The ShoreTel Mobility Client application for iOS is improperly validating SSL certificates provided by HTTPS connections, leaving the product susceptible to man-in-the-middle attacks, according to an advisory Tuesday by the Software Engineering Institute's CERT Coordination Center (CERT/CC) at Carnegie Mellon University.

Designated CVE-2016-6562, the vulnerability affects versions (the current version as of Jan. 3) and earlier of the mobility client, which is used to extend enterprise desk phone features and unified communications capabilities such as VoIP, cellular and video calling to iOS devices. The CERT/CC reports that an attacker on the same network as the iOS device “may be able to view or modify network traffic that should have been protected by HTTPS, which may lead to the exposure of sensitive account information, including login credentials.”

There is currently no solution or patch for this issue. However, a separate advisory posted on Info-Sec.CA noted that Sunnyvale, Calif.-based ShoreTel was alerted to the vulnerability on Oct. 17, 2016 and is presently working on an updated version. Security researcher David Coomber is credited with discovering the flaw.

UPDATE: On Jan. 6, 2017, ShoreTel provided SC Media with the following update: "The ShoreTel Mobility Client certificate validation issue is now resolved. ShoreTel Build fixes the vulnerability and is available in both Apple's App Store and Google's Play store."