Feeds

Yet another eavesdrop vulnerability in Cisco phones

Security groundhog day

Internet Security Threat Report 2014

A university student presenting at the Amphion Forum has demonstrated turning a Cisco VoIP phone into a listening device, even when it’s on the hook.

According to Dark Reading, the vulnerability demands a fairly extensive reconfiguration of the phone. This, at least, means the attacker needs greater sophistication than previous eavesdropper attacks reported by The Register in 2007 and 2011.

A number of 7900-series phones are affected, according to Forbes.

The latest vulnerability is based on a lack of input validation at the syscall interface, according to Columbia University graduate student Ang Cui. This, Cui said, “allows arbitrary modification of kernel memory from userland, as well as arbitrary code execution within the kernel. This, in turn, allows the attacker to become root, gain control over the DSP [Digital Signal Processor], buttons, and LEDs on the phone.”

In the demonstration, Cui modified the DSP to surreptitiously turn on the phone’s microphone and stream its output to the network.

To simplify the demonstration, Cui programmed the necessary reconfiguration onto an external circuit which he plugged into the phone’s Ethernet port, and then captured what was spoken near the VoIP phone on his smartphone.

Cui told Dark Reading that the phones contain a number of vulnerable third-party libraries, which he promises to discuss at the upcoming Chaos Computer Conference, 29C3.

Cisco says workarounds and a software patch are available to address the issue, tagged with the bug id CSCuc83860. ®

Beginner's guide to SSL certificates

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.