Skip to main content

CVE-2025-28170: n/a

High
VulnerabilityCVE-2025-28170cvecve-2025-28170
Published: Tue Jul 29 2025 (07/29/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Grandstream Networks GXP1628 <=1.0.4.130 is vulnerable to Incorrect Access Control. The device is configured with directory listing enabled, allowing unauthorized access to sensitive directories and files.

AI-Powered Analysis

AILast updated: 07/29/2025, 17:18:24 UTC

Technical Analysis

CVE-2025-28170 identifies a security vulnerability in Grandstream Networks GXP1628 IP phones running firmware versions up to and including 1.0.4.130. The vulnerability is classified as Incorrect Access Control due to the device being configured with directory listing enabled. This misconfiguration allows unauthorized users to access sensitive directories and files on the device without proper authentication or authorization. Directory listing is a feature that, when enabled, reveals the contents of directories via a web interface or HTTP server, potentially exposing configuration files, logs, or other sensitive data stored on the device. Since IP phones like the GXP1628 often contain configuration details, network information, and possibly credentials, unauthorized access to these files can lead to further compromise of the device or the network it is connected to. The vulnerability does not currently have a CVSS score assigned, and no known exploits are reported in the wild as of the publication date. However, the presence of directory listing on a network device accessible by unauthorized users represents a significant security risk, as it can facilitate reconnaissance and subsequent attacks. The lack of patch information suggests that either a fix has not yet been released or is not publicly documented, increasing the urgency for organizations to implement compensating controls. The vulnerability affects a specific product line widely used in enterprise telephony systems, which are often integrated into corporate communication infrastructures.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Grandstream GXP1628 IP phones are commonly deployed in corporate environments for VoIP communications. Unauthorized access to sensitive directories could expose configuration files containing network credentials, SIP account details, or administrative passwords, potentially allowing attackers to intercept calls, conduct eavesdropping, or launch further attacks within the corporate network. This could lead to breaches of confidentiality, integrity, and availability of communication systems. Additionally, compromised IP phones can be used as pivot points for lateral movement within an organization's network, increasing the risk of broader compromise. The exposure of sensitive data may also lead to regulatory compliance issues under GDPR, as personal data could be intercepted or accessed unlawfully. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability's nature makes it a likely target for attackers seeking to exploit VoIP infrastructure weaknesses. Organizations relying heavily on Grandstream devices for communication, especially those in regulated industries or with high privacy requirements, face increased operational and reputational risks if this vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using Grandstream GXP1628 devices with firmware versions up to 1.0.4.130. Immediate steps include disabling directory listing on the device's web interface or HTTP server, if configurable, to prevent unauthorized directory enumeration. If the device firmware does not allow disabling directory listing, organizations should restrict access to the device management interface using network segmentation and firewall rules, limiting access only to trusted administrative networks or VPNs. Implementing strong authentication mechanisms and changing default credentials on the devices is critical to reduce unauthorized access risk. Monitoring network traffic for unusual access patterns to the IP phones' web interfaces can help detect exploitation attempts. Organizations should also engage with Grandstream support or monitor official advisories for firmware updates or patches addressing this vulnerability and plan timely deployment once available. As a longer-term measure, consider replacing affected devices with models that have improved security configurations and support regular security updates. Conducting regular security audits of VoIP infrastructure and integrating these devices into centralized vulnerability management programs will enhance overall security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6888feb4ad5a09ad008eef0d

Added to database: 7/29/2025, 5:02:44 PM

Last enriched: 7/29/2025, 5:18:24 PM

Last updated: 8/29/2025, 5:11:22 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats