First published: Fri Feb 23 2024(Updated: )
An issue was discovered in Yealink Configuration Encrypt Tool (AES version) and Yealink Configuration Encrypt Tool (RSA version before 1.2). There is a single hardcoded key (used to encrypt provisioning documents) across customers' installations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink Configuration Encrypt Tool (RSA version) | <1.2 | |
Yealink Configuration Encrypt Tool (RSA version) | ||
Yealink Config Encrypt Tool | ||
Yealink Config Encrypt Tool | <1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24681 is considered a high severity vulnerability due to the presence of a hardcoded encryption key across multiple customer installations.
To fix CVE-2024-24681, update to the latest version of the Yealink Configuration Encrypt Tool that addresses the hardcoded key issue.
CVE-2024-24681 affects all versions of the Yealink Configuration Encrypt Tool (RSA version prior to 1.2 and all versions of AES version).
CVE-2024-24681 may lead to unauthorized access to encrypted provisioning documents due to the use of a shared hardcoded key.
Currently, there is no recommended workaround for CVE-2024-24681; users should prioritize upgrading to a secure version.