CVE-2023-22957
📋 TL;DR
This vulnerability allows attackers with access to backup or configuration files to decrypt sensitive information using a hard-coded cryptographic key in AudioCodes VoIP desk phones. Affected organizations using these phones could have device root passwords and other encrypted data exposed. The issue affects AudioCodes VoIP desk phones through version 3.4.4.1000.
💻 Affected Systems
- AudioCodes VoIP desk phones
📦 What is this software?
405hd Firmware by Audiocodes
445hd Firmware by Audiocodes
C435hd Firmware by Audiocodes
C450hd Firmware by Audiocodes
C455hd Firmware by Audiocodes
C470hd Firmware by Audiocodes
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain root access to VoIP phones, potentially compromising entire phone systems, intercepting calls, or using phones as footholds into corporate networks.
Likely Case
Attackers with physical or network access to configuration files decrypt root passwords and gain administrative control over individual phones.
If Mitigated
With proper network segmentation and access controls, impact is limited to individual phone compromise without lateral movement.
🎯 Exploit Status
Exploitation requires access to backup or configuration files, which may be obtained through physical access, network compromise, or insecure file transfers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.4.4.1000
Vendor Advisory: https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt
Restart Required: Yes
Instructions:
1. Contact AudioCodes for updated firmware. 2. Backup phone configurations. 3. Apply firmware update via management interface. 4. Restart phones. 5. Verify new firmware version.
🔧 Temporary Workarounds
Restrict configuration file access
allLimit access to phone configuration and backup files to authorized administrators only.
Network segmentation
allIsolate VoIP phones on separate VLANs with strict firewall rules.
🧯 If You Can't Patch
- Physically secure phones to prevent unauthorized access to configuration interfaces
- Monitor network traffic to/from phones for unusual configuration file transfers
🔍 How to Verify
Check if Vulnerable:
Check firmware version via phone web interface or console. If version is 3.4.4.1000 or earlier, device is vulnerable.
Check Version:
Check via phone web interface at System Information or via console command depending on model
Verify Fix Applied:
Verify firmware version is newer than 3.4.4.1000 and test that encrypted values in configuration files cannot be decrypted with known hard-coded key.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to configuration files
- Multiple failed login attempts to phone admin interface
- Unexpected firmware version changes
Network Indicators:
- Unusual TFTP/FTP transfers to/from phones
- Configuration file downloads from unauthorized sources
SIEM Query:
source="voip_phones" AND (event="config_download" OR event="firmware_update") AND user!="authorized_admin"
🔗 References
- http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html
- http://seclists.org/fulldisclosure/2023/Aug/15
- https://syss.de
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt
- http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html
- http://seclists.org/fulldisclosure/2023/Aug/15
- https://syss.de
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt