Cisco working to fix broken patch for VoIP phones

Cisco said its first patch was ineffective but a revised patch is being developed

Cisco Systems plans to release a new patch for a vulnerability in its VoIP phones after the first patch did not fix the problem, which could allow an attacker to eavesdrop on conversations.

The vulnerability is one of several discovered by Ang Cui, a doctoral candidate, and computer science professor Salvatore Stolfo, both of Columbia University's engineering department.

Cisco issued a patch, but it did not fix the problem. A spokesman said Tuesday that Cisco has its A-Team working on mitigations and a permanent patch. The company plans to issue a security advisory and a detailed mitigation document later this week, he said.

The researchers, who received funding from the Defense Advanced Research Projects Agency (DARPA), analyzed the Unix-like firmware inside Cisco's phones. They found it was possible to eavesdrop on private conversations by tampering with a subset of Cisco's Unified IP phones in the 7900 series running a version of Cisco IP Phone software up to and including 9.3.1-ES10.

Their attack was demonstrated at the Chaos Computer Conference in Hamburg last month.

Once the device is hacked, however, a user of the phone would have no idea the conversation is being monitored, the researchers said. An attacker can also turn on the device's microphone, which would pick up sounds and conversations in the vicinity of the phone.

Cui designed a small wired device, which he calls the "thingp3wn3r," which delivers attack code by hooking into the RJ11 serial port of a Cisco phone. He used a mobile phone to connect to the "thingp3wn3r" over a Bluetooth connection in order to remotely deliver the exploit, according to the video. The researchers say a phone could also be attacked remotely by penetrating an organization's network.

In a security advisory, Cisco describes the vulnerability as a failure to properly validate certain system calls made to the kernel of the device.

"This failure could allow the attacker to overwrite arbitrary portions of user or kernel space memory," which could allow an attacker to take complete control of the device, according to Cisco.

Cui is working on a defense technology called "Software Symbiotes" that is designed to protect embedded systems, such as printers and routers, from code-injection attacks like the one performed against Cisco's phones. The technology would protect Cisco's IP phone, and Cui plans to demonstrate it in the future at a conference.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags Cisco SystemstelecommunicationvoipsecurityExploits / vulnerabilities

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Risk Management Solutions

Protect resources and ensure security compliance through incident detection, response, and remediation.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.