CVE-2024-52883

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in AudioCodes One Voice Operations Center (OVOC) allows unauthenticated attackers to read sensitive data. This affects all OVOC installations before version 8.4.582. The vulnerability enables unauthorized access to files on the server.

💻 Affected Systems

Products:
  • AudioCodes One Voice Operations Center (OVOC)
Versions: All versions before 8.4.582
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive configuration files, credentials, and system data leading to full system takeover or data exfiltration.

🟠

Likely Case

Unauthorized access to configuration files, logs, and potentially credentials stored on the file system.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill due to path traversal nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.4.582 or later

Vendor Advisory: https://www.audiocodes.com/solutions-products/products/management-products-solutions/one-voice-operations-center

Restart Required: No

Instructions:

1. Download OVOC version 8.4.582 or later from AudioCodes support portal. 2. Follow AudioCodes upgrade documentation. 3. Verify successful upgrade and test functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to OVOC management interface to trusted IPs only

Web Application Firewall

all

Deploy WAF with path traversal protection rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OVOC from untrusted networks
  • Deploy file integrity monitoring to detect unauthorized file access attempts

🔍 How to Verify

Check if Vulnerable:

Check OVOC web interface version in administration panel or system information page

Check Version:

Check via OVOC web interface: Administration > System Information

Verify Fix Applied:

Confirm version is 8.4.582 or higher in system information

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Multiple failed path traversal attempts
  • Access to sensitive file paths from unauthorized sources

Network Indicators:

  • HTTP requests with ../ sequences in URLs
  • Requests to unusual file paths on OVOC server

SIEM Query:

source="ovoc_web_logs" AND (url="*../*" OR status=200 AND url="*/config/*" OR url="*/password*")

🔗 References

📤 Share & Export