The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote malicious users to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google gizmo5 - |