Grandstream.UCM6200.Series.IP.PBX.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection vulnerability in Grandstream UCM6200 series devices.
The vulnerability is due to insufficient sanitizing of user supplied inputs. A remote attacker may be able to exploit this to execute arbitrary commands within the context of the application, via a crafted HTTP request.
Affected Products
Versions below 1.0.20.17
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
http://www.grandstream.com/products/ip-pbxs/ucm-series-ip-pbxs/product/ucm6200-series
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-06-29 | 15.875 | Sig Added |
2020-05-04 | 15.832 | Default_action:pass:drop |
2020-04-20 | 15.824 | Sig Added |
2020-04-16 | 15.820 |