CVE-2023-47304

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers with physical access to bypass UART authentication on Vonage Box Telephone Adapter devices. Attackers can read and write arbitrary values to device memory, potentially compromising device integrity and confidentiality. Only users of specific Vonage hardware adapters are affected.

💻 Affected Systems

Products:
  • Vonage Box Telephone Adapter VDV23
Versions: VDV21-3.2.11-0.5.1
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires physical access to UART pins on the device circuit board. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing firmware modification, credential theft, persistent backdoor installation, and potential lateral movement to connected networks.

🟠

Likely Case

Local attackers with physical access can extract sensitive information, modify device configuration, or disrupt telephony services.

🟢

If Mitigated

With proper physical security controls, the risk is limited to authorized personnel only.

🌐 Internet-Facing: LOW - Requires physical access to UART interface, not remotely exploitable.
🏢 Internal Only: MEDIUM - Physical access requirement reduces risk, but insider threats or unauthorized physical access could exploit this.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access and basic hardware skills. Public technical details available in referenced articles.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

No official patch available. Contact Vonage support for firmware updates or replacement options.

🔧 Temporary Workarounds

Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized personnel from accessing device hardware.

UART Interface Disable/Protect

all

Physically disable or obscure UART pins on the circuit board to prevent connection.

🧯 If You Can't Patch

  • Deploy devices in physically secure locations with access controls and monitoring
  • Consider replacing affected devices with updated models if available from vendor

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or serial console. If version is VDV21-3.2.11-0.5.1, device is vulnerable.

Check Version:

Check device web interface or use serial console connection to query firmware version

Verify Fix Applied:

Verify with Vonage if updated firmware is available and confirm version is newer than VDV21-3.2.11-0.5.1.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Configuration changes without authorization
  • Serial console access attempts

Network Indicators:

  • Unusual telephony traffic patterns
  • Device communicating with unexpected endpoints

SIEM Query:

Search for device model 'VDV23' with firmware version 'VDV21-3.2.11-0.5.1' in asset inventory

🔗 References

📤 Share & Export