{"id":16595,"date":"2021-07-08T10:36:15","date_gmt":"2021-07-08T08:36:15","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2018-0038\/"},"modified":"2021-07-19T14:10:25","modified_gmt":"2021-07-19T12:10:25","slug":"usd-2018-0038","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2018-0038\/","title":{"rendered":"usd-2018-0038"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2018-0038 | Cisco Unified Communications Manager (CallManager)\/11.5.1.15900-18 (likely in all versions)<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2018-0038<\/span><br \/><strong>CVE Number<\/strong><span>: N\/A<\/span><br \/><strong>Affected Product<\/strong><span>: Unified Communications Manager<\/span><br \/><strong>Affected Version<\/strong><span>: 11.5.1.15900-18 (likely in all versions)<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Exposure of Sensitive Configuration Data<\/span><br \/><strong>Security Risk<\/strong><span>: High<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cisco.com<\/a><br \/><strong>Vendor Status<\/strong><span>: Unknown<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p>usd AG discovered that Cisco Unified Communications Manager (CallManager) and connected SX20 TelePresence devices communicate in clear-text. This communication includes the synchronization of configuration data (e.g. user names and passwords) as well as video and audio telephony data. Attackers in a man-in-the-middle position can exploit this to gain access to devices as well as eavesdrop on video conferencing calls. The attacker does not require network access to the CallManager itself to exploit this. A possible scenario could be an attacker who has (short-term) physical access to a conference room with an SX20 or similar device installed.<\/p>\n<p>Cisco Unified Communications Manager (CallManager) is a server component for video conferencing and video telephony infrastructures. A typical setup of Cisco Unified Communications infrastructures includes one or multiple CallManagers connected to a number of video conferencing devices, such as Cisco TelePresence SX20. The TelePresence devices, which can e.g. be located in conference rooms, connect to the CallManagers to retrieve configuration files and when a video call takes place.<br \/>usd discovered multiple vulnerabilities in the way these devices interact and within the CallManager itself.<\/p>\n<h3><\/h3>\n<h3>First Proof of Concept: Obtaining configuration data<\/h3>\n<p>An attacker with physical access to a video-conferencing room can plant a device which acts as a transparent network bridge between the SX20 device and the network switch. Periodically the SX20 will contact the CallManager to download configuration data. This is done in plain-text from TCP port 6970.<\/p>\n<p>This configuration data will contain the following XML tags:<br \/>&amp;ltAdminLoginDetails&amp;gt&amp;ltadminUserId&amp;gtadmin&amp;lt\/adminUserId&amp;gt&amp;ltadminPassword&amp;gtpassw0rd!&amp;lt\/adminPassword&amp;gt&amp;lt\/AdminLoginDetails&amp;gt<\/p>\n<h3>Second Proof of Concept: Eavesdropping on audio\/video calls<\/h3>\n<p>An attacker in a man-in-the-middle position can create network packet captures during video telephony calls. These captures can subsequently be used to extract audio and video data of the call, using videosnarf (https:\/\/www.jasonneurohr.com\/articles\/how-to-replay-h264-video-from-a-packet-capture).<\/p>\n<p>Please note that an attacker who is able to log into the SX20 administration panel on TCP Port 443 can also use the \u201eExtended Logging\u201c functionality to create similar packet captures. This does not require a man-in-the-middle attack. Attack vectors for obtain administrative access are described in <a href=\"\/security-advisories\/usd-2019-0002\/\">usd-2018-0035<\/a>, <a href=\"\/security-advisories\/usd-2019-0002\/\">usd-2018-0036<\/a> and <a href=\"\/security-advisories\/usd-2019-0002\/\">usd-2018-0037<\/a>.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><span>The communication between tele presence devices and the CallManager should use TLS transport encryption with certificate verification. This would ensure that no clear-text data can be intercepted.<\/span><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2018-10-31 Advisory has been sent to psirt@cisco.com<\/li>\n<li>2018-11-09 extended public disclosure deadline to 2019-01-23<\/li>\n<li>2019-01-23 Security advisory released<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was discovered by Marcus Gruber and Maximilian Boehner of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2018-0038 | Cisco Unified Communications Manager (CallManager)\/11.5.1.15900-18 (likely in all versions) Advisory ID: usd-2018-0038CVE Number: N\/AAffected Product: Unified Communications ManagerAffected Version: 11.5.1.15900-18 (likely in all versions)Vulnerability Type: Exposure of Sensitive Configuration DataSecurity Risk: HighVendor URL: https:\/\/www.cisco.comVendor Status: Unknown Description usd AG discovered that Cisco Unified Communications Manager (CallManager) and connected SX20 TelePresence devices communicate in [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16595","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16595"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16595\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}