[VoiceOps] New SPA2100/2102/1001 exploit in the wild?

Ryan Delgrosso ryandelgrosso at gmail.com
Fri Oct 18 20:33:04 EDT 2013

So just some additional information on this since i know a few others 
were seeing security issues with these devices.

I have recently discovered that cisco recently terminated the last 40 
engineers responsible for maintaining the SPA codebase (SPA ATAs and IP 
phones and the new SPA112/122). This was done to free up the budget to 
build a replacement product that will work more closely with their 
hosted call manager product and less with 3rd party sip which isnt due 
for several years.

They will of course continue to sell the SPA products but you may have 
issues if you need anything custom done or need factory provisioning.

I found the timing of these events slightly curious as well.

Take this for what you will and if anyone out there has more information 
please feel fre to chime in.

On 10/14/2013 04:08 PM, Ryan Delgrosso wrote:
> Hey all,
> I am seeing my fraud-o-meter tick up as of yesterday and it all seems 
> to be driven by accounts attached to these devices. We have taken 
> measures to start locking this down but I am wondering if anyone out 
> there is seeing similar.
> It looks like somehow legacy devices that have been deployed for 5+ 
> years are having accounts lifted out of them.
> Does anyone have info on this exploit, or if you are seeing this as 
> well and want to compare notes feel free to ping me.
> Thanks,
> -Ryan
> _______________________________________________
> VoiceOps mailing list
> VoiceOps at voiceops.org
> https://puck.nether.net/mailman/listinfo/voiceops

More information about the VoiceOps mailing list