Summary
A password is needed to access the endpoint. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter).
Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password.
Mitigations
- Update to the latest fixed version of the
endpoint module, which sets new installs up with 16 digit randomized default passwords for phone admin, user and DPMA, plus adds Dashboard warnings for lesser passwords.
- Protect your Phone Apps from suspicious users.
- Isolate telephony network from the public internet e.g. OpenVPN, VLANs, etc.
- Remove users and extensions that should not have access.
- Review password policies, e.g., length, upper-case, lower-case, etc., in Admin -> User Management -> Settings -> Authentication Settings (and Password Management.)
- Change passwords to longer randomized strings, e.g., 16 digits that you share with users in four blocks of four digits each might be okay for a voicemail password in your environment.
- Change Phone Admin Password (under Endpoint Manager -> Global Settings).
- Change DPMA Global PIN (under Endpoint Manager -> Global Settings -> DPMA Management).
- Utilize User Manager authentication (under Phone Apps -> Endpoint Manager -> User Manager authentication). This option is not available on phones using DPMA.
- Consider hardware firewall for your FreePBX RESTful Phone Apps ports (ports listed under System Admin -> Port Management).
- Check FreePBX Responsive Firewall is active as this can limit access to Phone Apps to the IPs of SIP phones which already registered successfully (see previous blog post for more information: https://www.freepbx.org/freepbx-security-issue-sec-2023-001/ as well as the previous issue linked therein that the current fix is very closely related to: https://sangomakb.atlassian.net/wiki/spaces/FP/pages/13008945/2023-08-28+SECURITY+Potential+Rest+Phone+Apps+Authentication+issue)
- Require tokens for all endpoints (under Advanced Settings -> Phone Apps -> Enable Token Based Security). TEST IT FIRST AND BE READY TO REBOOT ALL YOUR PHONES SHOULD YOU DECIDE TO ACTIVATE TOKENS.
Scoring
CVSS 4.0 Base vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS 4.0 more complete vector string: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/MUI:P/AU:Y/R:U/V:D/RE:L/U:Green
Current CVSS v4.0 Base score is 6.9 (Medium)
Current CVSS v4.0 more complete score is 2.1 (Low)
Alternative CVSS v4.1 score is 2.1 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/
Summary
A password is needed to access the endpoint. By default, this is a 6 digit numeric value which can be brute forced. (This is the
app_passwordparameter).Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password.
Mitigations
endpointmodule, which sets new installs up with 16 digit randomized default passwords for phone admin, user and DPMA, plus adds Dashboard warnings for lesser passwords.Scoring
CVSS 4.0 Base vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:NCVSS 4.0 more complete vector string:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/MUI:P/AU:Y/R:U/V:D/RE:L/U:GreenCurrent CVSS v4.0 Base score is 6.9 (Medium)
Current CVSS v4.0 more complete score is 2.1 (Low)
Alternative CVSS v4.1 score is 2.1 (Low)
See details on scoring on the FreePBX blog at https://www.freepbx.org/watch-what-we-do-with-security-fixes-%f0%9f%91%80/