CVE-2020-5763

Grandstream HT800 series firmware version 1.0.17.5 and below contain a backdoor in the SSH service. An authenticated remote attacker can obtain a root shell by correctly answering a challenge prompt.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:grandstream:ht802_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:grandstream:ht812_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ht812:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:grandstream:ht814_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ht814:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:grandstream:ht818_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ht818:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:grandstream:ht813_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:grandstream:ht813:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2020-43 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2020-43 - Exploit, Third Party Advisory
References () https://www.tenable.com/security/research/tra-2020-47 - Third Party Advisory, VDB Entry () https://www.tenable.com/security/research/tra-2020-47 - Third Party Advisory, VDB Entry

Information

Published : 2020-07-29 19:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5763

Mitre link : CVE-2020-5763

CVE.ORG link : CVE-2020-5763


JSON object : View

Products Affected

grandstream

  • ht813
  • ht814
  • ht818_firmware
  • ht812_firmware
  • ht818
  • ht802
  • ht801_firmware
  • ht802_firmware
  • ht812
  • ht813_firmware
  • ht801
  • ht814_firmware
CWE
CWE-489

Active Debug Code

CWE-326

Inadequate Encryption Strength