ID

VAR-201907-0424


CVE

CVE-2019-12325


TITLE

Htek UC902 VoIP phone Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2019-006649 // CNNVD: CNNVD-201907-1173

DESCRIPTION

The Htek UC902 VoIP phone web management interface contains several buffer overflow vulnerabilities in the firmware version 2.0.4.4.46, which allow an attacker to crash the device (DoS) without authentication or execute code (authenticated as a user) to spawn a remote shell as a root user. Htek UC902 VoIP phone Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HtekUC902VoIPphone is an IP phone from China's Hantek Technology (Htek). A buffer overflow vulnerability exists in the web management interface in the HtekUC902 VoIPphone using firmware version 2.0.4.4.46. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow

Trust: 2.25

sources: NVD: CVE-2019-12325 // JVNDB: JVNDB-2019-006649 // CNVD: CNVD-2019-23997 // VULHUB: VHN-144060

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-23997

AFFECTED PRODUCTS

vendor:htekmodel:uc902scope:eqversion:2.0.4.4.46

Trust: 1.8

vendor:htekmodel:uc902 voip phonescope:eqversion:2.0.4.4.46

Trust: 0.6

sources: CNVD: CNVD-2019-23997 // JVNDB: JVNDB-2019-006649 // NVD: CVE-2019-12325

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12325
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2019-12325
value: HIGH

Trust: 1.0

NVD: CVE-2019-12325
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-23997
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-1173
value: HIGH

Trust: 0.6

VULHUB: VHN-144060
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-12325
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-23997
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-144060
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-12325
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2019-12325
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 2.3
impactScore: 5.3
version: 3.0

Trust: 1.0

NVD: CVE-2019-12325
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-23997 // VULHUB: VHN-144060 // JVNDB: JVNDB-2019-006649 // CNNVD: CNNVD-201907-1173 // NVD: CVE-2019-12325 // NVD: CVE-2019-12325

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-144060 // JVNDB: JVNDB-2019-006649 // NVD: CVE-2019-12325

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-1173

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201907-1173

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006649

PATCH

title:UC902 Enterprise IP Phoneurl:http://www.htek.com/products/UC900_Series/uc902/details/index.html

Trust: 0.8

sources: JVNDB: JVNDB-2019-006649

EXTERNAL IDS

db:NVDid:CVE-2019-12325

Trust: 3.1

db:JVNDBid:JVNDB-2019-006649

Trust: 0.8

db:CNNVDid:CNNVD-201907-1173

Trust: 0.7

db:CNVDid:CNVD-2019-23997

Trust: 0.6

db:VULHUBid:VHN-144060

Trust: 0.1

sources: CNVD: CNVD-2019-23997 // VULHUB: VHN-144060 // JVNDB: JVNDB-2019-006649 // CNNVD: CNNVD-201907-1173 // NVD: CVE-2019-12325

REFERENCES

url:https://www.sit.fraunhofer.de/fileadmin/dokumente/cve/advisory_htek_uc902.pdf

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-12325

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12325

Trust: 0.8

sources: CNVD: CNVD-2019-23997 // VULHUB: VHN-144060 // JVNDB: JVNDB-2019-006649 // CNNVD: CNNVD-201907-1173 // NVD: CVE-2019-12325

SOURCES

db:CNVDid:CNVD-2019-23997
db:VULHUBid:VHN-144060
db:JVNDBid:JVNDB-2019-006649
db:CNNVDid:CNNVD-201907-1173
db:NVDid:CVE-2019-12325

LAST UPDATE DATE

2024-11-23T22:06:08.520000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-23997date:2019-07-24T00:00:00
db:VULHUBid:VHN-144060date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2019-006649date:2019-07-24T00:00:00
db:CNNVDid:CNNVD-201907-1173date:2022-04-19T00:00:00
db:NVDid:CVE-2019-12325date:2024-11-21T04:22:37.237

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-23997date:2019-07-24T00:00:00
db:VULHUBid:VHN-144060date:2019-07-22T00:00:00
db:JVNDBid:JVNDB-2019-006649date:2019-07-24T00:00:00
db:CNNVDid:CNNVD-201907-1173date:2019-07-22T00:00:00
db:NVDid:CVE-2019-12325date:2019-07-22T16:15:11.660