IP TELEPHONY
IP telephony: protection is crucial IP telephony has become an essential part of modern business communication — yet security is still often overlooked. Even seemingly minor vulnerabilities can become valuable entry points for attackers and IP phones, like any IT system, require continual protection.
At Snom, we work closely with our technology and reseller partners to
setup and management, but if inputs aren’t properly validated, parameters can be altered or call forwarding can be activated without authorisation. Protecting provisioning with TLS, mutual authentication, and per-device certificates prevents spoofing of both servers and endpoints. Security as an ongoing commitment IP phones are small specialised computers with their own operating system, network stack and web server. As such, continuous firmware maintenance is essential: this supports new features and reduces the risk of security gaps that may exist in the underlying software platform. When updates are no longer supported, it’s vital that organisations replace outdated hardware to remove any exposure to risk. To understand if hardware is fit for purpose, organisations should carry out regular security audits of IP telephony. This should include ensuring phone web interfaces or provisioning tools are never directly accessible from the internet without protection, and that all available security features are activated. Segmenting communication networks and consistently encrypting all provisioning and signaling connections will also ensure that security is never compromised. Snom’s task is to ensure communication security at the device level. Secure software is not a one-time achievement but an ongoing dialogue with new technologies and attackers. It’s essential that we remain vigilant and constantly review the development of security protocols. n
Mark Wiegleb at Snom, outlines the methods organisations need to be aware of to counter threats and emphasises why security must be an ongoing priority.
identify emerging vulnerabilities that they may be seeing in the market. This enables us to track patterns, anticipate trends and ensure the highest level of security for all our devices. The same features that make IP telephony convenient for administrators – web interfaces, authentication processes and provisioning workflows – are often sources of potential issues. Most common threat types for IP phones 1. Cross-Site Scripting (XSS) The built-in web interfaces used to configure IP phones are practical – but without strict input validation, they may allow malicious scripts to run in active sessions. This can enable attackers to execute administrative commands or alter system settings. Strong validation, clear separation of user and admin roles and regular firmware updates can reduce this risk. 2. Privilege escalation Many attackers look to exploit weak permissions to gain elevated user privileges needed for access. For example, if a user account – perhaps even that of a former employee – is unintentionally granted administrator status due to inadequate permission checks, security-critical settings like TLS configurations or encryption policies can be altered. This can undermine the entire security architecture and is where consistent, updated rights management is essential. 3. Provisioning injection/input manipulation Provisioning enables efficient device
50
Powered by FlippingBook