SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Technical analysis for shorts & longs -- Ignore unavailable to you. Want to Upgrade?


To: Johnny Canuck who wrote (37617)7/14/2002 3:45:26 AM
From: Johnny Canuck  Read Replies (2) | Respond to of 68396
 
July 12, 2002
Flaws Plague VOIP Phones
By Dennis Fisher

Security researchers at @stake Inc. have found more than a dozen vulnerabilities in one of the most popular lines of voice-over-IP phones, some of which have consequences that reach well beyond just the telephony infrastructure.

The researchers were able to gain remote administrative access to Pingtel Corp.'s Xpressa SIP PX-1 phones, hijack calls to and from the handsets, and perform several other attacks as a result of the flaws, according to an advisory the firm released Friday.

ADVERTISEMENT
<http://ad.doubleclick.net/ad/eweek.dart/breakingnews;abr=%21ie;sz=336x280;ord=3484264613?>
<http://www.eweek.com/images/ew_spacer.gif>

The problems affect phones running versions 1.2.5 through 1.2.7.4 of Pingtel's VxWorks software.

Pingtel, of Woburn, Mass., sells its Java-enabled handsets to both service providers and enterprise customers.

The most serious of the vulnerabilities is the result of a combination of two issues. The Xpressa phones ship without a password for the administrator account, which carries an unchangeable username of "admin." If the password is not set, an attacker with physical access to the phone easily can set the password, giving himself administrative access to the phone.

A remote attacker can perform this same task using the phone's Web user management interface.

With that accomplished, the attacker can then remotely log in using the phone's Telnet server. The Xpressa phone can then be used as "a fully POSIX compliant network device with storage space, bandwidth and a CPU," @stake's advisory says. POSIX is the generic name for a group of IEEE standards known as Portable Operating System Interface for Unix.

Having administrative access also gives an attacker the opportunity to execute several other attacks. For example, an authenticated user can alter the call forwarding settings on the phones to send all incoming calls to another Session Initiation Protocol (SIP) URL or landline phone number. Compounding this vulnerability is the fact that the phones would not notify users of the diverted incoming calls.

@stake concentrated on the Pingtel phones because they're the market leaders, but many of the same problems could likely be found in other VoIP phones.

"I don't think a lot of people building these devices are looking at the security implications of what they're doing," said Chris Wysopal, director of research and development at @stake, based in Cambridge, Mass. "These are not difficult attacks. It's just knowing where to look. You don't have to write any special tools."

And because SIP is built on the IP protocol, the SIP-based VoIP phones could also be susceptible to well-known IP attacks such as IP spoofing or replay attacks.

An attacker with administrative access could also cause a denial-of-service condition to an Xpressa phone by either changing the SIP listening ports; requiring authentication of incoming calls, in which case neither the caller nor the recipient is notified if the authentication fails; or assigning a port of 0 to the Web server.

Also, because the Web user interface is only protected by base64-encoded username and password pairs, anyone sniffing traffic between the Web interface and a phone would be able to see the login information in what is essentially clear text, @stake said.

In addition, there are several other operational issues that @stake identified, including the fact that the phones' firmware can be upgraded without administrative access.

Pingtel has posted to its Web site a document called "Best Practices for Deploying Pingtel Phones," and has also written a detailed response to all of the issues the researchers raised. The company also recommends that customers upgrade to the 2.0.1 release of VxWorks, which addresses some of the vulnerabilities.

Pingtel plans two more software updates this year that will fix the remaining issues.

The full @stake advisory is available at www.atstake.com/research/advisories/2002/.

[Harry: I am surprised WIND did not take a hit on Friday.
Unless Pingtel is wanting to get into a tradmark fight, VxWorks is WIND trademark. I know WIND has been adding more internet ready libraries so it would make sense.]