A vulnerability has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation leads to protection mechanism failure. The attack can be launched remotely. The vendor explains that they do not regard this as a vulnerability as this is a feature that they offer to their customers who have a variety of environmental needs that are met through different firmware builds. To avoid potential roll-back attacks, they remove vulnerable builds from the public servers as a remediation effort. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249259.
References
Link | Resource |
---|---|
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | Not Applicable |
https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices | |
https://modzero.com/en/advisories/mz-23-01-poly-voip/ | |
https://vuldb.com/?ctiid.249259 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.249259 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-12-29T09:38:01.706Z
Updated: 2024-01-09T16:16:22.625Z
Reserved: 2023-08-21T17:03:57.119Z
Link: CVE-2023-4466
JSON object: View
NVD Information
Status : Modified
Published: 2023-12-29T10:15:12.470
Modified: 2024-05-17T02:31:36.040
Link: CVE-2023-4466
JSON object: View
Redhat Information
No data.
CWE