CVE-2020-5723

The UCM6200 series 1.0.20.22 and below stores unencrypted user passwords in an SQLite database. This could allow an attacker to retrieve all passwords and possibly gain elevated privileges.
References
Link Resource
https://www.tenable.com/security/research/tra-2020-17 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2020-17 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2020-17 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2020-17 - Exploit, Third Party Advisory

Information

Published : 2020-03-30 20:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5723

Mitre link : CVE-2020-5723

CVE.ORG link : CVE-2020-5723


JSON object : View

Products Affected

grandstream

  • ucm6208
  • ucm6204
  • ucm6202
  • ucm6208_firmware
  • ucm6204_firmware
  • ucm6202_firmware
CWE
CWE-312

Cleartext Storage of Sensitive Information