← Volver a CVEs
CVE-2020-5722
CRITICALCISA KEV9.8
Descripcion
The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/23/2020
Ultima modificacion10/31/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorGrandstream
ProductoUCM6200
Nombre vulnerabilidadGrandstream Networks UCM6200 Series SQL Injection Vulnerability
Fecha inclusion KEV2022-01-28
Fecha limite remediacion2022-07-28
Uso en ransomwareUnknown
Productos afectados
grandstream:ucm6200grandstream:ucm6200_firmware
Debilidades (CWE)
CWE-89CWE-89
Referencias
http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html(vulnreport@tenable.com)
http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html(vulnreport@tenable.com)
https://www.tenable.com/security/research/tra-2020-15(vulnreport@tenable.com)
http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/research/tra-2020-15(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-5722(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.