Description
The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a default user and password. Affected models are the UCM6202, UCM6204, UCM6208, and UCM6510.
Published: 2024-04-29
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to firmware version 1.0.20.52 or later. Ensure the web interface is not exposed to the internet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-16623 The Grandstream UCM Series IP PBX before firmware version 1.0.20.52 is affected by a parameter injection vulnerability in the HTTP interface. A remote and authenticated attacker can execute arbitrary code by sending a crafted HTTP request. Authentication may be possible using a default user and password. Affected models are the UCM6202, UCM6204, UCM6208, and UCM6510.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2024-08-01T18:18:18.719Z

Reserved: 2024-01-23T21:10:19.364Z

Link: CVE-2024-0840

cve-icon Vulnrichment

Updated: 2024-08-01T18:18:18.719Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-29T19:15:19.730

Modified: 2024-11-21T08:47:29.257

Link: CVE-2024-0840

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses