vendor:
Polycom IP Phone
by:
Pr0T3cT10n
8.3
CVSS
HIGH
Data Disclosure
200
CWE
Product Name: Polycom IP Phone
Affected Version From: All
Affected Version To: All
Patch Exists: Yes
Related CWE: None
CPE: a:polycom:polycom_ip_phone
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011
Polycom IP Phone Web Interface Data Diclosure Vulnerability
The data disclosure vulnerability found in the section of 'Lines' -> 'Line 1' of 'Polycom IP Phone' software. The vulnerability allows the attacker to disclosure the password of the username for the phone line that connected. To exploit the vulnerability and discluse the data we need to access to the 'Polycom IP Phone' by this url 'http://address/reg_1.htm'. Then we can see in the source code by the field 'reg.1.auth.password' and then we see the magic! thats is the password for the username by the sip server.
Mitigation:
Ensure that the web interface of the Polycom IP Phone is password protected and that only authorized users have access to it.