Blue Box #51: Cisco SIP vulnerabilities, VoIP security hype, SPIT, OpenID, other VoIP security news and more…

Synopsis: Cisco SIP security vulnerabilities, VoIP security hype, SPIT, OpenID, other VoIP security news and more… 


Welcome to Blue Box: The VoIP Security Podcast #51, a 35-minute podcast  from Dan York and Jonathan Zar covering VoIP security news, comments and opinions. 

NOTE: This show was originally recorded February 7, 2007. 

Download the show here (MP3, 16MB) or subscribe to the RSS feed to download the show automatically. 

You may also listen to this podcast right now:


Show Content: 

Comments, suggestions and feedback are welcome either as replies to this post  or via e-mail to blueboxpodcast@gmail.com.  Audio comments sent as attached MP3 files are definitely welcome and will be played in future shows.  You may also call the listener comment line at either +1-206-350-2583 or via SIP to ‘bluebox@voipuser.org‘ to leave a comment there. 

Thank you for listening and please do let us know what you think of the show.

One thought on “Blue Box #51: Cisco SIP vulnerabilities, VoIP security hype, SPIT, OpenID, other VoIP security news and more…

  1. Adrian P.

    Hi there! Congrats for the show guys, it’s really great.
    Just wanted to point out that you don’t need to sniff the traffic to exploit BID 22191 (PA168 session hijack). All that is required is that a super user establishes a session with the device (authenticates). At that point an attacker can hijack the admin’s session from ANY IP address. Of course, this can be automated by repeatedly sending a “evil” superuser request (as shown in the PoC script).
    The “evil” request will dump the device’s config settings, including superuser passwords in the clear. So to clarify, no sniffing is required 😀
    Keep the hard work!

Comments are closed.