Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28442: n/a

0
High
VulnerabilityCVE-2024-28442cvecve-2024-28442
Published: Tue Mar 26 2024 (03/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:56:16 UTC

Technical Analysis

CVE-2024-28442 is a directory traversal vulnerability identified in the Yealink VP59 IP phone, version 91.15.0.118. The vulnerability resides in the terms of use function within the company portal component of the device's firmware. Directory traversal vulnerabilities allow attackers to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive information. In this case, an attacker with physical proximity—implying access to the same local network or direct device connection—can exploit this flaw without requiring any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting a high severity primarily due to its impact on confidentiality (C:H), with no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:N/UI:N). The CWE classification is CWE-200, indicating exposure of sensitive information to an unauthorized actor. Although no known exploits have been reported in the wild and no patches have been released yet, the vulnerability poses a significant risk to organizations relying on Yealink VP59 devices for voice communications. The ability to access sensitive files via directory traversal could lead to leakage of configuration files, credentials, or other confidential data stored on the device. This could facilitate further attacks or espionage. The lack of required authentication makes the vulnerability easier to exploit in environments where the device is accessible over the network or physically. Given the nature of IP phones as critical communication endpoints, this vulnerability could undermine organizational security and privacy.

Potential Impact

The primary impact of CVE-2024-28442 is the unauthorized disclosure of sensitive information stored on Yealink VP59 devices. This can include configuration files, user credentials, or other confidential data accessible through the company portal's terms of use function. Such information leakage can enable attackers to gain deeper access into the network, perform reconnaissance, or launch subsequent attacks such as impersonation or man-in-the-middle attacks. Since the vulnerability does not affect integrity or availability, it does not directly disrupt device operation or data modification but compromises confidentiality significantly. Organizations with large deployments of Yealink VP59 phones, especially in sectors like government, finance, healthcare, and critical infrastructure, face heightened risks of espionage or data breaches. The requirement for physical proximity or local network access limits the scope but does not eliminate risk, particularly in environments with weak network segmentation or inadequate physical security. The absence of patches increases exposure duration, potentially allowing attackers to develop exploits. Overall, this vulnerability threatens the confidentiality of sensitive communications and device data, potentially undermining trust in telephony infrastructure.

Mitigation Recommendations

To mitigate CVE-2024-28442 effectively, organizations should implement the following specific measures: 1) Restrict physical access to Yealink VP59 devices to trusted personnel only, preventing unauthorized local network connections. 2) Segment the network to isolate IP phones from general user networks and untrusted devices, limiting attacker proximity. 3) Disable or restrict access to the company portal and terms of use function if not essential, reducing the attack surface. 4) Monitor network traffic to and from Yealink devices for unusual access patterns or attempts to access unauthorized file paths. 5) Employ network access controls such as MAC filtering or 802.1X authentication to limit device connectivity. 6) Regularly audit device configurations and logs for signs of compromise or exploitation attempts. 7) Engage with Yealink support or vendors for firmware updates or patches addressing this vulnerability and apply them promptly once available. 8) Educate IT and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration hardening specific to the affected devices and vulnerability vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d90b7ef31ef0b588ad7

Added to database: 2/25/2026, 9:45:52 PM

Last enriched: 2/26/2026, 6:56:16 PM

Last updated: 4/11/2026, 11:22:24 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses