Vulnerabilities
Vulnerable Software
Google:  >> Gizmo5  Security Vulnerabilities
The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
CVSS Score
7.5
EPSS Score
0.002
Published
2020-02-12


Contact Us

Shodan ® - All rights reserved