Flaw in Grandstream VoIP phones allows stealthy eavesdropping
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是Grandstream GXP1600系列VoIP电话的一个关键漏洞,允许远程攻击者获取root权限并窃听通话。这个漏洞的CVE编号是CVE-2026-2329,严重性评分9.3。影响的是六个型号的设备,固件版本低于1.0.7.81。 漏洞存在于设备的web API服务中,该服务默认情况下不需要认证就能访问。攻击者通过向API发送过长的输入,导致栈溢出,进而控制CPU寄存器,实现远程代码执行。 Rapid7的研究人员开发了Metasploit模块来演示这一漏洞,并且已经联系了Grandstream,后者在2月3日发布了修复版本。 现在我要把这些信息浓缩到100字以内。重点包括:设备型号、漏洞严重性、影响范围、攻击方式、修复情况以及建议用户更新固件。 可能的结构是:Grandstream GXP1600系列存在严重漏洞(CVE-...),允许远程攻击者获取root权限并窃听通话。漏洞源于API未认证访问和栈溢出。影响六个型号的固件旧版本。研究人员已开发工具并联系厂商,修复已发布,建议更新。 </think> Grandstream GXP1600系列VoIP电话存在严重漏洞(CVE-2026-2329),允许远程攻击者无需认证即可获取root权限并窃听通话。该漏洞源于设备API服务未进行身份验证及栈溢出问题,影响六款固件版本低于1.0.7.81的设备。研究人员已开发Metasploit模块并联系厂商修复,建议用户尽快更新固件以应对风险。 2026-2-19 17:31:1 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Grandstream

A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications.

VoIP communication equipment from Grandstream Networks is being used by small and medium businesses. The maker's GXP product line is part of the company's high-end offering for businesses, schools, hotels, and Internet Telephony Service Providers (ITSP) around the world.

The vulnerability is tracked as CVE-2026-2329 and received a critical severity score of 9.3. It impacts the following six models of the GXP1600 series of devices that run firmware versions prior to 1.0.7.81:

Wiz

  • GXP1610
  • GXP1615
  • GXP1620
  • GXP1625
  • GXP1628
  • GXP1630

Even if a vulnerable device is not directly reachable over the public internet, an attacker can pivot to it from another host on the network. Exploitation is silent, and everything works as expected.

In a technical report, Rapid7 researchers explain that the problem is in the device’s web-based API service (/cgi-bin/api.values.get), which is accessible without authentication in the default configuration.

The API accepts a ‘request’ parameter containing colon-delimited identifiers, which is parsed into a 64-byte stack buffer without performing a length check when copying characters into the buffer.

Because of this, an attacker supplying overly long input can cause a stack overflow, overwriting adjacent memory to gain control over multiple CPU registers, such as the Program Counter.

Rapid7 researchers developed a working Metasploit module to demonstrate unauthenticated remote code execution as root by exploiting CVE-2026-2329.

Metasploit module
Metasploit module
Source: Rapid7

Exploitation enables arbitrary OS command execution, extracting stored credentials of local users and SIP accounts, and reconfiguring the device to use a malicious SIP proxy that allows eavesdropping on calls.

Stealing credentials
Stealing credentials
Source: Rapid7

Rapid7 researchers say that successful exploitation requires writing multiple null bytes to construct a return-oriented programming (ROP) chain. However, CVE-2026-2329 permits writing of only one null terminator byte during the overflow.

To bypass the restriction, the researchers used multiple colon-separated identifiers to trigger the overflow repeatedly and write null bytes multiple times.

“Every time a colon is encountered, the overflow can be triggered a subsequent time via the next identifier,” explain the researchers in the technical writeup.

“We can leverage this, and the ability to write a single null byte as the last character in the current identifier being processed, to write multiple null bytes during exploitation.”

The researchers contacted Grandstream on January 6 and again on January 20 after receiving no response.

Eventually, Grandstream fixed the issue on February 3, with the release of firmware version 1.0.7.81.

Technical details and a module for the Metasploit penetration testing and exploitation framework. Users of vulnerable Grandstream products are strongly advised to apply available security updates as soon as possible.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping/
如有侵权请联系:admin#unsafe.sh