The auto-provisioning mechanism in the Grandstream Wave app 1.0.1.26 and earlier for Android and Grandstream Video IP phones allows man-in-the-middle attackers to spoof provisioning data and consequently modify device functionality, obtain sensitive information from system logs, and have unspecified other impact by leveraging failure to use an HTTPS session for downloading configuration files from http://fm.grandstream.com/gs/.
References
Link | Resource |
---|---|
https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1518-insecure-provisioning.pdf | Third Party Advisory |
http://packetstormsecurity.com/files/136280/Grandstream-Wave-1.0.1.26-Man-In-The-Middle.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/537818/100/0/threaded |
Configurations
Information
Published : 2017-04-21 13:59
Updated : 2018-10-09 12:59
NVD link : CVE-2016-1518
Mitre link : CVE-2016-1518
JSON object : View
CWE
CWE-284
Improper Access Control
Products Affected
grandstream
- wave