Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24681: n/a

0
Critical
VulnerabilityCVE-2024-24681cvecve-2024-24681
Published: Fri Feb 23 2024 (02/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-24681 is a critical vulnerability in the Yealink Configuration Encrypt Tool (AES and RSA versions before 1. 2) caused by the use of a single hardcoded encryption key across all customer installations. This flaw allows attackers to decrypt provisioning documents without authorization, compromising confidentiality, integrity, and availability of device configurations. The vulnerability has a CVSS score of 9. 8, indicating a high-severity remote exploit with no authentication or user interaction required. European organizations using Yealink VoIP devices are at risk of having their device configurations exposed or manipulated, potentially leading to interception of communications or disruption of telephony services. Mitigation requires Yealink to issue updated tools with unique keys per customer and organizations to re-encrypt provisioning files with secure keys. Countries with high adoption of Yealink devices and significant reliance on VoIP infrastructure, such as Germany, France, the UK, and the Netherlands, are most likely to be affected. Given the critical impact on confidentiality, integrity, and availability and ease of exploitation, immediate remediation is strongly advised.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:01:29 UTC

Technical Analysis

CVE-2024-24681 identifies a critical cryptographic vulnerability in the Yealink Configuration Encrypt Tool used to secure provisioning documents for Yealink VoIP devices. The vulnerability stems from the use of a single hardcoded encryption key embedded within the tool's AES and RSA versions prior to 1.2, which is shared across all customer deployments. This design flaw violates cryptographic best practices by eliminating key uniqueness and allowing any attacker with access to the encrypted provisioning files to decrypt them without requiring authentication or user interaction. Provisioning documents typically contain sensitive configuration data such as SIP credentials, server addresses, and device settings. Exploiting this vulnerability enables attackers to obtain these credentials, potentially leading to unauthorized access, call interception, or device manipulation. The CVSS 3.1 base score of 9.8 reflects the vulnerability's critical nature, with attack vector network-based, low attack complexity, no privileges or user interaction needed, and full impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise enterprise telephony infrastructure. The lack of a patch at the time of publication necessitates urgent attention from affected organizations to monitor for updates and implement compensating controls. This vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), highlighting the systemic risk of embedding static secrets in software products.

Potential Impact

For European organizations, the impact of CVE-2024-24681 is significant due to the widespread use of Yealink VoIP devices in corporate telephony systems. Successful exploitation can lead to exposure of sensitive provisioning data, including authentication credentials and network configuration, enabling attackers to impersonate devices, intercept or redirect calls, and disrupt communication services. This compromises confidentiality by exposing call metadata and potentially voice content, integrity by allowing unauthorized configuration changes, and availability by enabling denial-of-service attacks on telephony infrastructure. Organizations in sectors with high reliance on secure communications, such as finance, government, healthcare, and critical infrastructure, face elevated risks. Additionally, the vulnerability could facilitate lateral movement within networks if attackers leverage compromised devices as footholds. The absence of authentication or user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks. The critical CVSS score underscores the urgency for European enterprises to assess their exposure and implement mitigations promptly to prevent operational disruptions and data breaches.

Mitigation Recommendations

To mitigate CVE-2024-24681, European organizations should take the following specific actions: 1) Inventory all Yealink devices and identify those provisioned using the vulnerable Configuration Encrypt Tool versions. 2) Engage with Yealink support or vendors to obtain updated versions of the Configuration Encrypt Tool that generate unique encryption keys per customer, eliminating the hardcoded key issue. 3) Re-encrypt all provisioning documents with the updated tool and securely distribute them to devices, ensuring that compromised keys are no longer in use. 4) Implement network segmentation and strict access controls around provisioning servers and VoIP infrastructure to limit exposure of provisioning files. 5) Monitor network traffic for anomalies indicative of unauthorized device access or call interception attempts. 6) Consider deploying endpoint detection and response (EDR) solutions on VoIP devices where feasible to detect exploitation attempts. 7) Educate IT and security teams about the risks associated with hardcoded keys and enforce secure key management practices in future deployments. 8) Maintain vigilance for Yealink security advisories and promptly apply patches or updates as they become available. These measures go beyond generic advice by focusing on key rotation, secure provisioning workflows, and network-level protections tailored to the specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-01-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a475d6d939959c8022d5b

Added to database: 11/4/2025, 6:35:09 PM

Last enriched: 11/4/2025, 7:01:29 PM

Last updated: 11/4/2025, 7:36:35 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats