Lucene search

K
nessusTenable700492.PRM
HistoryApr 05, 2019 - 12:00 a.m.

Grandstream IP PBX Appliance UCM6204 < 1.0.19.20 RCE

2019-04-0500:00:00
Tenable
www.tenable.com
20

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.3%

The remote host is running a Grandstream UCM6204 IP PBX, firmware version prior to 1.0.19.20, and is therefore affected by a RCE attack vector. An attacker can exploit a blind command injection vulnerability in the “file-backup” parameter of the ‘backupUCMConfig’ API call allowing the execution of arbitrary code. (CVE-2019-10662) A vulnerability allows remote authenticated users to conduct SQL injection attacks via the sord parameter in a listCodeblueGroup API call to the ‘/cgi?’ URI. (CVE-2019-10663)

Binary data 700492.prm

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.3%