ID

VAR-201907-0221


CVE

CVE-2019-12326


TITLE

Akuvox R50P VoIP phone Vulnerable to unlimited upload of dangerous types of files

Trust: 0.8

sources: JVNDB: JVNDB-2019-007218

DESCRIPTION

Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution. Akuvox R50P VoIP phone Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AKUVOX NETWORKS R50P VoIP phone is an IP phone from China AKUVOX NETWORKS. This vulnerability stems from the lack of validation of files and paths that an attacker can use to upload script files

Trust: 2.34

sources: NVD: CVE-2019-12326 // JVNDB: JVNDB-2019-007218 // CNVD: CNVD-2019-26046 // VULHUB: VHN-144061 // VULMON: CVE-2019-12326

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-26046

AFFECTED PRODUCTS

vendor:akuvoxmodel:sp-r50pscope:eqversion:50.0.6.156

Trust: 1.8

vendor:akuvoxmodel:networks akuvox networks r50p voip phonescope:eqversion:50.0.6.156

Trust: 0.6

sources: CNVD: CNVD-2019-26046 // JVNDB: JVNDB-2019-007218 // NVD: CVE-2019-12326

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12326
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2019-12326
value: HIGH

Trust: 1.0

NVD: CVE-2019-12326
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-26046
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-1178
value: CRITICAL

Trust: 0.6

VULHUB: VHN-144061
value: HIGH

Trust: 0.1

VULMON: CVE-2019-12326
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-12326
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-26046
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-144061
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-12326
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

cve@mitre.org: CVE-2019-12326
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2019-26046 // VULHUB: VHN-144061 // VULMON: CVE-2019-12326 // JVNDB: JVNDB-2019-007218 // CNNVD: CNNVD-201907-1178 // NVD: CVE-2019-12326 // NVD: CVE-2019-12326

PROBLEMTYPE DATA

problemtype:CWE-434

Trust: 1.9

sources: VULHUB: VHN-144061 // JVNDB: JVNDB-2019-007218 // NVD: CVE-2019-12326

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-1178

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201907-1178

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-007218

PATCH

title:Akuvox SP-R50P Entry-level IP Phoneurl:http://www.akuvox.com/2e663dea-afdf-03f1-58da-730cfd9b8357/1272ef16-f460-f184-7dd2-8b39d87c84e4.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2019-007218

EXTERNAL IDS

db:NVDid:CVE-2019-12326

Trust: 3.2

db:JVNDBid:JVNDB-2019-007218

Trust: 0.8

db:CNNVDid:CNNVD-201907-1178

Trust: 0.7

db:CNVDid:CNVD-2019-26046

Trust: 0.6

db:VULHUBid:VHN-144061

Trust: 0.1

db:VULMONid:CVE-2019-12326

Trust: 0.1

sources: CNVD: CNVD-2019-26046 // VULHUB: VHN-144061 // VULMON: CVE-2019-12326 // JVNDB: JVNDB-2019-007218 // CNNVD: CNNVD-201907-1178 // NVD: CVE-2019-12326

REFERENCES

url:https://www.sit.fraunhofer.de/fileadmin/dokumente/cve/advisory_akuvox_r50p.pdf

Trust: 3.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-12326

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12326

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/434.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-26046 // VULHUB: VHN-144061 // VULMON: CVE-2019-12326 // JVNDB: JVNDB-2019-007218 // CNNVD: CNNVD-201907-1178 // NVD: CVE-2019-12326

SOURCES

db:CNVDid:CNVD-2019-26046
db:VULHUBid:VHN-144061
db:VULMONid:CVE-2019-12326
db:JVNDBid:JVNDB-2019-007218
db:CNNVDid:CNNVD-201907-1178
db:NVDid:CVE-2019-12326

LAST UPDATE DATE

2024-11-23T22:44:57.438000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-26046date:2019-08-06T00:00:00
db:VULHUBid:VHN-144061date:2019-10-09T00:00:00
db:VULMONid:CVE-2019-12326date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2019-007218date:2019-08-05T00:00:00
db:CNNVDid:CNNVD-201907-1178date:2019-08-05T00:00:00
db:NVDid:CVE-2019-12326date:2024-11-21T04:22:37.380

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-26046date:2019-08-06T00:00:00
db:VULHUBid:VHN-144061date:2019-07-22T00:00:00
db:VULMONid:CVE-2019-12326date:2019-07-22T00:00:00
db:JVNDBid:JVNDB-2019-007218date:2019-08-05T00:00:00
db:CNNVDid:CNNVD-201907-1178date:2019-07-22T00:00:00
db:NVDid:CVE-2019-12326date:2019-07-22T17:15:38.997