Polycom VVX 500 and 601 devices 5.8.0.12848 and earlier allows man-in-the-middle attackers to obtain sensitive credential information by leveraging failure to validate X.509 certificates when used with an on-premise installation with Skype for Business.
References
Link | Resource |
---|---|
https://seclists.org/bugtraq/2018/Oct/36 | Exploit Mailing List Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2018/Oct/36 | Exploit Mailing List Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://seclists.org/bugtraq/2018/Oct/36 - Exploit, Mailing List, Third Party Advisory | |
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt - Exploit, Third Party Advisory |
Information
Published : 2018-10-24 22:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18568
Mitre link : CVE-2018-18568
CVE.ORG link : CVE-2018-18568
JSON object : View
Products Affected
polycom
- vvx_500
- vvx_601
- vvx_500_firmware
- unified_communications_software
- vvx_601_firmware
CWE
CWE-295
Improper Certificate Validation