{"id":"CVE-2020-27613","details":"The installation procedure in BigBlueButton before 2.2.28 (or earlier) uses ClueCon as the FreeSWITCH password, which allows local users to achieve unintended FreeSWITCH access.","modified":"2026-04-12T00:38:01.793107Z","published":"2020-10-21T15:15:27.577Z","references":[{"type":"EVIDENCE","url":"https://www.golem.de/news/big-blue-button-das-grosse-blaue-sicherheitsrisiko-2010-151610.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bigbluebutton/bigbluebutton","events":[{"introduced":"0"},{"fixed":"563625097e7ebcef462a9e8001798ddb203f1810"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"2.2.28"}],"cpe":"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"}}],"versions":["2.2-beta-10","2.2-beta-11","2.2-beta-12","2.2-beta-14","2.2-beta-15","2.2-beta-16","2.2-beta-17","2.2-beta-2","2.2-beta-3","2.2-beta-4","2.2-beta-5","2.2-beta-6","2.2-beta-7","2.2-beta-8","2.2-beta-9","2.2-rc-4","2.2-rc-5","2.2-rc-6","dcs-2-a","v0.8","v0.8b4","v0.8b4.0","v0.8rc2","v0.9.0-beta","v2.2.0","v2.2.1","v2.2.10","v2.2.11-good","v2.2.12","v2.2.14","v2.2.15","v2.2.16","v2.2.17","v2.2.18","v2.2.19","v2.2.2","v2.2.20","v2.2.21","v2.2.22","v2.2.23","v2.2.24","v2.2.25","v2.2.26","v2.2.27","v2.2.3","v2.2.4","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v2.2.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-27613.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}