CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-28066

Medium Severity
SVRS
38/100

CVSSv3
NA/10

EPSS
0.00076/1

CVE-2024-28066: Unify CP IP Phone uses weak credentials, specifically a hardcoded root password, in firmware version 1.10.4.3. This vulnerability allows unauthorized access, posing a significant security risk. The SOCRadar Vulnerability Risk Score (SVRS) is 38, indicating a moderate risk requiring monitoring, although not immediate action. The use of hardcoded passwords contradicts best practices, allowing attackers to compromise the phone system with relative ease. Successful exploitation could lead to eavesdropping, denial of service, or using the compromised phone as a beachhead to attack the network. While the CVSS score is 0, the presence of this vulnerability "In The Wild" necessitates careful consideration for organizations still using the affected firmware. Mitigation should include upgrading to a patched firmware version or implementing network segmentation.

In The Wild
2024-04-08

2024-08-15
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-28066 is a vulnerability in Unify CP IP Phone firmware 1.10.4.3 that involves the use of weak credentials, specifically a hardcoded root password. This vulnerability allows unauthorized access to the device, potentially leading to remote code execution and other malicious activities. The SVRS score of 38 indicates a moderate level of risk, highlighting the need for prompt attention.

Key Insights:

  • Weak Credentials: The vulnerability stems from the use of a hardcoded root password, which is easily accessible to attackers. This allows them to gain unauthorized access to the device without the need for authentication.
  • Remote Code Execution: Once an attacker gains access to the device, they can execute arbitrary code, potentially leading to the installation of malware, data theft, or disruption of services.
  • In The Wild: The vulnerability is actively exploited by hackers, making it crucial for organizations to take immediate action to mitigate the risk.

Mitigation Strategies:

  • Update Firmware: Apply the latest firmware update from Unify to address the vulnerability.
  • Change Default Credentials: Change the default root password to a strong and unique one.
  • Enable Two-Factor Authentication: Implement two-factor authentication to add an extra layer of security to the device.
  • Monitor Network Traffic: Monitor network traffic for any suspicious activity or unauthorized access attempts.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://syss.de
[email protected]https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt
GITHUBhttps://syss.de
GITHUBhttps://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt

CWE Details

CWE IDCWE NameDescription
CWE-259Use of Hard-coded PasswordThe software contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence