Accessibility Skip to content

EEDII – Multiple Security Vulnerabilities

Vulnerability Summary

Multiple vulnerabilities discovered in the firmware build 2.2.1.1 of the EagleEye Director II.  The versions of Python, OpenSSL, and Apache contain multiple vulnerabilities or are no longer supported.  The version of TLS and use of certain cipher suites contain vulnerabilities.

 

Published

Last Update: 3/7/2022
Initial Public Release: 3/7/2022
Advisory ID:  PLYPL21-11


Details

Apache Version

Multiple vulnerabilities exist within the version of Apache, see the links below for detailed information.


Python Version

The version of Python contains multiple vulnerabilities, see the links below for detailed information.

 

TLS Version 1.0 Protocol Detection

The remote service accepts TLS 1.0, which contains multiple vulnerabilities, see the link below for detailed information.

OpenSSL Version

Multiple vulnerailities exist within the installed version of OpenSSL, see the links below for detailed information.

 

SSL Medium Strength Cipher Suites Supported (SWEET32)

The remote service supports medium strength SSL ciphers, which is vulnerable to SWEET32, see the link below for detailed information.

 

Product Affected
PRODUCTS FIRMWARE FIX
EEDII

2.2.1.1

2.2.2.1
Solution

Poly recommends all customers upgrade to the latest version. Update EaglelEye Director II to firmware version 2.2.2.1 or later.  This version contains patches for Python, Apache, and OpenSSL.  This fix version removes the use of weak ciphers and TLS 1.0.

 

Workaround

There is no workaround.

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

 

Revision History
VERSION DATE DESCRIPTION
1.0 03/07/2022 Initial Release