Vulnerability Description
LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lifesize default password for the cli account may sometimes be used for authentication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lifesize | Team 220 Firmware | - |
| Lifesize | Team 220 | - |
| Lifesize | Passport 220 Firmware | - |
| Lifesize | Passport 220 | - |
| Lifesize | Networker 220 Firmware | - |
| Lifesize | Networker 220 | - |
| Lifesize | Room 220 Firmware | - |
| Lifesize | Room 220 | - |
Related Weaknesses (CWE)
References
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesExploitThird Party Advisory
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesExploitThird Party Advisory
FAQ
What is CVE-2019-7632?
CVE-2019-7632 is a vulnerability with a CVSS score of 8.8 (HIGH). LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lif...
How severe is CVE-2019-7632?
CVE-2019-7632 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7632?
Check the references section above for vendor advisories and patch information. Affected products include: Lifesize Team 220 Firmware, Lifesize Team 220, Lifesize Passport 220 Firmware, Lifesize Passport 220, Lifesize Networker 220 Firmware.