Vulnerability Description
The com.softphone.common package in the Grandstream Wave app 1.0.1.26 and earlier for Android does not properly validate SSL certificates, which allows man-in-the-middle attackers to spoof the Grandstream provisioning server via a crafted certificate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grandstream | Wave | <= 1.0.1.26 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/136290/Grandstream-Wave-1.0.1.26-TLS-Man-InThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/537819/100/0/threaded
- https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1519-gswave-tls-mitmThird Party Advisory
- http://packetstormsecurity.com/files/136290/Grandstream-Wave-1.0.1.26-TLS-Man-InThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/537819/100/0/threaded
- https://rt-solutions.de/wp-content/uploads/2016/04/CVE-2016-1519-gswave-tls-mitmThird Party Advisory
FAQ
What is CVE-2016-1519?
CVE-2016-1519 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The com.softphone.common package in the Grandstream Wave app 1.0.1.26 and earlier for Android does not properly validate SSL certificates, which allows man-in-the-middle attackers to spoof the Grandst...
How severe is CVE-2016-1519?
CVE-2016-1519 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1519?
Check the references section above for vendor advisories and patch information. Affected products include: Grandstream Wave.