Software // Enterprise Applications
01:52 PM
Connect Directly
The Analytics Job and Salary Outlook for 2016
Jan 28, 2016
With data science and big data top-of-mind for all types of organizations, hiring analytics profes ...Read More>>

Vonage Vulnerable To Eavesdropping Hackers

Security software engineers with Sipera have found flaws in Vonage's VoIP Motorola Phone Adapter, its Grandstream HandyTone-488, and its Globe7 VoIP Client.

While Vonage defends itself against patent lawsuits from the likes of AT&T, the pioneering VoIP company also faces new risks from hackers.

Sipera Systems, a VoIP security company, said on Tuesday that users of VoIP services and equipment from Vonage, Globe7 and Grandstream were vulnerable to eavesdropping, spam, spoofing, and denial-of-service (DoS) attacks.

"These vulnerabilities create serious privacy and service availability issues for users," said Krishna Kurapati, Sipera founder and CTO, in a statement. "Vonage, Globe7 and Grandstream customers can no longer assume that their VoIP providers are automatically securing their services, but they should demand best security practices be followed as a condition of becoming a customer."

The Vonage VoIP Motorola Phone Adapter (VT 2142-VD), for example, does not authenticate SIP requests, leaving its vulnerable to VoIP identity theft, Sipera said. An attacker exploiting this vulnerability could send and receive calls using the victim's account. An attacker could also send multiple SIP INVITE messages, in effect creating a denial-of-service attack. Furthermore, an attacker could send spam and phishing messages directly to the hacked Vonage user.

The Grandstream HandyTone-488 PSTN-to-VoIP adapter is vulnerable to buffer overflow and fragmented packet attacks, Sipera said. The device's flaws could be exploited to conduct denial-of-service attacks.

Finally, the Globe7 VoIP Client does not use a secure connection, making it possible for an attacker to eavesdrop on calls, according to Sipera. The company also warned that the Globe 7 soft phone uses a weak encryption scheme that leaves the user's account information vulnerable to theft.

Comment  | 
Print  | 
More Insights
Building A Mobile Business Mindset
Building A Mobile Business Mindset
Among 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
Register for InformationWeek Newsletters
White Papers
Current Issue
How to Knock Down Barriers to Effective Risk Management
Risk management today is a hodgepodge of systems, siloed approaches, and poor data collection practices. That isn't how it should be.
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.