.5 | |
Grandstream Ht813 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Grandstream firmware issue is CVE-2020-5762.
The severity of CVE-2020-5762 is high with a CVSS score of 7.5.
The vulnerability in Grandstream HT800 series firmware version 1.0.17.5 and below allows an unauthenticated remote attacker to launch a denial of service attack against the TR-069 service, causing it to crash.
An attacker can exploit CVE-2020-5762 by sending specially crafted requests to the TR-069 service, causing a NULL pointer dereference and crashing the service.
Yes, updating the Grandstream HT800 series firmware to version 1.0.17.6 or above will fix this vulnerability.