ID

VAR-201910-1677


CVE

CVE-2019-12148


TITLE

Sangoma Session Border Controller Authentication vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-011392

DESCRIPTION

The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin web portal without providing any credentials. This affects /var/webconfig/gui/Webconfig.inc.php. Sangoma Technologies SBC is a Border Session Controller (SBC) from Sangoma Technologies of Canada. Sangoma Technologies SBC 2.3.23-119-GA version has a parameter injection vulnerability. An attacker can use this vulnerability to bypass authentication and log in as a non-existent user, and obtain full access to the database, including the creation of authorized users

Trust: 2.16

sources: NVD: CVE-2019-12148 // JVNDB: JVNDB-2019-011392 // CNVD: CNVD-2019-37730

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-37730

AFFECTED PRODUCTS

vendor:sangomamodel:session border controllerscope:eqversion:2.3.23-119-ga

Trust: 1.0

vendor:sangomamodel:session border controllerscope:eqversion:2.3.23-119 ga

Trust: 0.8

vendor:sangomamodel:sbc 2.3.23-119-gascope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-37730 // JVNDB: JVNDB-2019-011392 // NVD: CVE-2019-12148

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12148
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-12148
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-37730
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201910-1234
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-12148
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-37730
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-12148
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-12148
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-37730 // JVNDB: JVNDB-2019-011392 // CNNVD: CNNVD-201910-1234 // NVD: CVE-2019-12148

PROBLEMTYPE DATA

problemtype:CWE-88

Trust: 1.0

problemtype:CWE-287

Trust: 0.8

sources: JVNDB: JVNDB-2019-011392 // NVD: CVE-2019-12148

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201910-1234

TYPE

parameter injection

Trust: 0.6

sources: CNNVD: CNNVD-201910-1234

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-011392

PATCH

title:Session Border Controllersurl:https://www.sangoma.com/voip-security/session-border-controllers/

Trust: 0.8

title:Patch for Sangoma Technologies SBC Parameter Injection Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/187531

Trust: 0.6

title:Sangoma Technologies SBC Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=101248

Trust: 0.6

sources: CNVD: CNVD-2019-37730 // JVNDB: JVNDB-2019-011392 // CNNVD: CNNVD-201910-1234

EXTERNAL IDS

db:PACKETSTORMid:154915

Trust: 3.0

db:NVDid:CVE-2019-12148

Trust: 3.0

db:JVNDBid:JVNDB-2019-011392

Trust: 0.8

db:CNVDid:CNVD-2019-37730

Trust: 0.6

db:CNNVDid:CNNVD-201910-1234

Trust: 0.6

sources: CNVD: CNVD-2019-37730 // JVNDB: JVNDB-2019-011392 // CNNVD: CNNVD-201910-1234 // NVD: CVE-2019-12148

REFERENCES

url:http://packetstormsecurity.com/files/154915/sangoma-sbc-2.3.23-119-ga-authentication-bypass.html

Trust: 3.6

url:http://seclists.org/fulldisclosure/2019/oct/41

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-12148

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12148

Trust: 0.8

sources: CNVD: CNVD-2019-37730 // JVNDB: JVNDB-2019-011392 // CNNVD: CNNVD-201910-1234 // NVD: CVE-2019-12148

CREDITS

Appsecco Security Team

Trust: 0.6

sources: CNNVD: CNNVD-201910-1234

SOURCES

db:CNVDid:CNVD-2019-37730
db:JVNDBid:JVNDB-2019-011392
db:CNNVDid:CNNVD-201910-1234
db:NVDid:CVE-2019-12148

LAST UPDATE DATE

2024-11-23T22:21:24.905000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-37730date:2019-10-29T00:00:00
db:JVNDBid:JVNDB-2019-011392date:2019-11-06T00:00:00
db:CNNVDid:CNNVD-201910-1234date:2020-09-02T00:00:00
db:NVDid:CVE-2019-12148date:2024-11-21T04:22:18.840

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-37730date:2019-10-29T00:00:00
db:JVNDBid:JVNDB-2019-011392date:2019-11-06T00:00:00
db:CNNVDid:CNNVD-201910-1234date:2019-10-18T00:00:00
db:NVDid:CVE-2019-12148date:2019-10-22T16:15:10.797