Sponsored By

Have You Patched Your Cisco IP Phones?Have You Patched Your Cisco IP Phones?

With the recent discovery of five zero-day vulnerabilities in a range of Cisco gear, you best make sure your network isn’t exposed.

Ryan Daily

February 10, 2020

2 Min Read
Have You Patched Your Cisco IP Phones?
Image: Nmedia - stock.adobe.com

Security software provider Armis last week disclosed that it found five zero-day vulnerabilities in various implementations of the Layer 2 Cisco Discovery Protocol (CDP) used in a variety of endpoints, including IP phones.

 

Working with Armis to develop and test mitigations, Cisco has released patches for the vulnerabilities. While patches are available, "most of the vulnerable devices don't auto-update and need manual patching," resulting in many devices still being unprotected from these vulnerabilities, Ben Seri, VP of research at Armis, noted in a Wired article.

 

In its research, Armis found four remote code execution vulnerabilities and one denial-of-service vulnerability, residing in the processing of CDP packets. One of the common uses of CDP is the management of IP phones; it allows a switch to allocate one VLAN for voice and another for any PC that is daisy-chained to the phone, according to Armis.

 

Dubbed CDPwn, the vulnerabilities include:

  1. Cisco IP phones stack overflow in PortID type length value (TLV) (CVE-2020-3111)

  2. Cisco IP cameras heap overflow in DeviceID TLV (CVE-2020-3110)

  3. Cisco IOS XR format string vulnerability in multiple TLVs (CVE-2020-3118)

  4. Cisco NX-OS stack overflow in the Power Request TLV (CVE-2020-3119)

  5. Cisco FXOS, IOS XR, and NX-OS resource exhaustion in the Addresses TLV (CVE-2020-3120)

With these vulnerabilities, remote hackers can overtake devices without user interaction to break network segmentation, gain access to additional devices by leveraging man-in-the-middle attacks, or exfiltrate data from IP phones and other network endpoints, Armis reported. The vulnerabilities impact firmware versions released in the last 10 years of a wide range of Cisco products, Armis said. Affected devices include NX-OS switches; NCS and IOS XR routers; Firepower firewalls; 800 IP cameras series; and the 7800 and 8800 series IP phones, according to Armis.

 

The joint mitigation effort followed Armis’s Aug. 29, 2019, alert to Cisco about the vulnerabilities, the security software firm reported. (Note that Seri will be discussing these vulnerabilities at BlackHat Asia, an Informa Tech event that will take place March 31 to April 3 in Singapore.)

About the Author

Ryan Daily

Ryan Daily is an associate editor and blogger for No Jitter, Informa Tech's online community for news and analysis of the enterprise convergence/unified communications industry, and program coordinator for Enterprise Connect. In her editorial role, Ryan is responsible for creating and editing content, engaging social media audiences, and leading the brand's diversity and inclusion initiative. In addition to this role, Ryan assists with the programming and planning of the Enterprise Connect event.

 

Before coming to Informa, Ryan worked as an editor for Perfumer & Flavorist magazine, where she regularly contributed in-depth feature articles for the flavor and fragrance industry and played a crucial role in two industry-related events: World Perfumery Congress and Flavorcon. Before this, she worked at Hallmark Data Systems and developed landing and web pages for various B2B publications.

 

She earned her bachelor’s degree in English from Northern Illinois University and a master’s in writing and publishing from DePaul University. In her free time, Ryan enjoys going to live music events, running with her dog Iris, drawing, and watching movies.