Rss Feed

Avaya 4602SW SIP Phone vulnerable to server impersonation

Vulnerable Products

 Avaya 4602 SW IP Phone (Model 4602D02A)

 Impact

 An active attacker may hijack the call and compromise confidentiality of VoIP communication. This vulnerability is non-patchable.

 Risk level

 Medium

 Vector

 External

 Details

 Avaya 4602SW IP phone does not enforce server authentication using cnonce parameter during MD5 digest authentication potentially allowing an attacker to impersonate the server

 An active or man-in-the-middle attacker may impersonate the server and hijack communication between the un-suspecting phone and server. Attacker may then be able to listen to confidential conversations.

 Fixed Software

 Phone SIP stack implementations should be patched enforce server authentication. As a best practice, TLS with mutual authentication should be used. Avaya does not enforce server authentication. Vulnerable systems should be patched.

 Remediation

 Redshift Networks UCTM, has a signature detection and protection for critical IP- Voice, Video, Unified Communications & Collaborative networks and applications. In this special case, UCTM can prevent SIP signaling that neither originates nor is directed to a registered SIP proxy or server, and can prevent SIP signaling from networks in which no SIP enabled device should exist.  This events remote attacks that take advantage of this vulnerability. For more information on RedShift Networks, please go to www.redshiftnetworks.com.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>