How a conference room speakerphone might let attackers into your company network

3 years ago 89
BOOK THIS SPACE FOR AD
ARTICLE AD

14. June 2021

This article has been indexed from Help Net Security

Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in its proximity, download malicious firmware, achieve and maintain network persistence, and more, GRIMM researchers have discovered. The vulnerabilities in the Stem Audio Table conference room speakerphone The CVE numbers are yet to be assigned, but the found vulnerabilities include: Stack buffer overflow and command injection flaws that could allow attackers to execute … More

The post How a conference room speakerphone might let attackers into your company network appeared first on Help Net Security.

Read the original article: How a conference room speakerphone might let attackers into your company network

Read Entire Article