On 24 March 2015 at 20:27, David Donovan <donovan.da...@gmail.com> wrote:

> On 24 March 2015 at 15:22, Jim Van Meggelen <jim.vanmegge...@gmail.com>
> wrote:
>
>>
>> http://www.itnews.com.au/News/401928,cisco-confirms-ip-phone-eavesdropping-flaw.aspx
>>
>
> What's more surprising to me is that there's no patch.
>

I did some more reading on this because I felt like I must be missing
something.  It turns out I was.

It looks like there isn't a software patch because the solution is to
correct the incorrect "as shipped" default setting.  Cisco says
"Administrators are advised to enable XML Execution authentication in the
configuration settings of affected devices."

I'm not an expert and I haven't tested this but, as I read it, the problem
can be solved by pushing a simple config value through auto provisioning.

Also, I did a more specific query on Shodan and it looks like the affected
firmware isn't the most common one.  Again, helpfully, Cisco included the
firmware version in the HTTP response so it's easy for an unauthenticated
remote user to tell if the device is affected and worth exploiting.  It's
still thousands of devices though when you consider several models are
affected.
http://www.shodanhq.com/search?q=SPA525G2-7.5.5
http://www.shodanhq.com/search?q=SPA504g-7.5.5

All the best,
Dave

Reply via email to