Security Analysis of an IP Phone: Cisco 7960G
نویسندگان
چکیده
IP phones are an essential component of any VoIP infrastructure. The hardware constraints and newness of these devices, as compared to mature desktop or server systems, lead to software development focused primarily on features and functionality rather than security and dependability. While several automated tools exist to test the security of IP phones, these tools have limitations and can not provide a strong guarantee that a particular IP phone is secure. Our work evaluates the attack resilience of a widely deployed IP phone, the Cisco 7960G, employing techniques such as: vulnerability scans, fuzz tests, and static binary analysis. While the first two techniques found no vulnerabilities, the static analysis of the firmware image revealed critical vulnerabilities and fundamental software design flaws. We conclude that security designs proven useful in desktop and server software architectures should similarly appear as part of the software design for devices such as IP phones.
منابع مشابه
Security testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملCisco Catalyst Integrated Security—enabling the Self-defending Network
Network security has become the primary concern of most enterprise and commercial network administrators. Whereas the greatest concern in the past was “physical security,” the almost-weekly release of new Internet-based viruses, worms, and attack tools has vastly increased the risk to the very fabric of business productivity. Network security was once viewed merely as a firewall between the net...
متن کاملThe complete IS-IS routing protocol
the complete is is routing protocol ebook | browserfame the complete is is routing protocol elint ip routing eigrp configuration guide, cisco ios release 12 the complete is is routing protocol budgieuk the complete is is routing protocol mtbenv the complete is is routing protocol ptfl the complete is is routing protocol friendsoftherec the complete is-is routing protocol home springer complete ...
متن کاملTask Force Mark Baugher ( Cisco ) INTERNET - DRAFT
This document presents an ISAMKP Domain of Interpretation (DOI) for group key management to support secure group communications. The "GDOI" incorporates the definition of a Phase 1 SA of the Internet DOI, and proposes new payloads and exchanges according to the ISAKMP standard. The GDOI manages group security associations, which are used by IPSEC and potentially other data security protocols ru...
متن کاملInternet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
With the development of the Internet and organizational intranets, it has become an increasingly critical and difficult task to monitor large and complex networks indispensable to security risk management and network performance analysis. Monitoring for security situational awareness with visualization has been shown to be an effective and efficient approach. However, the quality of source data...
متن کامل