CVE-2024-52881

7.5 HIGH

📋 TL;DR

AudioCodes OVOC versions before 8.4.582 use a hard-coded cryptographic key, allowing attackers to decrypt sensitive data like passwords from topology files. This affects organizations using AudioCodes One Voice Operations Center for VoIP management. Attackers with access to topology files can compromise administrative credentials.

💻 Affected Systems

Products:
  • AudioCodes One Voice Operations Center (OVOC)
Versions: All versions before 8.4.582
Operating Systems: Not OS-specific - affects OVOC application
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. Topology files containing encrypted credentials are typically accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through credential theft leading to unauthorized administrative access, data exfiltration, and potential lateral movement within the network.

🟠

Likely Case

Attackers extract and decrypt passwords from accessible topology files, gaining administrative access to OVOC and potentially connected VoIP systems.

🟢

If Mitigated

Limited impact if topology files are properly secured with strict access controls and network segmentation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to topology files and knowledge of the hard-coded key. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.4.582

Vendor Advisory: https://www.audiocodes.com/solutions-products/products/management-products-solutions/one-voice-operations-center

Restart Required: No

Instructions:

1. Download OVOC version 8.4.582 or later from AudioCodes support portal. 2. Backup current configuration. 3. Install the update following AudioCodes upgrade documentation. 4. Verify successful installation.

🔧 Temporary Workarounds

Restrict topology file access

all

Implement strict file system permissions to limit access to topology files containing encrypted credentials.

Network segmentation

all

Isolate OVOC management interface from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls to topology files and monitor for unauthorized access attempts.
  • Rotate all credentials stored in OVOC and implement multi-factor authentication where possible.

🔍 How to Verify

Check if Vulnerable:

Check OVOC version in web interface or via CLI. Versions below 8.4.582 are vulnerable.

Check Version:

Check web interface or use OVOC CLI command: show version

Verify Fix Applied:

Confirm OVOC version is 8.4.582 or higher and verify topology files no longer use hard-coded encryption.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to topology files
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual network traffic from OVOC management interface
  • Suspicious file transfers involving topology files

SIEM Query:

source="OVOC" AND (event_type="file_access" AND file_path="*topology*" AND user!="authorized_user")

🔗 References

📤 Share & Export