← Zuruck zu CVEs
CVE-2020-5722
CRITICALCISA KEV9.8
Beschreibung
The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/23/2020
Zuletzt geandert10/31/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerGrandstream
ProduktUCM6200
SchwachstellennameGrandstream Networks UCM6200 Series SQL Injection Vulnerability
KEV Aufnahmedatum2022-01-28
Behebungsfrist2022-07-28
Ransomware-NutzungUnknown
Betroffene Produkte
grandstream:ucm6200grandstream:ucm6200_firmware
Schwachen (CWE)
CWE-89CWE-89
Referenzen
http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html(vulnreport@tenable.com)
http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html(vulnreport@tenable.com)
https://www.tenable.com/security/research/tra-2020-15(vulnreport@tenable.com)
http://packetstormsecurity.com/files/156876/UCM6202-1.0.18.13-Remote-Command-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/165708/Grandstream-UCM62xx-IP-PBX-sendPasswordEmail-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/research/tra-2020-15(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-5722(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.