Polycom HDX < 3.1.1.2 Multiple Vulnerabilities

critical Nessus Plugin ID 70068
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the firmware installed on the remote host is affected by multiple vulnerabilities :

- A command shell authorization bypass vulnerability exists that could be used by a malicious user to gain unauthorized access to the system, which could result in information disclosure.

- A command injection vulnerability exists that could allow an authenticated, malicious user to execute arbitrary commands on the system when using the firmware update functionality.

- A privilege escalation vulnerability exists that could lead to unauthorized system access and information disclosure.

- An H.323 format string vulnerability exists via a maliciously crafted call setup message that could lead to system instability or remote code execution.

- A SQL injection vulnerability exists via a maliciously crafted call setup message that could lead to remote code execution.

- The Polycom HDX uses a software update process that reads a PUP file containing all of the information and tools needed to properly update the system. A vulnerability has been discovered in the PUP file header MAC signature verification process that could allow a malicious user to extract the components of the PUP file.

Note that Nessus has not tested for the issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the firmware to version 3.1.1.2 or later.

See Also

http://www.nessus.org/u?223bdf37

http://www.nessus.org/u?9cfb2862

http://www.nessus.org/u?e0487104

http://www.nessus.org/u?a5de708c

http://www.nessus.org/u?8153ac86

http://www.nessus.org/u?830d8b65

http://www.nessus.org/u?06fbef9b

https://seclists.org/fulldisclosure/2013/Mar/149

https://seclists.org/bugtraq/2013/Mar/98

https://seclists.org/fulldisclosure/2013/Mar/151

https://seclists.org/fulldisclosure/2013/Mar/148

Plugin Details

Severity: Critical

ID: 70068

File Name: polycom_hdx_3_1_1_2.nasl

Version: 1.9

Type: remote

Family: Misc.

Published: 9/23/2013

Updated: 6/3/2021

Dependencies: polycom_sip_detect.nasl

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:polycom:hdx_system_software

Required KB Items: sip/polycom/hdx

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/18/2013

Vulnerability Publication Date: 1/18/2013

Reference Information

BID: 57911, 58523, 58524, 58525, 58526

EDB-ID: 24494

IAVA: 2013-A-0073-S