CVE-2020-5723

The UCM6200 series 1.0.20.22 and below stores unencrypted user passwords in an SQLite database. This could allow an attacker to retrieve all passwords and possibly gain elevated privileges.
References
Link Resource
https://www.tenable.com/security/research/tra-2020-17 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-03-30 20:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-5723

Mitre link : CVE-2020-5723

CVE.ORG link : CVE-2020-5723


JSON object : View

Products Affected

grandstream

  • ucm6208
  • ucm6202
  • ucm6202_firmware
  • ucm6208_firmware
  • ucm6204
  • ucm6204_firmware
CWE
CWE-312

Cleartext Storage of Sensitive Information