exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco IP Phone Cleartext Password Storage

Cisco IP Phone Cleartext Password Storage
Posted Jan 17, 2022
Authored by Gerhard Hechenberger, Steffen Robertz | Site sec-consult.com

Cisco IP Phone Series 78x1, 88x5, 88x1, 7832, 8832, 8821 and 3905 suffer from an insecure password storage vulnerability.

tags | exploit
systems | cisco
advisories | CVE-2022-20660
SHA-256 | 448c7c5cfcae3fc7bd414ad5be07cfbb1b7d955c723ac1c0f73d5e456f4c69e5

Cisco IP Phone Cleartext Password Storage

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20220113-0 >
=======================================================================
title: Cleartext Storage of Phone Password
product: Cisco IP Phone Series 78x1, 88x5, 88x1, 7832,
8832, 8821 and 3905
vulnerable version: Firmware <14.1.1,
Firmware <11.0(6)SR2 (device model 8821),
Firmware <9.4(1)SR5 (device model 3905)
fixed version: Firmware 14.1.1, 11.0(6)SR2, 9.4(1)SR5
CVE number: CVE-2022-20660
impact: Medium
homepage: https://www.cisco.com
found: 2021-04-15
by: Gerhard Hechenberger (Office Vienna)
Steffen Robertz (Office Vienna)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult, an Atos company
Europe | Asia | North America

https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
"The Cisco® IP Phone 7800 Series is a cost-effective, high-fidelity voice
communications portfolio designed to improve your organization’s people-centric
communications, while reducing your operating costs. It combines an attractive
new ergonomic design with “always-on” reliability and secure encrypted
communications. The Cisco® IP Phone 7800 Series delivers advanced IP Telephony
features and crystal clear wideband audio performance to deliver an
easy-to-use, full-featured voice communications experience on Cisco on-premises
and hosted infrastructure platforms and third party hosted call control."

Source: https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7800-series/data-sheet-c78-729488.html


Business recommendation:
------------------------
SEC Consult recommends to update the devices to the newest firmware listed
below, where, according to the vendor, the documented issue is fixed.

We want to thank Cisco for the very professional response and great coordination.


Vulnerability overview/description:
-----------------------------------
1) Cleartext Storage of Phone Password
The phone is storing the "phone password", which is needed to access its
administrative settings, in cleartext (in multiple locations) in the flash
memory.

Because the password is not hashed using a suitable cryptographic hash function
and the storage is unencrypted, a physical attacker can easily recover the
password and reuse it on other phones, if they are not configured to use unique
administrative passwords.


Proof of concept:
-----------------
1) Cleartext Storage of Phone Password
Steps to take:
- Configure a phone password via the TFTP XML provisioning feature.
- Desoldering the memory and reading its content.
- Analyzing the memory content. As example, the Linux command 'strings' can be
used below to show the identified password in cleartext in the dumped data.
----------------------------------------
$ strings nand.dump | grep phonePassword
phonePassword>sectest</,x
phonePassword>sectest</,x
phonePassword>sectest</,x
phonePassword>sectest</,x
----------------------------------------


Vulnerable / tested versions:
-----------------------------
The following firmware/device has been tested:
* Cisco IP Phone 7821: Firmware version 12.8.1-0001-455

The vendor confirmed that the following devices are affected:
* Cisco IP Phone 78x1 all releases before firmware version 14.1.1
* Cisco IP Phone 88x5 all releases before firmware version 14.1.1
* Cisco IP Phone 88x1 all releases before firmware version 14.1.1
* Cisco IP Phone 7832 all releases before firmware version 14.1.1
* Cisco IP Phone 8832 all releases before firmware version 14.1.1
* Cisco IP Phone 8821 all releases before firmware version 11.0(6)SR2
* Cisco IP Phone 3905 all releases before firmware version 9.4(1)SR5


Vendor contact timeline:
------------------------
2021-05-19: Contacting vendor through psirt@cisco.com. Set preliminary release
date to 2021-08-07. Received PSIRT case number from Cisco employee.
2021-05-20: Cisco states that the finding has been shared with the development
team and is currently being analyzed.
2021-06-30: Cisco confirms affected phone models and communicates expected
dates for fixed firmware releases.
2021-07-07: New estimated release date was set to 2022-01-31.
2021-12-27: Cisco informs about the fix and the publishing date 2022-01-12 for
their advisory
2022-01-13: Coordinated release of the security advisory.



Solution:
---------
Update the firmware of the affected devices to the latest available version.
See the vendor's security advisory for further information:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA


Workaround:
-----------
For immediate mitigation, ensure that phones are configured to use unique
administrative passwords.


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab

SEC Consult, an Atos company
Europe | Asia | North America

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos company. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF Gerhard Hechenberger, Steffen Robertz / @2022


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close