CVE-2024-29149

7.4 HIGH

📋 TL;DR

This CVE describes a time-of-check time-of-use (TOCTOU) vulnerability in Alcatel-Lucent ALE deskphones that allows authenticated attackers to replace legitimate firmware with malicious firmware during updates. Attackers could gain persistent control over affected devices. Users of specific NOE and SIP deskphone models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Alcatel-Lucent ALE NOE deskphones
  • Alcatel-Lucent ALE SIP deskphones
Versions: NOE through 86x8_NOE-R300.1.40.12.4180, SIP through 86x8_SIP-R200.1.01.10.728
Operating Systems: Embedded phone firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the phone system for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent backdoor installation, credential theft, call interception, and lateral movement within the phone network.

🟠

Likely Case

Unauthorized firmware modification leading to device malfunction, data exfiltration, or use as pivot point for network attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, firmware validation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and precise timing during firmware update process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 86x8_NOE-R300.1.40.12.4180 for NOE, after 86x8_SIP-R200.1.01.10.728 for SIP

Vendor Advisory: https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-c0071-ed01.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Alcatel-Lucent support portal. 2. Upload to phone management system. 3. Schedule firmware update for affected devices. 4. Verify successful update completion.

🔧 Temporary Workarounds

Disable automatic firmware updates

all

Prevent automatic firmware updates that could be intercepted

Configure phone system to require manual approval for all firmware updates

Network segmentation

all

Isolate phone network from critical systems

Implement VLAN segmentation for VoIP devices
Configure firewall rules to restrict phone network access

🧯 If You Can't Patch

  • Implement strict access controls to phone management interfaces
  • Monitor for unauthorized firmware modification attempts

🔍 How to Verify

Check if Vulnerable:

Check phone firmware version via web interface or management console against affected version ranges

Check Version:

Access phone web interface at http://[phone-ip]/ or use management console to check firmware version

Verify Fix Applied:

Confirm firmware version is above vulnerable versions: NOE > R300.1.40.12.4180, SIP > R200.1.01.10.728

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware update attempts
  • Authentication failures followed by firmware modification
  • Firmware version changes outside maintenance windows

Network Indicators:

  • Unusual traffic patterns during firmware update windows
  • Connections to unexpected external IPs during updates

SIEM Query:

source="phone_system" AND (event="firmware_update" OR event="firmware_modification")

🔗 References

📤 Share & Export