CCX - UI does not properly restrict User
Vulnerability Summary
A vulnerability in the local user interface of the CCX500 phones could allow a local attacker access to restricted device settings. The vulnerability is due to a lack of restrictions on some device settings. A successful exploit could allow the local attacker to enable restricted options or change persistent system configuration settings.
Published
Last Update: 3/8/2022
Initial Public Release: 1/22/2020
Advisory ID: PLYVC20-02
CVSS Score: 7.3
CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Product Affected
PRODUCTS | FIRMWARE | FIX |
---|---|---|
CCX 400 | 1.0.0.2535 and prior |
UCS_CCX_5.9.12.1111 and above |
CCX 500 | 1.0.0.2535 and prior |
UCS_CCX_5.9.12.1111 and above |
CCX 600 | 1.0.0.2535 and prior |
UCS_CCX_5.9.12.1111 and above |
CCX 700 | 1.0.0.2535 and prior |
UCS_CCX_5.9.12.1111 and above |
Solution
Poly has released a software update that addresses this vulnerability. There are no workarounds that address this vulnerability. CCX500 devices running software version 1.0.0.2535 should be updated to at least UCS_CCX_5.9.12.1111, which can be downloaded on Poly Support.
Workaround
There is no workaround.
Contact
Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support – (888) 248-4143, (916) 928-7561, or visit the Poly Support Site.
Revision History
VERSION | DATE | DESCRIPTION |
---|---|---|
1.0 | 1/22/2020 | Initial Release |
2.0 | 3/8/2022 | Format changes |