The SIP service in Polycom VVX 500 and 601 devices 5.8.0.12848 and earlier allow remote attackers to obtain sensitive phone configuration information by leveraging use with an on-premise installation with Skype for Business.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105746 | Third Party Advisory VDB Entry |
https://seclists.org/bugtraq/2018/Oct/33 | Exploit Mailing List Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-028.txt | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/105746 | Third Party Advisory VDB Entry |
https://seclists.org/bugtraq/2018/Oct/33 | Exploit Mailing List Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-028.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2018-10-24 22:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18566
Mitre link : CVE-2018-18566
CVE.ORG link : CVE-2018-18566
JSON object : View
Products Affected
polycom
- vvx_500_firmware
- vvx_601
- vvx_601_firmware
- unified_communications_software
- vvx_500
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor