{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T21:27:43.932","vulnerabilities":[{"cve":{"id":"CVE-2020-5725","sourceIdentifier":"vulnreport@tenable.com","published":"2020-03-30T20:15:20.133","lastModified":"2024-11-21T05:34:29.400","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the HTTP server's websockify endpoint. A remote unauthenticated attacker can invoke the login action with a crafted username and, through the use of timing attacks, can discover user passwords."},{"lang":"es","value":"La serie Grandstream UCM6200 versiones anteriores a 1.0.20.22, es vulnerable a una inyección SQL por medio del endpoint websockify del servidor HTTP. Un atacante no autenticado remoto puede invocar la acción login con un nombre de usuario diseñado y, mediante el uso de ataques de tiempo, puede detectar contraseñas de usuario."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnreport@tenable.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.20.22","matchCriteriaId":"F55C1906-9C0D-4479-B545-059329485BCD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*","matchCriteriaId":"9864BD0F-BE9C-4F72-AB57-77036699029B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.20.22","matchCriteriaId":"2D9A2414-684F-4C61-BCAC-E7967A7BFF2B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*","matchCriteriaId":"B5A26ABB-8BED-4E61-91AA-ABF1B90CBD81"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.20.22","matchCriteriaId":"3164240C-6CAB-4433-8EB3-5F09552A7F4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*","matchCriteriaId":"EA744718-8862-4579-B9CF-E1E8137A02E6"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/156976/Grandstream-UCM6200-Series-WebSocket-1.0.20.20-SQL-Injection.html","source":"vulnreport@tenable.com"},{"url":"https://www.tenable.com/security/research/tra-2020-17","source":"vulnreport@tenable.com","tags":["Exploit","Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/156976/Grandstream-UCM6200-Series-WebSocket-1.0.20.20-SQL-Injection.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.tenable.com/security/research/tra-2020-17","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}