CVE-2016-1520

Published on: 04/21/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Wave from Grandstream contain the following vulnerability:

The Grandstream Wave app 1.0.1.26 and earlier for Android does not use HTTPS when retrieving update information, which might allow man-in-the-middle attackers to execute arbitrary code via a crafted application.

  • CVE-2016-1520 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Third Party Advisory
rt-solutions.de
application/pdf
MISC rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1520-app-update-redirection.pdf
SecurityFocus web.archive.org
text/html
Inactive LinkNot Archived
URL Logo BUGTRAQ 20160317 CVE-2016-1520: GrandStream Android VoIP App Update Redirection
Grandstream Wave 1.0.1.26 Update Redirection ≈ Packet Storm Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/136291/Grandstream-Wave-1.0.1.26-Update-Redirection.html

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGrandstreamWaveAllAllAllAll
  • cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*: