The SIP service in Polycom VVX 500 and 601 devices 5.8.0.12848 and earlier allow remote attackers to obtain sensitive phone configuration information by leveraging use with an on-premise installation with Skype for Business.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105746 | Third Party Advisory VDB Entry |
https://seclists.org/bugtraq/2018/Oct/33 | Exploit Mailing List Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-028.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
15 Jun 2021, 15:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:* |
Information
Published : 2018-10-24 22:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-18566
Mitre link : CVE-2018-18566
CVE.ORG link : CVE-2018-18566
JSON object : View
Products Affected
polycom
- vvx_500
- vvx_500_firmware
- unified_communications_software
- vvx_601_firmware
- vvx_601
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor