HIGH · 8.8

CVE-2019-7632

LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lif...

Vulnerability Description

LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lifesize default password for the cli account may sometimes be used for authentication.

CVSS Score

8.8

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
LifesizeTeam 220 Firmware-
LifesizeTeam 220-
LifesizePassport 220 Firmware-
LifesizePassport 220-
LifesizeNetworker 220 Firmware-
LifesizeNetworker 220-
LifesizeRoom 220 Firmware-
LifesizeRoom 220-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-7632?

CVE-2019-7632 is a vulnerability with a CVSS score of 8.8 (HIGH). LifeSize Team, Room, Passport, and Networker 220 devices allow Authenticated Remote OS Command Injection, as demonstrated by shell metacharacters in the support/mtusize.php mtu_size parameter. The lif...

How severe is CVE-2019-7632?

CVE-2019-7632 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-7632?

Check the references section above for vendor advisories and patch information. Affected products include: Lifesize Team 220 Firmware, Lifesize Team 220, Lifesize Passport 220 Firmware, Lifesize Passport 220, Lifesize Networker 220 Firmware.