exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

3CX Phone System Cleartext Passwords

3CX Phone System Cleartext Passwords
Posted Mar 21, 2022
Authored by Emanuel Duss

The 3CX Phone System stores password in the clear as well as makes them exportable in the administration interface.

tags | advisory
advisories | CVE-2021-45491
SHA-256 | 2c1705c4372ab218a33192a0a6965c618979430b30d44e4c74099369db74b516

3CX Phone System Cleartext Passwords

Change Mirror Download
#############################################################
#
# COMPASS SECURITY ADVISORY
# https://www.compass-security.com/research/advisories/
#
#############################################################
#
# Product: 3CX Phone System
# Vendor: 3CX
# CSNC ID: CSNC-2021-022
# CVE ID: CVE-2021-45491
# Subject: Exportable Cleartext Passwords
# CWE-ID: CWE-257 (Storing Passwords in a Recoverable Format)
# Severity: Medium
# Effect: Credential Reuse
# Author: Emanuel Duss <emanuel.duss@compass-security.com>
# Date: 2022-03-17
#
#############################################################

Introduction
------------

3CX is an open-platform office phone system that runs on premise on Windows or
Linux. 3CX was built for mobility, with remote work apps that offer secured
communication for the whole team. With the Android, iOS and Windows apps,
business communication is no longer tied to the office building. [1]

During a customer project, we identified a security vulnerability in the 3CX
system. The user passwords of the 3CX system are stored in plain text in the
database and are also exportable in the administration interface.


Affected
--------

- All versions of the 3CX application are affected.
- There is no fix from the vendor.


Description
-----------

The user passwords of the 3CX system are stored in plain text in the database
and are also exportable in the administration interface.

This can be verified by exporting the credentials via the admin interface or by
looking into the SQL database. This issue is also already documented in the
community forum since 2019 [2].

The storage of passwords in a recoverable format makes them subject to password
reuse attacks by malicious users. In fact, it should be noted that recoverable
encrypted passwords provide no significant benefit over plaintext passwords
since they are subject not only to reuse by malicious attackers but also by
malicious insiders. If a system administrator can recover a password directly,
or use a brute force search on the available information, the administrator can
use the password on other accounts. [3]


Vulnerability Classification
----------------------------

CVSS v3.1 Metrics [4]:

- CVSS Base Score: 5.5 (Medium)
- CVSS Vector: AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N


Workaround / Fix
----------------

# 3CX Vendor

A password hash function such as PBKDF2, bcrypt or scrypt should be used for
passwords. The passwords should also be provided with a salt that is generated
individually for each user. This can make attacks that use rainbow tables or
pre-calculated wordlists more difficult.

# 3CX Users

There is no security update for this vulnerability at the moment. According to
the 3CX, the vulnerability will be tackled in future redesigns of the
management console.


Timeline
--------

2021-12-16: Vulnerability discovered
2021-12-17: Discussed vulnerability with our customer
Asked 3CX for security contact on Twitter, community forum, support
email and contact form.
Got response via support mail. Security contact was dpo@3cx.com
Provided details
Requested CVE ID @ MITRE
2021-12-25: Assigned CVE-2021-45491
2022-01-03: Asked vendor if they understood the vulnerability.
Answer: Report was distributed internally.
2022-01-18: Asked vendor for any updates.
2022-02-02: Asked vendor for any updates.
2022-02-10: Asked vendor for any updates. 3CX can't tell when the issue will
be fixed.
2022-03-11: Asked vendor for any updates. 3CX thanked for the report. Issues
will be tackled in future redesigns of the management console.
2022-03-17: Coordinated public disclosure


Acknowledgement
---------------

Thanks 3CX for the coordinated disclosure.


References
----------

[1] https://www.3cx.com/
[2] https://www.3cx.de/forum/threads/klartext-passwort-willkommen-mail-also-auch-in-db.94280/
[3] https://cwe.mitre.org/data/definitions/257.html
[4] https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N&version=3.1


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close