Accessibility Skip to content

CCX - UI does not properly restrict User

Vulnerability Summary

A vulnerability in the local user interface of the CCX500 phones could allow a local attacker access to restricted device settings. The vulnerability is due to a lack of restrictions on some device settings. A successful exploit could allow the local attacker to enable restricted options or change persistent system configuration settings.

Published

Last Update: 3/8/2022
Initial Public Release: 1/22/2020
Advisory ID:  PLYVC20-02

CVSS Score: 7.3
CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Product Affected
PRODUCTS FIRMWARE FIX
CCX 400

1.0.0.2535 and prior

UCS_CCX_5.9.12.1111 and above
CCX 500

1.0.0.2535 and prior

UCS_CCX_5.9.12.1111 and above
CCX 600

1.0.0.2535 and prior

UCS_CCX_5.9.12.1111 and above
CCX 700

1.0.0.2535 and prior

UCS_CCX_5.9.12.1111 and above
Solution

Poly has released a software update that addresses this vulnerability. There are no workarounds that address this vulnerability. CCX500 devices running software version 1.0.0.2535 should be updated to at least UCS_CCX_5.9.12.1111, which can be downloaded on Poly Support

 

Workaround

There is no workaround.

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

 

Revision History
VERSION DATE DESCRIPTION
1.0 1/22/2020 Initial Release
2.0 3/8/2022 Format changes