Polycom HDX < Multiple Vulnerabilities

Critical Nessus Plugin ID 70068


The remote host is affected by multiple vulnerabilities.


According to its self-reported version number, the firmware installed on the remote host is affected by multiple vulnerabilities :

- A command shell authorization bypass vulnerability exists that could be used by a malicious user to gain unauthorized access to the system, which could result in information disclosure.

- A command injection vulnerability exists that could allow an authenticated, malicious user to execute arbitrary commands on the system when using the firmware update functionality.

- A privilege escalation vulnerability exists that could lead to unauthorized system access and information disclosure.

- An H.323 format string vulnerability exists via a maliciously crafted call setup message that could lead to system instability or remote code execution.

- A SQL injection vulnerability exists via a maliciously crafted call setup message that could lead to remote code execution.

- The Polycom HDX uses a software update process that reads a PUP file containing all of the information and tools needed to properly update the system. A vulnerability has been discovered in the PUP file header MAC signature verification process that could allow a malicious user to extract the components of the PUP file.

Note that Nessus has not tested for the issues but has instead relied only on the application's self-reported version number.


Upgrade the firmware to version or later.

See Also












Plugin Details

Severity: Critical

ID: 70068

File Name: polycom_hdx_3_1_1_2.nasl

Version: 1.8

Type: remote

Family: Misc.

Published: 2013/09/23

Modified: 2018/11/15

Dependencies: 70067

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:polycom:hdx_system_software

Required KB Items: sip/polycom/hdx

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/01/18

Vulnerability Publication Date: 2013/01/18

Reference Information

BID: 57911, 58523, 58524, 58525, 58526

EDB-ID: 24494

IAVA: 2013-A-0073