PatchSiren

PatchSiren cyber security CVE debrief

CVE-2020-5722 Grandstream CVE debrief

CVE-2020-5722 is a SQL injection vulnerability affecting Grandstream UCM6200 series devices. In the supplied public records, CISA added the issue to its Known Exploited Vulnerabilities catalog on 2022-01-28 and set a remediation due date of 2022-07-28, indicating this is a vulnerability that should be treated as urgently actionable. The supplied corpus does not include a CVSS score, so prioritization here is driven by KEV inclusion and the vendor/product scope rather than a provided numeric severity.

Vendor
Grandstream
Product
UCM6200
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-01-28
Original CVE updated
2022-01-28
Advisory published
2022-01-28
Advisory updated
2022-01-28

Who should care

Organizations that operate Grandstream UCM6200 series systems should care first, especially teams responsible for patching, internet-facing management exposure, and asset inventory for communications or appliance-based infrastructure. Security operations teams should also track it because CISA classified it as a known exploited vulnerability.

Technical summary

The available sources identify the flaw as a SQL injection issue in the Grandstream UCM6200 series. SQL injection can allow maliciously crafted input to alter backend database queries if inputs are not properly validated and parameterized. No further exploitation details, impact scope, or affected component breakdown are provided in the supplied corpus.

Defensive priority

High. CISA placed CVE-2020-5722 in the Known Exploited Vulnerabilities catalog, which is a strong indicator that it should be remediated promptly. Use the vendor’s update guidance and verify exposed assets are covered.

Recommended defensive actions

  • Apply updates per vendor instructions as directed by CISA.
  • Inventory all Grandstream UCM6200 series devices to confirm exposure and patch status.
  • Prioritize internet-facing or remotely reachable deployments for immediate review.
  • Validate that administrative or management interfaces are not unnecessarily exposed.
  • Track remediation against CISA’s KEV due date and confirm closure in asset management records.

Evidence notes

CISA KEV metadata in the supplied source item names the vendorProject as Grandstream, the product as UCM6200, the vulnerabilityName as 'Grandstream Networks UCM6200 Series SQL Injection Vulnerability,' dateAdded as 2022-01-28, dueDate as 2022-07-28, and requiredAction as 'Apply updates per vendor instructions.' The provided CVE/NVD references establish the CVE identifier and product naming, but the supplied corpus does not include a CVSS score.

Official resources

Public, defensive-only summary based on the supplied CVE, CISA KEV metadata, and official reference links. No exploit instructions or reproduction details are included.