Accessibility Skip to content

UC Software - Exposure of Sensitive Information to an Unauthorized Actor

Vulnerability Summary

In certain configurations, Polycom UCS Software for VVX Phones may disclose sensitive information.  Polycom has found that recent software releases for the VVX line of phones may potentially disclose sensitive information when using Web Proxy Auto Discovery (WPAD) in a Microsoft environment.  

If the phone is configured to use web proxy but no web proxy credentials are provided, there is a risk that potentially disclose sensitive information. This vulnerability could allow a privileged, local attacker, in specific circumstances, to read sensitive information. To exploit this vulnerability, an attacker must be able to access the VVX management interface and successfully log into an affected device.

Published

Last Update: 3/14/2022
Initial Public Release: 6/25/2018
Advisory ID:  PLYVC18-05

Product Affected
PRODUCTS FIRMWARE FIX
VVX

UCS 5.7.0.11768

UCS 5.7.1.2205

UCS 5.7.2.1277

UCS 5.8.0.12386

Software version later than identified vulnerable release
Solution

Poly recommends customers upgrade to the respective firmware build or later. 

 

Workaround

There is no workaround.

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

 

Revision History
VERSION DATE DESCRIPTION
1.0 6/25/2018 Initial Release
1.1 7/3/2018 Updates for fixed software version and mitigations
1.2 7/11/2018 Corrected some language for consistency
2.0 3/14/2022 Format Changes