CVE-2020-5739 (GCVE-0-2020-5739)
Vulnerability from cvelistv5 – Published: 2020-04-14 13:48 – Updated: 2024-08-04 08:39
VLAI?
Summary
Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Grandstream GXP1600 Series |
Affected:
1.0.4.152 and below
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:39:25.705Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2020-22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Grandstream GXP1600 Series",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "1.0.4.152 and below"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone\u0027s VPN settings via the \"Additional Settings\" field in the web interface. When the VPN\u0027s connection is established, the user defined script is executed with root privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-14T13:48:50",
"orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
"shortName": "tenable"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2020-22"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vulnreport@tenable.com",
"ID": "CVE-2020-5739",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Grandstream GXP1600 Series",
"version": {
"version_data": [
{
"version_value": "1.0.4.152 and below"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone\u0027s VPN settings via the \"Additional Settings\" field in the web interface. When the VPN\u0027s connection is established, the user defined script is executed with root privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/research/tra-2020-22",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2020-22"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
"assignerShortName": "tenable",
"cveId": "CVE-2020-5739",
"datePublished": "2020-04-14T13:48:50",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:39:25.705Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.4.152\", \"matchCriteriaId\": \"718E23DE-61E2-47CE-894B-E3B4EFCB761E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D92122D2-AD92-4EC3-81C3-CC58C3E3C287\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.4.152\", \"matchCriteriaId\": \"0285B11D-A50B-4650-ADDE-DC1D140AB894\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"713E836B-E61E-4E74-9026-F6470C9555F1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.4.152\", \"matchCriteriaId\": \"12FDA102-F6D4-4F67-A07C-9919FA23BB6E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"898FC5BB-6D88-4ED3-95FE-ACFA8D99AAD7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.4.152\", \"matchCriteriaId\": \"427357FB-9EEE-43D8-B683-9BD412A68FC7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"280FCCEF-196B-4BD4-B5C2-7DECC224A84C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.4.152\", \"matchCriteriaId\": \"2C15DDAE-9E8F-4BCB-8650-E70374A2A33F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CDF28C0-982E-4DB8-8F3A-75103F2AF9A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.4.152\", \"matchCriteriaId\": \"D23F0025-3B02-43BD-8778-C91B40424DB1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63FC9463-51FD-493D-B2FD-4E61EC6B98CA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone\u0027s VPN settings via the \\\"Additional Settings\\\" field in the web interface. When the VPN\u0027s connection is established, the user defined script is executed with root privileges.\"}, {\"lang\": \"es\", \"value\": \"La serie Grandstream GXP1600 versi\\u00f3n de firmware 1.0.4.152 y posteriores, es vulnerable a una ejecuci\\u00f3n de comandos remota autenticada cuando un atacante agrega un script de OpenVPN a la configuraci\\u00f3n de VPN del tel\\u00e9fono por medio del campo \\\"Additional Settings\\\" en la interfaz web. Cuando la conexi\\u00f3n de VPN es establecida, el script definido por el usuario es ejecutado con privilegios root.\"}]",
"id": "CVE-2020-5739",
"lastModified": "2024-11-21T05:34:30.837",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-04-14T14:15:12.007",
"references": "[{\"url\": \"https://www.tenable.com/security/research/tra-2020-22\", \"source\": \"vulnreport@tenable.com\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"https://www.tenable.com/security/research/tra-2020-22\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "vulnreport@tenable.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"vulnreport@tenable.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-5739\",\"sourceIdentifier\":\"vulnreport@tenable.com\",\"published\":\"2020-04-14T14:15:12.007\",\"lastModified\":\"2024-11-21T05:34:30.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone\u0027s VPN settings via the \\\"Additional Settings\\\" field in the web interface. When the VPN\u0027s connection is established, the user defined script is executed with root privileges.\"},{\"lang\":\"es\",\"value\":\"La serie Grandstream GXP1600 versi\u00f3n de firmware 1.0.4.152 y posteriores, es vulnerable a una ejecuci\u00f3n de comandos remota autenticada cuando un atacante agrega un script de OpenVPN a la configuraci\u00f3n de VPN del tel\u00e9fono por medio del campo \\\"Additional Settings\\\" en la interfaz web. Cuando la conexi\u00f3n de VPN es establecida, el script definido por el usuario es ejecutado con privilegios root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"vulnreport@tenable.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.152\",\"matchCriteriaId\":\"718E23DE-61E2-47CE-894B-E3B4EFCB761E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D92122D2-AD92-4EC3-81C3-CC58C3E3C287\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.152\",\"matchCriteriaId\":\"0285B11D-A50B-4650-ADDE-DC1D140AB894\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713E836B-E61E-4E74-9026-F6470C9555F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.152\",\"matchCriteriaId\":\"12FDA102-F6D4-4F67-A07C-9919FA23BB6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"898FC5BB-6D88-4ED3-95FE-ACFA8D99AAD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.152\",\"matchCriteriaId\":\"427357FB-9EEE-43D8-B683-9BD412A68FC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280FCCEF-196B-4BD4-B5C2-7DECC224A84C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.152\",\"matchCriteriaId\":\"2C15DDAE-9E8F-4BCB-8650-E70374A2A33F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDF28C0-982E-4DB8-8F3A-75103F2AF9A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.152\",\"matchCriteriaId\":\"D23F0025-3B02-43BD-8778-C91B40424DB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FC9463-51FD-493D-B2FD-4E61EC6B98CA\"}]}]}],\"references\":[{\"url\":\"https://www.tenable.com/security/research/tra-2020-22\",\"source\":\"vulnreport@tenable.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://www.tenable.com/security/research/tra-2020-22\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…