The auto-provisioning mechanism in the Grandstream Wave app 1.0.1.26 and earlier for Android and Grandstream Video IP phones allows man-in-the-middle attackers to spoof provisioning data and consequently modify device functionality, obtain sensitive information from system logs, and have unspecified other impact by leveraging failure to use an HTTPS session for downloading configuration files from http://fm.grandstream.com/gs/.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136280/Grandstream-Wave-1.0.1.26-Man-In-The-Middle.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/537818/100/0/threaded | |
https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1518-insecure-provisioning.pdf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2017-04-21T20:00:00
Updated: 2018-10-09T18:57:01
Reserved: 2016-01-07T00:00:00
Link: CVE-2016-1518
JSON object: View
NVD Information
Status : Modified
Published: 2017-04-21T20:59:00.337
Modified: 2018-10-09T19:59:10.193
Link: CVE-2016-1518
JSON object: View
Redhat Information
No data.
CWE