Vulnerability Summary
VVX products with software versions including and prior to, UCS 5.9.2 with Better Together over Ethernet Connector (BToE) application 3.9.1, use hard-coded credentials to establish connections between the host application and the device.
Details
CVE 2019-10688
VVX products with software versions including and prior to, UCS 5.9.2 with Better Together over Ethernet Connector (BToE) application 3.9.1, use hard-coded credentials to establish connections between the host application and the device.
Poly released a firmware update to address this vulnerability. There is no workaround.
Published
Last Update: 3/7/2022
Initial Public Release: 4/23/2019
Advisory ID: PLYVC19-04
CVE ID: CVE-2019-10688
CVSS Score: 6.8
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Product Affected
PRODUCTS | FIRMWARE | FIX |
---|---|---|
VVX300, VVX310, VVX400, VVX410, VVX500 and VVX600 | Prior to UCS 5.9.3 with BToE Application 3.9.1 |
UC Software 5.9.3 and above with Compatible BToE Application |
VVX201, VVX301, VVX311, VVX401, VVX411, VVX501 and VVX601 | Prior to UCS 6.0.0 with BToE Application 3.9.1 |
UC Software 6.0.0 and above with Compatible BToE Application |
VVX150, VVX250, VVX350 and VVX450 | Prior to UCS 6.0.0 with BToE Application 3.9.1 |
UC Software 6.0.0 and above with Compatible BToE Application |
Solution
Poly recommends customers upgrade to firmware build 5.9.3 or 6.0.0 with compatible BToE application or later respectively.
Workaround
There is no workaround.
Contact
Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support – (888) 248-4143, (916) 928-7561, or visit the Poly Support Site.
RECOGNITION
Poly would like to thank Philipp Buchegger from SySS GmbH for reporting security vulnerabilities to us and for their coordinated disclosure.
Revision History
VERSION | DATE | DESCRIPTION |
---|---|---|
1.0 | 4/23/2019 | Initial Release |
1.1 | 6/17/2019 | Fix Version for Multiple Products |
2.0 | 3/7/2022 | Format Changes |