Get a Pentest and security assessment of your IT network.

Cyber Security

How a conference room speakerphone might let attackers into your company network

GRIMM researchers have discovered several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone. Vulnerabilities could be exploited by attackers to eavesdrop on what’s being discussed in its proximity, download malicious firmware, achieve and maintain network persistence, and more. The vulnerabilities include stack overflow and command injection flaws that could allow attackers to execute arbitrary code as root on the device. The fact that the device does not check the signatures of the served updates means that attackers can easily provide a malicious one.

Source: https://www.helpnetsecurity.com/2021/06/14/conference-room-speakerphone/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security