TITLE: Clipcomm CWP-100/CP-100E Debug Service Unauthenticated Access SECUNIA ADVISORY ID: SA18505 VERIFY ADVISORY: http://secunia.com/advisories/18505/ CRITICAL: Less critical IMPACT: Hijacking, Security Bypass, Manipulation of data, Exposure of system information WHERE: >From local network OPERATING SYSTEM: Clipcomm CWP-100 Wireless LAN VoIP Phone http://secunia.com/product/6847/ Clipcomm CP-100E http://secunia.com/product/6848/ DESCRIPTION: Shawn Merdinger has reported a security issue in Clipcomm CWP-100 and Clipcomm CP-100E, which can be exploited by malicious people to disclose system information, manipulate certain information, and bypass certain security restrictions. The problem is caused due to the phone allowing connections to an undocumented debug service on port 60023/tcp. This can be exploited to gain access to a configuration/debug shell without being authenticated. This can further be exploited to disclose or manipulate certain information, reset the phone to factory settings, or make phone calls. The security issue has been reported in the following products: * Clipcomm CWP-100 firmware version 1.1.60 * Clipcomm CP-100E firmware version 1.1.12 Other versions may also be affected. SOLUTION: Restrict use to within trusted networks only. PROVIDED AND/OR DISCOVERED BY: Shawn Merdinger ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041436.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041439.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------