{"id":2197,"date":"2007-12-18T00:00:00","date_gmt":"2007-12-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/12\/18\/voip-vulnerabilities-increasing-but-not-exploits\/"},"modified":"2021-12-30T11:40:52","modified_gmt":"2021-12-30T11:40:52","slug":"voip-vulnerabilities-increasing-but-not-exploits","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/12\/18\/voip-vulnerabilities-increasing-but-not-exploits\/","title":{"rendered":"VoIP vulnerabilities increasing, but not exploits"},"content":{"rendered":"<p>The threats against VoIP are numerous and seem to be growing, but in 2008 the technology probably won&#8217;t suffer crippling attacks.  VoIP is susceptible to the many exploits that networks generally are heir to &#8212; denial of service, buffer overflows and more.  For instance, two protocols widely used in VoIP &#8212; H.323 and Inter Asterisk eXchange &#8212; have been shown to be vulnerable to sniffing during authentication, which can reveal passwords that later can be used to compromise the voice network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Implementations of Session Initiation Protocol (SIP), an alternative VoIP protocol, can leave VoIP networks open to unauthorized transport of data.<\/p>\n<p>The VoIPSA tools are intended to help businesses test and secure their networks, but these and other online tools can be used to probe for weaknesses as well.<\/p>\n<p>Part of the reason may be that the largest VoIP vendors use proprietary protocols, such as Cisco&#8217;s Skinny, Nortel&#8217;s Unistim and Avaya&#8217;s variant of H.323, Orans says.  SIP, which is gaining popularity, is a mixed bag, Orans says, because it is readily available to those who might want to exploit it.  These options include firewalls and intrusion-prevention systems that support SIP (compare products).<\/p>\n<p>Another reason for the lack of broad exploits is that there isnt enough ROI for attackers&#8217; development time.<\/p>\n<p>Hybrid PBX systems &#8212; which handle both VoIP and TDM voice &#8212; account for 64% of all PBX lines sold, according to a December 2007 Infonetics report.<\/p>\n<p>http:\/\/www.networkworld.com\/news\/2007\/121707-crystal-ball-voip-vulnerabilities.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2197","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2197"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2197\/revisions"}],"predecessor-version":[{"id":4684,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2197\/revisions\/4684"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}