McAfee researchers recently revealed that there is a remote code execution vulnerability called CVE-2009-0692 in the VOIP solution provider developed by Avaya. An attacker could exploit the vulnerability to hijack the phone’s normal operations, extract, steal audio, and monitor the device.
Avaya is a world-renowned VOIP solution and commercial desktop phone supplier and has signed service agreements with 90% of Fortune 500 companies. The device in question is the company’s Avaya 9600 series IP model. McAfee said that this issue was reported in 2009, but it still exists in this type of phone until today. In other words, the open-source software that had problems stopped the security update ten years ago. McAfee said that related exploits have been circulating online for many years.
The researchers said that CVE-2009-0692 is a stack overflow buffer vulnerability that exists in the ISC DHCP client. A malicious DHCP response to this vulnerability could perform an arbitrary code response by using client privileges and could crash the DHCP client port. The researchers said that the lack of security measures in the daemons of certain options in the DHCP client has led to this problem. It is reported that as long as the network of the target phone is connected, the hacker can carry out related attacks.
A firmware update and disc image have now been published by Avaya.