Researchers reveal VoIP vulnerabilities
The VoIP vulnerabilities, if successfully exploited, could affect brand reputation, internal productivity, and competitive advantage, researchers said.
VoIPshield does not reveal specifics about the vulnerabilities to the public, Bogdan Materna, VoIPshield Laboratories chief technology officer, told SCMagazineUS.com on Friday.
“We don't want to give hackers information to work from,” he said.
Instead, under its disclosure policy, VoIPshield works with the VoIP vendors to assist them in reproducing the vulnerabilities in their labs.
VoIPshield classifies the vulnerabilities into different categories -- remote code execution; unauthorized access; denial of service; and information harvesting – and rates them according to their severity.
Materna said that by passing the information of their vulnerability research, the company hopes that vendors will be able to take action to create patches for potential exploits. Avaya, Cisco and Nortel have acknowledged the latest vulnerabilities on their websites, and are issuing their own security advisories.
VoIP vulnerabilities appear to be increasing because more security researchers are focused on finding them, Lawrence Orans of Gartner told SCMagazineUS.com.
“Three to four years ago, there was far less focus on IP telephony vulnerabilities because the IP telephony installed base was much smaller,” Orans said. "In 2008, most of the widely deployed telephony systems have vulnerabilities that permit DOS attacks, privilege escalation and code execution attacks."
Because of these risks, he added, managers should scan their applications for vulnerabilities on a regular basis and prioritize software patches that resolve critical vulnerabilities.