Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities were found on multiple Poly (Polycom) voice endpoints. The vulnerabilities are currently fixed, and customers are advised to upgrade to the latest software release that addresses the above vulnerabilities.
Last Update: 3/8/2022
Initial Public Release: 4/1/2020
Advisory ID: PLYVC20-04
|VVX101, VVX201, VVX301, VVX311, VVX401, VVX411, VVX501, VVX601, VVX150, VVX250, VVX350, VVX450, D60||
Prior to UCS 6.2
|UCS 6.2 and above|
|VVX300, VVX310, VVX400, VVX410, VVX500, VVX600||
Prior to UCS 5.9.6
|UCS 5.9.6 and above|
|SoundPoint IP and SoundStation IP||
Prior to USC 4.0.15
|USC 4.0.15 and above|
Poly recommends customers upgrade to the respective firmware build or later. The software, release notes, and other documentation for your voice endpoint can be found at Poly Support.
Poly recommends all customers upgrade to the latest version. Customers who need time to upgrade may disable the Web User Interface (Web UI) either by changing settings in the phone's user interface or through configuration file changes. Please check your product's Administrator Guide for specific instructions on how to do this.
Poly would like to thank Matt Landers from Marshall Hallenbeck for reporting security vulnerabilities to us and for their coordinated disclosure.
|2.0||3/9/2022||Format changes and Detail clarifications|