Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "718E23DE-61E2-47CE-894B-E3B4EFCB761E", "versionEndIncluding": "1.0.4.152", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*", "matchCriteriaId": "D92122D2-AD92-4EC3-81C3-CC58C3E3C287", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0285B11D-A50B-4650-ADDE-DC1D140AB894", "versionEndIncluding": "1.0.4.152", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*", "matchCriteriaId": "713E836B-E61E-4E74-9026-F6470C9555F1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12FDA102-F6D4-4F67-A07C-9919FA23BB6E", "versionEndIncluding": "1.0.4.152", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "898FC5BB-6D88-4ED3-95FE-ACFA8D99AAD7", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "427357FB-9EEE-43D8-B683-9BD412A68FC7", "versionEndIncluding": "1.0.4.152", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*", "matchCriteriaId": "280FCCEF-196B-4BD4-B5C2-7DECC224A84C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C15DDAE-9E8F-4BCB-8650-E70374A2A33F", "versionEndIncluding": "1.0.4.152", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CDF28C0-982E-4DB8-8F3A-75103F2AF9A4", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D23F0025-3B02-43BD-8778-C91B40424DB1", "versionEndIncluding": "1.0.4.152", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*", "matchCriteriaId": "63FC9463-51FD-493D-B2FD-4E61EC6B98CA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the \"Additional Settings\" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges."}, {"lang": "es", "value": "La serie Grandstream GXP1600 versi\u00f3n de firmware 1.0.4.152 y posteriores, es vulnerable a una ejecuci\u00f3n de comandos remota autenticada cuando un atacante agrega un script de OpenVPN a la configuraci\u00f3n de VPN del tel\u00e9fono por medio del campo \"Additional Settings\" en la interfaz web. Cuando la conexi\u00f3n de VPN es establecida, el script definido por el usuario es ejecutado con privilegios root."}], "id": "CVE-2020-5739", "lastModified": "2024-11-21T05:34:30.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-04-14T14:15:12.007", "references": [{"source": "vulnreport@tenable.com", "tags": ["Exploit", "Vendor Advisory"], "url": "https://www.tenable.com/security/research/tra-2020-22"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"], "url": "https://www.tenable.com/security/research/tra-2020-22"}], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-94"}], "source": "vulnreport@tenable.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-94"}], "source": "nvd@nist.gov", "type": "Primary"}]}