CVE-2012-6611
📋 TL;DR
CVE-2012-6611 is a critical authentication bypass vulnerability in Polycom video conferencing systems where the administrative web interface has a blank default password. This allows attackers to gain full administrative control without authentication. Affected systems include Polycom HDX 8000 series running specific firmware versions.
💻 Affected Systems
- Polycom HDX 8000 series video conferencing systems
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the video conferencing system, enabling attackers to intercept calls, install backdoors, pivot to internal networks, and disrupt business communications.
Likely Case
Unauthorized administrative access leading to configuration changes, call interception, and potential data exfiltration from video conferences.
If Mitigated
Limited impact if strong network segmentation and access controls prevent external access to the management interface.
🎯 Exploit Status
Exploitation requires only accessing the web interface with blank credentials. Public exploit code demonstrates simple HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions after Durango 2.6.0 4740
Vendor Advisory: https://support.polycom.com/content/support/security-center.html
Restart Required: Yes
Instructions:
1. Check current firmware version via web interface. 2. Download latest firmware from Polycom support portal. 3. Upload and install firmware via web interface. 4. Reboot system after installation completes.
🔧 Temporary Workarounds
Set Strong Administrative Password
allImmediately change the default blank password to a strong, unique password.
Login to web interface with blank password
Navigate to System > Administration > Password
Set new strong password
Restrict Network Access
linuxBlock external access to the management interface using firewall rules.
iptables -A INPUT -p tcp --dport 80 -s trusted_networks -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_networks -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Isolate affected systems in a separate VLAN with strict access controls
- Implement network monitoring for unauthorized access attempts to the management interface
🔍 How to Verify
Check if Vulnerable:
Attempt to access the Polycom web management interface at http://<device-ip> using blank username and password. If login succeeds, system is vulnerable.
Check Version:
curl -s http://<device-ip>/system/info | grep 'Software Version'
Verify Fix Applied:
Verify firmware version is updated and test that blank password no longer works for administrative access.
📡 Detection & Monitoring
Log Indicators:
- Successful login attempts with blank credentials
- Multiple failed login attempts followed by successful access
- Configuration changes from unexpected IP addresses
Network Indicators:
- HTTP/HTTPS traffic to Polycom management interface from external IPs
- Unusual outbound connections from Polycom device
SIEM Query:
source="polycom-logs" AND (event="login_success" AND user="" OR event="config_change" AND src_ip NOT IN [trusted_ips])
🔗 References
- https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html
- https://www.exploit-db.com/exploits/43032
- https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html
- https://www.exploit-db.com/exploits/43032