CVE-2023-4464

7.2 HIGH

📋 TL;DR

This critical vulnerability in Poly VoIP devices allows remote attackers to execute arbitrary operating system commands via the Diagnostic Telnet Mode component. It affects numerous Poly Trio, CCX, EDGE, and VVX models, potentially compromising the entire device. Attackers can exploit this without authentication to gain full control.

💻 Affected Systems

Products:
  • Poly Trio 8300
  • Trio 8500
  • Trio 8800
  • Trio C60
  • CCX 350
  • CCX 400
  • CCX 500
  • CCX 505
  • CCX 600
  • CCX 700
  • EDGE E100
  • EDGE E220
  • EDGE E300
  • EDGE E320
  • EDGE E350
  • EDGE E400
  • EDGE E450
  • EDGE E500
  • EDGE E550
  • VVX 101
  • VVX 150
  • VVX 201
  • VVX 250
  • VVX 300
  • VVX 301
  • VVX 310
  • VVX 311
  • VVX 350
  • VVX 400
  • VVX 401
  • VVX 410
  • VVX 411
  • VVX 450
  • VVX 500
  • VVX 501
  • VVX 600
  • VVX 601
Versions: All versions before patches
Operating Systems: Embedded VoIP OS
Default Config Vulnerable: ⚠️ Yes
Notes: Diagnostic Telnet Mode appears to be enabled by default in affected configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent malware, pivot to internal networks, exfiltrate sensitive data, or render devices unusable.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, and use as a foothold for lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are isolated in separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly exploited by any remote attacker.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit vulnerable devices to gain footholds.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to HP/Poly advisory HPSBPY03898 for specific firmware versions

Vendor Advisory: https://support.hp.com/us-en/document/ish_9931565-9931594-16/hpsbpy03898

Restart Required: Yes

Instructions:

1. Identify affected devices using version check. 2. Download latest firmware from HP/Poly support portal. 3. Apply firmware update following vendor instructions. 4. Verify update completed successfully. 5. Restart devices as required.

🔧 Temporary Workarounds

Disable Diagnostic Telnet Mode

all

Disable the vulnerable Diagnostic Telnet Mode feature if not required for operations.

Access device admin interface > Security settings > Disable Diagnostic Telnet Mode

Network Access Control

linux

Restrict network access to Poly devices using firewall rules or network segmentation.

iptables -A INPUT -p tcp --dport 23 -j DROP
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" port port="23" protocol="tcp" accept'

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules blocking all unnecessary inbound traffic.
  • Implement network monitoring and intrusion detection specifically for Telnet traffic to Poly devices.

🔍 How to Verify

Check if Vulnerable:

Check if Diagnostic Telnet Mode is enabled on port 23 and test with public exploit scripts from GitHub repository.

Check Version:

Access device web interface > System Information > Firmware Version or use SSH/Telnet to check version

Verify Fix Applied:

Verify firmware version matches patched versions in vendor advisory and test that Diagnostic Telnet Mode no longer accepts command injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Telnet connections to device port 23
  • Suspicious command execution in system logs
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Telnet traffic to Poly devices from unexpected sources
  • Unusual outbound connections from Poly devices

SIEM Query:

source="poly_device" AND (port=23 OR protocol="telnet") AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export