The Hacker News reports that threat actors could remotely exploit now-addressed security vulnerabilities in Linphone and MicroSIP softphone software to enable client crashes and exfiltrate sensitive data through phone calls.
SySS GmbH researcher Moritz Abrell discovered that the softphones could be impacted by a SIP Digest Leak attack, which involves SIP INVITE message and "407 proxy authentication required" HTTP response status code delivery that would eventually result in the targeted softphone to respond with appropriate authentication data.
"With this information, the attacker is able to perform an offline password guessing attack, and, if the guessing attack is successful, obtain the plaintext password of the targeted SIP account. Therefore, this vulnerability in combination with weak passwords is a significant security issue," said Abrell.
Meanwhile, the Linphone SIP stack was found to have a NULL pointer dereference flaw that could be set off through a delivery of a customized SIP INVITE request.
"The security level of SIP stacks still needs improvement," Abrell said.
Identity, Threat Management
Linphone, MicroSIP softphones impacted by critical vulnerabilities
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds