CVE-2024-28442: n/a
Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component.
AI Analysis
Technical Summary
CVE-2024-28442 is a directory traversal vulnerability identified in the Yealink VP59 IP phone, version 91.15.0.118. The vulnerability resides in the terms of use function within the company portal component of the device's firmware. Directory traversal vulnerabilities allow attackers to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive information. In this case, an attacker with physical proximity—implying access to the same local network or direct device connection—can exploit this flaw without requiring any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting a high severity primarily due to its impact on confidentiality (C:H), with no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:N/UI:N). The CWE classification is CWE-200, indicating exposure of sensitive information to an unauthorized actor. Although no known exploits have been reported in the wild and no patches have been released yet, the vulnerability poses a significant risk to organizations relying on Yealink VP59 devices for voice communications. The ability to access sensitive files via directory traversal could lead to leakage of configuration files, credentials, or other confidential data stored on the device. This could facilitate further attacks or espionage. The lack of required authentication makes the vulnerability easier to exploit in environments where the device is accessible over the network or physically. Given the nature of IP phones as critical communication endpoints, this vulnerability could undermine organizational security and privacy.
Potential Impact
The primary impact of CVE-2024-28442 is the unauthorized disclosure of sensitive information stored on Yealink VP59 devices. This can include configuration files, user credentials, or other confidential data accessible through the company portal's terms of use function. Such information leakage can enable attackers to gain deeper access into the network, perform reconnaissance, or launch subsequent attacks such as impersonation or man-in-the-middle attacks. Since the vulnerability does not affect integrity or availability, it does not directly disrupt device operation or data modification but compromises confidentiality significantly. Organizations with large deployments of Yealink VP59 phones, especially in sectors like government, finance, healthcare, and critical infrastructure, face heightened risks of espionage or data breaches. The requirement for physical proximity or local network access limits the scope but does not eliminate risk, particularly in environments with weak network segmentation or inadequate physical security. The absence of patches increases exposure duration, potentially allowing attackers to develop exploits. Overall, this vulnerability threatens the confidentiality of sensitive communications and device data, potentially undermining trust in telephony infrastructure.
Mitigation Recommendations
To mitigate CVE-2024-28442 effectively, organizations should implement the following specific measures: 1) Restrict physical access to Yealink VP59 devices to trusted personnel only, preventing unauthorized local network connections. 2) Segment the network to isolate IP phones from general user networks and untrusted devices, limiting attacker proximity. 3) Disable or restrict access to the company portal and terms of use function if not essential, reducing the attack surface. 4) Monitor network traffic to and from Yealink devices for unusual access patterns or attempts to access unauthorized file paths. 5) Employ network access controls such as MAC filtering or 802.1X authentication to limit device connectivity. 6) Regularly audit device configurations and logs for signs of compromise or exploitation attempts. 7) Engage with Yealink support or vendors for firmware updates or patches addressing this vulnerability and apply them promptly once available. 8) Educate IT and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration hardening specific to the affected devices and vulnerability vector.
Affected Countries
United States, China, Germany, United Kingdom, France, Australia, Canada, Japan, South Korea, India
CVE-2024-28442: n/a
Description
Directory Traversal vulnerability in Yealink VP59 v.91.15.0.118 allows a physically proximate attacker to obtain sensitive information via terms of use function in the company portal component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-28442 is a directory traversal vulnerability identified in the Yealink VP59 IP phone, version 91.15.0.118. The vulnerability resides in the terms of use function within the company portal component of the device's firmware. Directory traversal vulnerabilities allow attackers to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive information. In this case, an attacker with physical proximity—implying access to the same local network or direct device connection—can exploit this flaw without requiring any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting a high severity primarily due to its impact on confidentiality (C:H), with no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:N/UI:N). The CWE classification is CWE-200, indicating exposure of sensitive information to an unauthorized actor. Although no known exploits have been reported in the wild and no patches have been released yet, the vulnerability poses a significant risk to organizations relying on Yealink VP59 devices for voice communications. The ability to access sensitive files via directory traversal could lead to leakage of configuration files, credentials, or other confidential data stored on the device. This could facilitate further attacks or espionage. The lack of required authentication makes the vulnerability easier to exploit in environments where the device is accessible over the network or physically. Given the nature of IP phones as critical communication endpoints, this vulnerability could undermine organizational security and privacy.
Potential Impact
The primary impact of CVE-2024-28442 is the unauthorized disclosure of sensitive information stored on Yealink VP59 devices. This can include configuration files, user credentials, or other confidential data accessible through the company portal's terms of use function. Such information leakage can enable attackers to gain deeper access into the network, perform reconnaissance, or launch subsequent attacks such as impersonation or man-in-the-middle attacks. Since the vulnerability does not affect integrity or availability, it does not directly disrupt device operation or data modification but compromises confidentiality significantly. Organizations with large deployments of Yealink VP59 phones, especially in sectors like government, finance, healthcare, and critical infrastructure, face heightened risks of espionage or data breaches. The requirement for physical proximity or local network access limits the scope but does not eliminate risk, particularly in environments with weak network segmentation or inadequate physical security. The absence of patches increases exposure duration, potentially allowing attackers to develop exploits. Overall, this vulnerability threatens the confidentiality of sensitive communications and device data, potentially undermining trust in telephony infrastructure.
Mitigation Recommendations
To mitigate CVE-2024-28442 effectively, organizations should implement the following specific measures: 1) Restrict physical access to Yealink VP59 devices to trusted personnel only, preventing unauthorized local network connections. 2) Segment the network to isolate IP phones from general user networks and untrusted devices, limiting attacker proximity. 3) Disable or restrict access to the company portal and terms of use function if not essential, reducing the attack surface. 4) Monitor network traffic to and from Yealink devices for unusual access patterns or attempts to access unauthorized file paths. 5) Employ network access controls such as MAC filtering or 802.1X authentication to limit device connectivity. 6) Regularly audit device configurations and logs for signs of compromise or exploitation attempts. 7) Engage with Yealink support or vendors for firmware updates or patches addressing this vulnerability and apply them promptly once available. 8) Educate IT and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration hardening specific to the affected devices and vulnerability vector.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d90b7ef31ef0b588ad7
Added to database: 2/25/2026, 9:45:52 PM
Last enriched: 2/26/2026, 6:56:16 PM
Last updated: 4/12/2026, 5:06:53 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.