How a conference room speakerphone might let attackers into your company network - Help Net Security

How a conference room speakerphone might let attackers into your company network - Help Net Security

Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in its proximity, download malicious firmware, achieve and maintain network persistence, and more, GRIMM researchers have discovered.



The vulnerabilities in the Stem Audio Table conference room speakerphone


The CVE numbers are yet to be assigned, but the found vulnerabilities include:



Stack buffer overflow and command injection flaws that could allow attackers to execute arbitrary code as root on the device
Bugs that could be exploited to bypass the (weak) authentication mechanism for accessing the web-based GUI, discover the current password, and control the device
Flawed usage of encryption in the communication between the STEM Audio Table device and the web GUI
Unsigned update packages (tarballs)

These are present in versions 2.0.0 and 2.0.1 of the device firmware.



Support the originator by clicking the read the rest link below.