Feeds

Spy platform zero day exposes cops' wiretapped calls

Laundry list of fail includes backdoor, remote unauth access to intercept box

The Essential Guide to IT Transformation

National security boosters have just taken a kick to the ego, with revelations that hackers can access exactly the kind of wiretap kit they believe should be deployed in every ISP and telco around the world.

The zero-day that's turned up in kit from New Jersey outfit NICE would give attackers access to wiretapped voice recordings along with names and email addresses for suspects monitored by police.

The flaws affect the NICE's Recording eXpress voice recording product, which targets police and law enforcement agencies.

Prolific fail flaunter, SEC Consult Vulnerability Lab, quietly disclosed nine flaws to NICE and went public after five holes remained unpatched nearly six months after being reported.

The flaws included a root backdoor and remote unauthenticated access to intercepted voice recordings. Hackers could also break into the voice recording server and move laterally to launch further attacks against internal voice virtual local area networks.

The security bods strongly recommended cops stop using the platform until the flaws were fixed and further testing was done.

NICE comms director Erik Snider said customers were notified of the flaws and downplayed the risk of attack.

"We have been addressing the issues based on priority, and can confirm that we have already resolved almost all of them, and expect the remaining fixes to be completed shortly," Snider said.

"We do not believe any of our customers have been impacted by the items raised in this report, as these systems are deployed in a very secure environment and are not accessible outside of the organisation."

He did not respond by the time of publication to El Reg's request to explain how the platform was not accessible outside organisations.

The backdoor was a hidden and hard coded administrator account within the platform's MySQL deployment and together with exposed voice recordings was the most severe of the published vulnerabilities.

"For example, unauthenticated attackers are able to gain access to exported lists of user accounts that are being monitored/recorded. Attackers gain access to detailed information such as personal data like first/last name, email address and username/extension," researchers Johannes Greil and Stefan Viehböck wrote in a disclosure.

Multiple cross site scripting and SQL injection flaws were also reported. The penetration testers said further critical vulnerabilities were assumed present. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.