Lucene search

K
cveTenableCVE-2020-5758
HistoryJul 17, 2020 - 9:15 p.m.

CVE-2020-5758

2020-07-1721:15:13
CWE-78
tenable
web.nvd.nist.gov
21
cve-2020-5758
grandstream
ucm6200
firmware
command injection
vulnerability
http
os
remote execution
nvd

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

42.9%

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM’s “Old” HTTPS API.

Affected configurations

Nvd
Node
grandstreamucm6202_firmwareRange1.0.20.23
AND
grandstreamucm6202Match-
Node
grandstreamucm6204_firmwareRange1.0.20.23
AND
grandstreamucm6204Match-
Node
grandstreamucm6208_firmwareRange1.0.20.23
AND
grandstreamucm6208Match-
VendorProductVersionCPE
grandstreamucm6202_firmware*cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*
grandstreamucm6202-cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*
grandstreamucm6204_firmware*cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*
grandstreamucm6204-cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*
grandstreamucm6208_firmware*cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*
grandstreamucm6208-cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Grandstream UCM6200 Series",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Versions 1.0.20.23 and below"
      }
    ]
  }
]

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

42.9%

Related for CVE-2020-5758