Accessibility Skip to content

UC Software - Exposure of Sensitive Information to an Unauthorized Actor

Vulnerability Summary

An information disclosure vulnerability exists in Poly CCX 400, 500, 600 and 700 and Trio 8500, 8800 and C60 models running UC software that could allow an authenticated administrative user to obtain sensitive information.

 

Details

CVE 2022-26879 - Poly VoIP Phones Exposure of Sensitive Information to an Unauthorized Actor

A successful exploit could allow the attacker to extract sensitive information from the affected device. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. 

It should be noted, this vulnerability would not allow an attacker to execute code or to elevate their user rights directly.

Poly released a firmware update to address this vulnerability.  There is no workaround.

Published

Last Update: 3/10/2022
Initial Public Release: 4/29/2021
Advisory ID:  PLYVC21-05

CVE ID: CVE-2022-26879
CVSS Score: 4.4
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Product Affected
PRODUCTS FIRMWARE FIX
Trio 8500

Poly UC Software 5.9.5

Poly UC Software 7.0.0

Poly UC Software 7.0.1

Poly UC Software 5.9.5.3182

Poly UC Software 7.0.1.1144

Trio 8800

Poly UC Software 5.9.5

Poly UC Software 7.0.0

Poly UC Software 7.0.1

Poly UC Software 5.9.5.3182

Poly UC Software 7.0.1.1144

Trio C60

Poly UC Software 7.0.0

Poly UC Software 7.0.1

Poly UC Software 7.0.1.1143
CCX 400

Poly UC Software 6.2.23

Poly UC Software 7.0.1

Poly UC Software 6.2.23.0387

Poly UC Software 7.0.1.1145

CCX 500

Poly UC Software 6.2.23

Poly UC Software 7.0.1

Poly UC Software 6.2.23.0387

Poly UC Software 7.0.1.1145

CCX 600

Poly UC Software 6.2.23

Poly UC Software 7.0.1

Poly UC Software 6.2.23.0387

Poly UC Software 7.0.1.1145

CCX 700

Poly UC Software 6.2.23

Poly UC Software 7.0.1

Poly UC Software 6.2.23.0387

Poly UC Software 7.0.1.1145

Solution

Poly has released firmware updates that address this vulnerability. There are no workarounds that address this this vulnerability. Please refer to the release notes for more information to confirm the supported hardware and software configurations are used.

 

Workaround

Poly recommends applying the following methods to reduce the risk of the identified vulnerability.  If possible, it is recommended to disable the web UI, which can be accomplished on the device using the Admin credentials for the device.  It is also recommended to implement strong password complexity for the Admin account credentials.

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

 

Revision History
VERSION DATE DESCRIPTION
1.0 9/7/2021 Initial Release
2.0 3/9/2022 Format changes and Detail clarifications