CVE-2018-15509

9.8 CRITICAL

📋 TL;DR

Five9 Agent Desktop Plus 10.0.70 has incorrect access control in WebSocket connections, allowing unauthenticated attackers to perform denial-of-service attacks and potentially access sensitive data. This affects organizations using the vulnerable version of Five9's contact center software.

💻 Affected Systems

Products:
  • Five9 Agent Desktop Plus
Versions: 10.0.70
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects WebSocket implementation in the agent desktop software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of contact center operations, unauthorized access to customer data, and potential privilege escalation within the Five9 environment.

🟠

Likely Case

Denial-of-service affecting agent desktop functionality, disrupting call center operations and potentially exposing session data.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though WebSocket vulnerabilities remain concerning.

🌐 Internet-Facing: HIGH - WebSocket vulnerabilities are often exposed to internet traffic and can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but external exposure increases overall risk significantly.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public blog posts demonstrate exploitation techniques for WebSocket denial-of-service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 10.0.70

Vendor Advisory: https://www.five9.com/security

Restart Required: Yes

Instructions:

1. Contact Five9 support for latest secure version. 2. Backup current configuration. 3. Install updated version. 4. Restart services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict WebSocket traffic to trusted networks only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port port="443" protocol="tcp" accept'
netsh advfirewall firewall add rule name="Restrict Five9 WS" dir=in action=allow protocol=TCP localport=443 remoteip=TRUSTED_NETWORK

WebSocket Rate Limiting

linux

Implement rate limiting on WebSocket connections

iptables -A INPUT -p tcp --dport 443 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 443 -m state --state NEW -m recent --update --seconds 60 --hitcount 20 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit WebSocket traffic to authorized IPs only
  • Deploy Web Application Firewall (WAF) with WebSocket protection rules

🔍 How to Verify

Check if Vulnerable:

Check Five9 Agent Desktop Plus version in application settings or via 'About' menu. Version 10.0.70 is vulnerable.

Check Version:

Check application interface or consult Five9 documentation for version verification commands.

Verify Fix Applied:

Verify version is updated beyond 10.0.70 and test WebSocket connections for proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WebSocket connection patterns
  • Multiple failed authentication attempts on WebSocket endpoints
  • High volume of WebSocket connections from single IP

Network Indicators:

  • Excessive WebSocket traffic to Five9 ports
  • WebSocket connections bypassing authentication
  • Unusual WebSocket message patterns

SIEM Query:

source="five9_logs" AND (event_type="websocket_connection" AND auth_status="failed") OR (event_type="websocket_flood" AND threshold_exceeded="true")

🔗 References

📤 Share & Export