Sponsored By

VOIPShield Says It's Found Lots of VulnerabilitiesVOIPShield Says It's Found Lots of Vulnerabilities

VOIPShield, a VOIP security company, says it's found some 80 vulnerabilities in Avaya, Cisco and Nortel IP-telephony gear, and another 44 vulnerabilities in the SIP protocol. More detail on each vulnerability is spelled out in the Research section of VOIPShield's website . According to the website, the vendors are working on fixes for their respective vulnerabilities, and in cases of 3 vulnerabilities rated as "critical," patches are already available.

Eric Krapf

April 2, 2008

3 Min Read
No Jitter logo in a gray background | No Jitter

VOIPShield, a VOIP security company, says it's found some 80 vulnerabilities in Avaya, Cisco and Nortel IP-telephony gear, and another 44 vulnerabilities in the SIP protocol. More detail on each vulnerability is spelled out in the Research section of VOIPShield's website. According to the website, the vendors are working on fixes for their respective vulnerabilities, and in cases of 3 vulnerabilities rated as "critical," patches are already available.

VOIPShield, a VOIP security company, says it's found some 80 vulnerabilities in Avaya, Cisco and Nortel IP-telephony gear, and another 44 vulnerabilities in the SIP protocol. More detail on each vulnerability is spelled out in the Research section of VOIPShield's website. According to the website, the vendors are working on fixes for their respective vulnerabilities, and in cases of 3 vulnerabilities rated as "critical," patches are already available.VOIPShield cleverly timed the announcement of these vulnerabilities to coincide with the release of new products aimed at mitigating security risks: VOIPguard is a "voice intrusion prevention system" that scans voice packets for attack signatures; and the existing VOIPAudit vulnerability-assessment tool is being released as a software download that can run on any OS, where previously it had been a Linux appliance.

The 80 vendor-related vulnerabilities break down as 39 for Nortel, 29 for Cisco, and 12 for Avaya. However, when I talked with VOIPShield CEO Rick Dalmazzi about the announcement, he cautioned that you shouldn't read anything into which vendor had more vulnerabilities. That's because VOIPShield has been testing Nortel longer than any of the other systems; it doesn't mean Nortel systems inherently have more vulnerabilities than the others': "This is sort of an arbitrary number based on the amount of time we spent banging on these systems," Dalmazzi told me.

An obvious concern with any system that does deep-packet inspection would be the effect on real-time performance, but Dalmazzi claims that the VOIPguard "VIPS" can inspect packets for attack signatures while introducing no more than 10 milliseconds' latency. He also said that federal agencies--he named the FDIC--are starting to ask about protection for VOIP traffic among the enterprises they oversee.

The VOIPguard system comes in four models, supporting:

  • 20 calls per second/72,000 busy hour call attempts (BHCA); list price $5,000

  • 50 calls per second/180,000 BHCA; list price $10,000

  • 100 calls per second/360,000 BHCA; list price $25,000

  • 200 calls per second/720,000 BHCA; list price $50,000

    There's also a yearly subscription fee to keep the signature database updated.

    It's been noted, most recently at VoiceCon by Mark Collier of SecureLogix, that we aren't seeing a lot of attacks actually directed at the vulnerabilities that may exist within VOIP systems themselves; the big danger remains more generalized attacks on the underlying IP infrastructure. Still, it's wise to keep informed on vulnerabilities and patch them before the attackers turn their attention to IP telephony systems.

    There's also a yearly subscription fee to keep the signature database updated.

    It's been noted, most recently at VoiceCon by Mark Collier of SecureLogix, that we aren't seeing a lot of attacks actually directed at the vulnerabilities that may exist within VOIP systems themselves; the big danger remains more generalized attacks on the underlying IP infrastructure. Still, it's wise to keep informed on vulnerabilities and patch them before the attackers turn their attention to IP telephony systems.

About the Author

Eric Krapf

Eric Krapf is General Manager and Program Co-Chair for Enterprise Connect, the leading conference/exhibition and online events brand in the enterprise communications industry. He has been Enterprise Connect.s Program Co-Chair for over a decade. He is also publisher of No Jitter, the Enterprise Connect community.s daily news and analysis website.
 

Eric served as editor of No Jitter from its founding in 2007 until taking over as publisher in 2015. From 1996 to 2004, Eric was managing editor of Business Communications Review (BCR) magazine, and from 2004 to 2007, he was the magazine's editor. BCR was a highly respected journal of the business technology and communications industry.
 

Before coming to BCR, he was managing editor and senior editor of America's Network magazine, covering the public telecommunications industry. Prior to working in high-tech journalism, he was a reporter and editor at newspapers in Connecticut and Texas.