ID

VAR-202007-1330


CVE

CVE-2020-5757


TITLE

Grandstream UCM6200 In series firmware OS Command injection vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-008265

DESCRIPTION

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API. (DoS) It may be put into a state. Grandstream UCM6200 is a set of enterprise-level switches used for IP telephone communications from Grandstream

Trust: 2.16

sources: NVD: CVE-2020-5757 // JVNDB: JVNDB-2020-008265 // CNVD: CNVD-2020-44351

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-44351

AFFECTED PRODUCTS

vendor:grandstreammodel:ucm6208scope:lteversion:1.0.20.23

Trust: 1.0

vendor:grandstreammodel:ucm6202scope:lteversion:1.0.20.23

Trust: 1.0

vendor:grandstreammodel:ucm6204scope:lteversion:1.0.20.23

Trust: 1.0

vendor:grandstreammodel:ucm6202scope:eqversion:1.0.20.23

Trust: 0.8

vendor:grandstreammodel:ucm6204scope:eqversion:1.0.20.23

Trust: 0.8

vendor:grandstreammodel:ucm6208scope:eqversion:1.0.20.23

Trust: 0.8

vendor:grandstreammodel:ucm6200 seriesscope:lteversion:<=1.0.20.23

Trust: 0.6

sources: CNVD: CNVD-2020-44351 // JVNDB: JVNDB-2020-008265 // NVD: CVE-2020-5757

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5757
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-008265
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-44351
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202007-1287
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-5757
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-008265
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-44351
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-5757
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-008265
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-44351 // JVNDB: JVNDB-2020-008265 // CNNVD: CNNVD-202007-1287 // NVD: CVE-2020-5757

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.8

sources: JVNDB: JVNDB-2020-008265 // NVD: CVE-2020-5757

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-1287

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202007-1287

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008265

PATCH

title:UCM6200 seriesurl:http://www.grandstream.com/products/ip-pbxs/ucm-series-ip-pbxs/product/ucm6200-series

Trust: 0.8

title:Grandstream UCM6200 Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=124963

Trust: 0.6

sources: JVNDB: JVNDB-2020-008265 // CNNVD: CNNVD-202007-1287

EXTERNAL IDS

db:NVDid:CVE-2020-5757

Trust: 3.0

db:TENABLEid:TRA-2020-42

Trust: 1.6

db:JVNDBid:JVNDB-2020-008265

Trust: 0.8

db:CNVDid:CNVD-2020-44351

Trust: 0.6

db:NSFOCUSid:47955

Trust: 0.6

db:CNNVDid:CNNVD-202007-1287

Trust: 0.6

sources: CNVD: CNVD-2020-44351 // JVNDB: JVNDB-2020-008265 // CNNVD: CNNVD-202007-1287 // NVD: CVE-2020-5757

REFERENCES

url:https://www.tenable.com/cve/cve-2020-5757

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-5757

Trust: 2.0

url:https://www.tenable.com/security/research/tra-2020-42

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5757

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47955

Trust: 0.6

sources: CNVD: CNVD-2020-44351 // JVNDB: JVNDB-2020-008265 // CNNVD: CNNVD-202007-1287 // NVD: CVE-2020-5757

SOURCES

db:CNVDid:CNVD-2020-44351
db:JVNDBid:JVNDB-2020-008265
db:CNNVDid:CNNVD-202007-1287
db:NVDid:CVE-2020-5757

LAST UPDATE DATE

2024-11-23T22:11:25.827000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-44351date:2020-08-05T00:00:00
db:JVNDBid:JVNDB-2020-008265date:2020-09-08T00:00:00
db:CNNVDid:CNNVD-202007-1287date:2020-08-21T00:00:00
db:NVDid:CVE-2020-5757date:2024-11-21T05:34:32.900

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-44351date:2020-08-05T00:00:00
db:JVNDBid:JVNDB-2020-008265date:2020-09-08T00:00:00
db:CNNVDid:CNNVD-202007-1287date:2020-07-17T00:00:00
db:NVDid:CVE-2020-5757date:2020-07-17T21:15:13.700