solution Contentsolution Content

Poly systems - Heartbleed impact

A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension.

Severity

High

Advisory ID

PLYGN14-01

Initial public release

04/09/2014

Last update

03/04/2022

Category

Poly

Summary

CVE 2014-0160

Through exploiting the heartbeat feature in OpenSSL versions 1.0.1 through 1.0.1f, an attacker can capture memory from the host 64k at a time. Successive 64k sections of memory can be captured until the attacker has captured the desired data. This could include, at worst case, a copy of the server’s private key.

Relevant Common Vulnerabilities and Exposures (CVE) List

List of CVE IDs

CVE ID

CVS 3.0

Severity

Vector

CVE-2014-0160

7.5

High

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Resolution

Solution

As fixes become available for a given product, that information will appear in this bulletin in subsequent releases. Polycom will continue updating this bulletin until all fixes are in place. Polycom recommends that users of any Polycom product listed in the table above as being vulnerable update to the “FIXED” version of their product as soon as such a version becomes available.

Workaround

At this time, many affected products have older versions to which you can temporarily regress (install older version). If you can temporarily run an older product version, this is recommended.

For some products, mitigations exist solely in the realm of controlling the presence of encrypted traffic on any system that uses a vulnerable version of OpenSSL. Basic suggestions at this time are to:

  1. Place the Polycom product behind a firewall whenever possible, such that outsiders do not have access to ports used by OpenSSL on the device (usually only HTTPS, but sometimes other protocols that use TLS such as secure LDAP or secure SIP are involved).

  2. Turn off any services that use OpenSSL (if relevant) if at all possible. When new fixes become available, new certificates can be issued for your system, thus occluding any knowledge an attacker might have gained with regards to your old encryption certificates or keys.

For the voice products currently listed as vulnerable, a mitigation specific to these products is available: Set your httpd.enabled flag to = 0 (zero). This disables web access of all kinds, and blocks known heartbeat vectors into the system.

Affected products

Identify the affected products for this issue.

List of products

Managed Applications

Version

Vulnerable

Notes

CMA

All

Not Vulnerable

RealPresence Distributed Media Application (DMA)

All

Not Vulnerable

RealPresence Resource Manager (RPRM)

All

Not Vulnerable

RealPresence Video DualManager 400 (RPDM)

All

Not Vulnerable

RealPresence Platform Suite (SoftRPP)

All

Not Vulnerable

Telepresence Rooms

Version

Status

Notes

VSX Series

All

Not Vulnerable

HDX Series

3.0.x and Older Versions

Not Vulnerable

HDX Series

3.1.x and Greater Versions

Vulnerable

Fixed in version 3.1.3.2

HDX Series

3.1.3.2

Not Vulnerable

Fixes earlier 3.x vulnerabile versions - not currently recommended for CMS/Halo

QDX 6000

All

Not Vulnerable

RealPresence Group Series

All

4.1.3.2 fixes all 4.1.x versions

4.0.2.2 fixes all 4.0.x versions

RealPresence Group Series

4.0.2.2

Not Vulnerable

4.0.2.2 fixes all 4.0.x versions

RealPresence Group Series

4.1.3.2

Not Vulnerable

4.1.3.2 fixes all 4.1.x versions

Immersive Telepresence

Version

Status

Notes

ITP

2.7.1

Not Vulnerable

Uses HDX 2.6.1.3_itp271-5267

ITP

3.0.1

Not Vulnerable

Uses HDX 3.0.1-10628

ITP

3.0.2

Not Vulnerable

Uses HDX 3.0.2-11176

ITP

3.0.3

Not Vulnerable

Uses HDX 3.0.3-14451

ITP

3.0.5

Not Vulnerable

Uses HDX 3.0.5-22695

ITP

3.1

Vulnerable

Fixed by HDX 3.1.3.2

ITP

3.1.2

Vulnerable

Fixed by HDX 3.1.3.2

ITP

3.1.3

Vulnerable

Fixed by HDX 3.1.3.2

ITP with HDX (ATX, OTX, RPX, TPX)

See HDX Section for any fixes

ITP with Group Series (Immersive Studio)

See Group Series Section for any fixes

RPIS

4.1.2

Vulnerable

Fixed by Group Series 4.1.3.2

RPIS

4.1.3

Vulnerable

Fixed by Group Series 4.1.3.2

CMS/Halo

All

Vulnerable

HDX and RMX are the only vulnerable components

Desktop & Mobile Video Conferencing

Version

Status

Notes

RealPresence Desktop

All Versions

All Versions

RealPresence Mobile

All Versions

All Versions

CMA Desktop

All Versions

All Versions

RealPresence Collaboration Server 1500, 1800, 2000 and 4000 (RMX)

Version

Status

Notes

RMX

All verison prior to 8.1

Not Vulnerable

RMX

8.1.4.x

Vulnerable

Fixed with hotfix 8.1.7.37.022.543.002

RMX

8.1.7.x

Vulnerable

Fixed with hotfix 8.1.7.37.022.543.002

RMX

8.2.x

Vulnerable

Fixed with hotfix 8.2.0.85.13.544.002

RMX

8.3.x

Vulnerable

New 8.3.0.246 fix replaces 8.3.0.245.477.003

RMX

8.2.0.85.13.544.002

Not Vulnerable

Fixes 8.2.x

RMX

8.3.0.245.477.003 (Hot fix)

Not Vulnerable

Expired fix for 8.3.x

RMX

8.3.0.246

Not Vulnerable

Fix for 8.3.x

MGC-25, MGC-50, MGC-100

All

Not Vulnerable

RealPresence Collaboration Server, Virtual Edition (SoftMC)

8.3.x

Not Vulnerable

S4GW Serial Gateway for RMX

All

Not Vulnerable

Media Capture & Sharing

Version

Status

Notes

Recording and Streaming Server (RSS) 4000

All Versions

Not Vulnerable

Recording and Streaming Server (RSS) 2000

All Versions

Not Vulnerable

RealPresence Capture Server

All Versions

Not Vulnerable

RealPresence Capture Station Pro

All Versions

Not Vulnerable

RealPresence Capture Station Portable Pro

All Versions

Not Vulnerable

RealPresence Media Manager

All Versions

Not Vulnerable

Media Editor

All Versions

Not Vulnerable

CSS Client

All Versions

Not Vulnerable

CSS Server

All Versions

Not Vulnerable

Firewall Traversal & Security

Version

Status

Notes

Video Border Proxy (VBP) E & ST Series

11.1x

Not Vulnerable

Video Border Proxy (VBP) E & ST Series

11.2.11 - Hot fix

Not Vulnerable

Video Border Proxy (VBP) E & ST Series

11.2.12 - GA

Vulnerable

Fixed with version 11.2.17

Video Border Proxy (VBP) E & ST Series

11.2.16 - GA

Vulnerable

Fixed with version 11.2.17

Video Border Proxy (VBP) E & ST Series

11.2.17

Not Vulnerable

Fixes earlier vulnerable versions

RealPresence Access Director (RPAD)

All Version

Not Vulnerable

CloudAXIS

Version

Status

Notes

CloudAXIS MEA (Web Experience Portal)

All Versions

Not Vulnerable

CloudAXIS MEA (Web Experience Portal)

All Versions

Not Vulnerable

CloudAXIS WSP (Web Service Portal)

All Versions

Not Vulnerable

Desktop Video & Voice Solutions

Version

Status

Notes

SoundPoint, SoundStation, SoundStructure, VVX, (VoIP Interface) Families

All Versions 4.0.x

Not Vulnerable

SoundPoint, SoundStation, VVX Families

UCS 3.3.0.1098 rts 35 -

UCS 3.3.4.0085 rts 6

Not Vulnerable

SoundPoint, SoundStation, VVX Families

SIP 3.2.0 rts 44-

SIP 3.2.7.0198 rts 10

Not Vulnerable

SoundPoint, SoundStation, and SoundStructure (VoIP Interface) Families

UCS 4.1.0.84959 rts 421 -

UCS 4.1.6.4835 rts 50

Vulnerable & Fixed

UCS 4.1.6 patch fix delivered, UCS 5.0.2 patch fix delivered, UCS 4.1.0 patch fix delivered, UCS 5.1.0 patch fix delivered, UCS 4.1.7 patch fix delivered

VVX and SoundStructure (VoIP Interface) Families

UCS 4.1.3.7864 rts 21G -

UCS 5.0.1.7396 rts 56 Q

Vulnerable & Fixed

UCS 4.1.6 patch fix delivered, UCS 5.0.2 patch fix delivered, UCS 4.1.0 patch fix delivered, UCS 5.1.0 patch fix delivered, UCS 4.1.7 patch fix delivered

Zero Touch Provisioning Solution - ZTP (User Portal)

N/A

Not Vulnerable

Fixed as of April 11, 2014

Unified Conference & Collaboration Stations

All

Not Vulnerable

CX100, CX300, CX500, CX600, CX3000

All

Not Vulnerable

Accessories

Version

Status

Notes

TouchControl (PTC)

All

Not Vulnerable

People + Content IP (PP CIP)

All

Not Vulnerable

Revision history

This document has been revised according to the following information.

List of versions

Version

Description

Date

2.0

Format Changes

03/04/2022

1.12

Final version – UCS 4.0.x clarifiedand UCS 4.1.7 listed as fixed

06/05/2014

1.11

All RMX fixes finalized, RMX 8.3 fixreplaced with new RMX 8.3 fix. One more set of phone fixes has arrived.

05/15/2014

1.10

RMX 8.2, Group Series 4.0, RPIS

05/06/2014

1.9

Clarification on HDX/ITP and HDX/CMS,Fixes for many of the UCS phones, CMS/Halo & S4GW added as their ownitems.

04/28/2014

1.8

Group Series fix announced. Moredetail for RMX fixes for older versions. Added PPCIP. Note about ITP and HDXfix. Changed dates on UCS phones.

04/26/2014

1.7

New formatting, fix announcements forHDX and RMX, condensed table format

04/22/2014

1.6

Added UCS fix dates for the affectedVVX, Soundstation, Soundstructure systems. Added new language at the top and bottom of the document reminding that it is aliving doc, updates of which can be found on Polycom’s website

04/18/2014

1.5

RMX estimate for fix date, HDX fixdate estimate moved in, mitigation for those members of Soundpoint familyaffected.

04/17/2014

1.4

More condensation and accuracy.Mitigation advice removed from RMX.

04/15/2014

1.3

Product list condensation (“versionsolder than”). HDX and Group Series fix date estimates published. Incorrectmitigation advice for RMX posted.

04/14/2014

1.2

More products, better detail, betterlistings for affected members of Soundpoint family.

04/14/2014

1.1

More detail for more products andfirst estimates for fix dates. Improved mitigation detail.

04/10/2014

1.0

Initial Release

04/09/2014

Additional information

Follow these links for additional information.

Third-party security patches

Third-party security patches that are to be installed on systems running Poly software products should be applied in accordance with the customer's patch management policy.

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

Security bulletin archive

To view released Security Bulletins, visit https://support.hp.com/security-bulletins.

It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.

Download HP’s security-alert PGP key

Legal information

©2022 Plantronics, Inc. All rights reserved.

TrademarksPoly, the propeller design, and the Poly logo are trademarks of Plantronics, Inc. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Poly.

DisclaimerWhile Poly uses reasonable efforts to include accurate and up-to-date information in this document, Poly makes no warranties or representations as to its accuracy. Poly assumes no liability or responsibility for any typographical errors, out of date information, or any errors or omissions in the content of this document. Poly reserves the right to change or update this document at any time. Individuals are solely responsible for verifying that they have and are using the most recent Technical Bulletin.

Limitation of LiabilityPoly and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Poly and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive, or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Poly has been advised of the possibility of such damages.